Skip to content

ISEC7 Sphere Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000630

    <GroupDescription></GroupDescription>
    Group
  • The ISEC7 EMM Suite must use a FIPS-validated cryptographic module to provision digital signatures.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule Medium Severity
  • SRG-APP-000635

    <GroupDescription></GroupDescription>
    Group
  • The ISEC7 EMM Suite must use a FIPS 140-2-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality, generate cryptographic hashes, and to configure web management tools with FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.

    &lt;VulnDiscussion&gt;FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data withi...
    Rule Medium Severity
  • SRG-APP-000171

    <GroupDescription></GroupDescription>
    Group
  • The Apache Tomcat Manager Web app password must be cryptographically hashed with a DoD approved algorithm.

    &lt;VulnDiscussion&gt;The Apache Tomcat Manager Web app password is stored in plain text in CATALINA_HOME/conf/tomcat-users.xml and should be encry...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • All Web applications included with Apache Tomcat that are not required must be removed.

    &lt;VulnDiscussion&gt;Removal of unneeded or non-secure functions, ports, protocols, and services mitigate the risk of unauthorized connection of d...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • LockOutRealm must not be removed from Apache Tomcat.

    &lt;VulnDiscussion&gt;LockOutRealm prevents brute force attacks against user passwords. Removal of unneeded or non-secure functions, ports, protoco...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules