IBM WebSphere Traditional V9.x Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000440-AS-000166
Group -
SRG-APP-000440-AS-000167
Group -
SRG-APP-000454-AS-000268
Group -
The WebSphere Application Server must remove organization-defined software components after updated versions have been installed.
By default, when updating WebSphere application server, the older version of binaries are saved in case a "roll back" is necessary. Not keeping the older version makes it more difficult for attacke...Rule Medium Severity -
SRG-APP-000456-AS-000266
Group -
The WebSphere Application Server must apply the latest security fixes.
Security vulnerabilities are often addressed by testing and applying the latest security patches and fix packs. Latest fixpacks can be found at: http://www-01.ibm.com/support/docview.wss?uid=swg270...Rule Medium Severity -
SRG-APP-000456-AS-000266
Group -
The WebSphere Application Server must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVMs, CTOs, DTMs, and STIGs).
Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (incl...Rule Medium Severity -
The WebSphere Application Server maximum in-memory session count must be set according to application requirements.
Application management includes the ability to control the number of sessions that utilize an application by all accounts and/or account types. Limiting the number of allowed sessions is helpful in...Rule Medium Severity -
The WebSphere Application Server administrative security must be enabled.
In previous releases of WebSphere® Application Server, when a user enabled global security, both administrative and application security were enabled. The previous notion of global security is spl...Rule High Severity -
The WebSphere Application Server groups in the user registry mapped to WebSphere auditor roles must be configured in accordance with the security plan.
Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident. Remote access by adm...Rule Medium Severity -
The WebSphere Application Server audit event type filters must be configured.
Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident. Remote access by adm...Rule Medium Severity -
The WebSphere Application Server Quality of Protection (QoP) must be set to use TLSv1.2 or higher.
Quality of Protection specifies the security level, ciphers, and mutual authentication settings for the Secure Socket Layer (SSL/TLS) configuration.Rule Medium Severity -
The WebSphere Application Server global application security must be enabled.
Application security enables security for the applications in your environment. This setting provides application isolation and meets security requirements such as using SSL for authenticating appl...Rule High Severity -
The WebSphere Application Server users in the admin role must be authorized.
Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement...Rule Medium Severity -
The WebSphere Application Server must allocate JVM log record storage capacity in accordance with organization-defined log record storage requirements.
JVM logs are logs used to store application and runtime related events, rather than audit related events. They are mainly used to diagnose application or runtime bugs. But sometimes they may be use...Rule Medium Severity -
The WebSphere Application Server audit subsystem failure action must be set to Log warning.
Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a security incident. When log processing fails, the events during the failure...Rule Medium Severity -
The WebSphere Application Server wsadmin file must be protected from unauthorized access.
Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon the log format and application, system and application log tools may pr...Rule Medium Severity -
The WebSphere Application Server process must not be started from the command line with the -password option.
The use of the -password option to launch a WebSphere process from the command line can result in a security exposure. Password information may become visible to any user with the ability to view s...Rule Medium Severity -
The WebSphere Application Server must remove JREs left by web server and plug-in installers for web servers and plugins running in the DMZ.
When you install IBM HTTP Server, the installer leaves behind a JRE. Remove this JRE, as it provides functions that are not needed by the Web server or plug-in under normal conditions. Keep in mind...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.