Application Server Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000297
Group -
The application server management interface must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
Providing a logout capability to the user allows the user to explicitly close a session and free those resources used during the session. If a user cannot explicitly end an application session, th...Rule Medium Severity -
SRG-APP-000313
Group -
SRG-APP-000314
Group -
The application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission.
The application server provides a framework for applications to communicate between each other to form an overall well-designed application to perform a task. As the information is transmitted, th...Rule Medium Severity -
SRG-APP-000315
Group -
SRG-APP-000316
Group -
The application server must provide the capability to immediately disconnect or disable remote access to the management interface.
Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking progress would not be immediately stopped. The application server must have the capabil...Rule Medium Severity -
SRG-APP-000340
Group -
The application server must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Restrict...Rule Medium Severity -
SRG-APP-000343
Group -
The application server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.
In order to be able to provide a forensic history of activity, the application server must ensure users who are granted a privileged role or those who utilize a separate distinct account when acces...Rule Medium Severity -
SRG-APP-000357
Group -
The application server must allocate log record storage capacity in accordance with organization-defined log record storage requirements.
The proper management of log records not only dictates proper archiving processes and procedures be established, it also requires allocating enough storage space to maintain the logs online for a d...Rule Medium Severity -
SRG-APP-000358
Group -
SRG-APP-000359
Group -
The application server must provide an immediate warning to the SA and ISSO, at a minimum, when allocated log record storage volume reaches 75% of maximum log record storage capacity.
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures include software/hardware errors, failures in the lo...Rule Medium Severity -
SRG-APP-000360
Group -
The application server must provide an immediate real-time alert to authorized users of all log failure events requiring real-time alerts.
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures include software/hardware errors, failures in the lo...Rule Medium Severity -
SRG-APP-000371
Group -
The application server must compare internal application server clocks at least every 24 hours with an authoritative time source.
Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating system events. Synchronization of system clocks is ...Rule Medium Severity -
SRG-APP-000372
Group -
The application server must synchronize internal application server clocks to an authoritative time source when the time difference is greater than the organization-defined time period.
Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating system events. Synchronization of internal applicat...Rule Medium Severity -
SRG-APP-000374
Group -
SRG-APP-000375
Group -
The application server must record time stamps for log records that meet a granularity of one second for a minimum degree of precision.
To investigate an incident, the log records should be easily put into chronological order. Without sufficient granularity of time stamps, the chronological order cannot be determined. Time stamps...Rule Medium Severity -
SRG-APP-000380
Group -
SRG-APP-000381
Group -
The application server must log the enforcement actions used to restrict access associated with changes to the application server.
Without logging the enforcement of access restrictions against changes to the application server configuration, it will be difficult to identify attempted attacks, and a log trail will not be avail...Rule Medium Severity -
SRG-APP-000389
Group -
SRG-APP-000391
Group -
SRG-APP-000392
Group -
The application server must electronically verify Personal Identity Verification (PIV) credentials for access to the management interface.
The use of Personal Identity Verification (PIV) credentials facilitates standardization and reduces the risk of unauthorized access. PIV credentials are only used in an unclassified environment. ...Rule High Severity -
SRG-APP-000400
Group -
The application server must prohibit the use of cached authenticators after an organization-defined time period.
When the application server is using PKI authentication, a local revocation cache must be stored for instances when the revocation cannot be authenticated through the network, but if cached authent...Rule Medium Severity -
SRG-APP-000401
Group -
SRG-APP-000402
Group -
The application server must accept Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface.
Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requir...Rule Medium Severity -
SRG-APP-000403
Group -
SRG-APP-000404
Group -
The application server must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.
Access may be denied to legitimate users if FICAM-approved third-party credentials are not accepted. This requirement typically applies to organizational information systems that are accessible to...Rule Medium Severity -
SRG-APP-000405
Group -
SRG-APP-000427
Group -
SRG-APP-000428
Group -
The application server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components.
Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an application server. Alternative physical protection...Rule Medium Severity -
SRG-APP-000429
Group -
The application must implement cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an application server. Alternative physical protection...Rule Medium Severity -
SRG-APP-000435
Group -
SRG-APP-000435
Group -
SRG-APP-000439
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.