Skip to content

IBM WebSphere Traditional V9.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000014-AS-000009

    Group
  • SRG-APP-000121-AS-000081

    Group
  • SRG-APP-000001-AS-000001

    Group
  • The WebSphere Application Server security auditing must be enabled.

    Security auditing will not be performed unless the audit security subsystem has been enabled. Global security must be enabled for the security audit subsystem to function, as no security auditing o...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    Group
  • SRG-APP-000014-AS-000009

    Group
  • SRG-APP-000295-AS-000263

    Group
  • The WebSphere Application Server admin console session timeout must be configured.

    An attacker can take advantage of user sessions that are left open, thus bypassing the user authentication process. To thwart the vulnerability of open and unused user sessions, the application se...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    Group
  • The WebSphere Application Server automatic repository checkpoints must be enabled to track configuration changes.

    Without enabling repository checkpoints, you will not be able to determine the history of changes to WebSphere configuration files, and who made those changes.
    Rule Medium Severity
  • SRG-APP-000315-AS-000094

    Group
  • SRG-APP-000315-AS-000095

    Group
  • The WebSphere Application Server bus security must be enabled.

    A service integration bus is a group of one or more application servers or server clusters in a WebSphere® Application Server cell that cooperate to provide asynchronous messaging services. The app...
    Rule High Severity
  • SRG-APP-000016-AS-000013

    Group
  • SRG-APP-000016-AS-000013

    Group
  • The WebSphere Application Server users in the WebSphere auditor role must be configured in accordance with the System Security Plan.

    Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident. Remote access by adm...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    Group
  • SRG-APP-000016-AS-000013

    Group
  • The WebSphere Application Server audit service provider must be enabled.

    Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident. Remote access by adm...
    Rule Medium Severity
  • SRG-APP-000315-AS-000094

    Group
  • The WebSphere Application Server users in a local user registry group must be authorized for that group.

    Application servers provide remote access capability and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requiremen...
    Rule Medium Severity
  • SRG-APP-000014-AS-000009

    Group
  • The WebSphere Application Server Single Sign On (SSO) must have SSL enabled for Web and SIP Security.

    Remote management access is accomplished by leveraging common communication protocols and establishing a remote connection to the application server via a network for the purposes of managing the a...
    Rule High Severity
  • SRG-APP-000015-AS-000010

    Group
  • The WebSphere Application Server security cookies must be set to HTTPOnly.

    Web applications use cookies to track users across requests. These cookies, while typically not sensitive in themselves, connect you to your existing state on the back end system. If an intruder we...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    Group
  • The WebSphere Application Server Java 2 security must be enabled.

    Java 2 security provides a policy-based fine grained access control mechanism that increases overall system integrity by checking for permissions before allowing access to certain protected system ...
    Rule High Severity
  • SRG-APP-000033-AS-000024

    Group
  • The WebSphere Application Server Java 2 security must not be bypassed.

    WebSphere provides a passive filter mechanism that will allow administrators to set Java 2 security in the admin console as enabled while still allowing applications to access host resources. This ...
    Rule High Severity
  • SRG-APP-000033-AS-000024

    Group
  • SRG-APP-000033-AS-000024

    Group
  • The WebSphere Application Server LDAP groups must be authorized for the WebSphere role.

    Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement...
    Rule Medium Severity
  • SRG-APP-000340-AS-000185

    Group
  • The WebSphere Application Server users in a LDAP user registry group must be authorized for that group.

    Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Restrict...
    Rule Medium Severity
  • SRG-APP-000068-AS-000035

    Group
  • The WebSphere Application Server management interface must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.

    Application servers are required to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system management interface, providing privacy and security notices co...
    Rule Medium Severity
  • SRG-APP-000069-AS-000036

    Group
  • The WebSphere Application Server management interface must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.

    To establish acceptance of system usage policy, a click-through banner at the application server management interface logon is required. The banner shall prevent further activity on the application...
    Rule Medium Severity
  • SRG-APP-000091-AS-000052

    Group
  • The WebSphere Application Server must generate log records when successful/unsuccessful attempts to access subject privileges occur.

    Accessing a subject's privileges can be used to elevate a lower-privileged subject's privileges temporarily in order to cause harm to the application server or to gain privileges to operate tempora...
    Rule Low Severity
  • SRG-APP-000357-AS-000038

    Group
  • SRG-APP-000357-AS-000038

    Group
  • The WebSphere Application Server must allocate audit log record storage capacity in accordance with organization-defined log record storage requirements.

    The proper management of log records not only dictates proper archiving processes and procedures be established, it also requires allocating enough storage space to maintain the logs online for a d...
    Rule Medium Severity
  • SRG-APP-000360-AS-000066

    Group
  • The WebSphere Application Server must provide an immediate real-time alert to authorized users of all log failure events requiring real-time alerts.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures include software/hardware errors, failures in the log...
    Rule Medium Severity
  • SRG-APP-000108-AS-000067

    Group
  • The WebSphere Application Server must alert the SA and ISSO, at a minimum, in the event of a log processing failure.

    Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a security incident. When log processing fails, the events during the failure...
    Rule Low Severity
  • SRG-APP-000108-AS-000067

    Group
  • The WebSphere Application Server must be configured to sign log information.

    Protection of log records is of critical importance. Encrypting log records provides a level of protection that does not rely on host-based protections that can be accidentally misconfigured, such ...
    Rule Medium Severity
  • SRG-APP-000109-AS-000068

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules