Mainframe Product Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000514
<GroupDescription></GroupDescription>Group -
The Mainframe Product must implement NIST FIPS-validated cryptography to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application mu...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The Mainframe Product must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
<VulnDiscussion>Configuring the application to implement organization-wide security implementation guides and security checklists ensures com...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The Mainframe Product must provide the capability for authorized users to select a user session to capture/record or view/hear.
<VulnDiscussion>Without the capability to select a user session to capture/record or view/hear, investigations into suspicious or harmful eve...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The Mainframe Product must provide the capability for authorized users to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored.
<VulnDiscussion>Without the capability to remotely view/hear all content related to a user session, investigations into suspicious user activ...Rule Medium Severity -
SRG-APP-000416
<GroupDescription></GroupDescription>Group -
The Mainframe Product must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application mu...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.