Microsoft InfoPath 2013 STIG
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Disabling email forms from the Internet Security Zone must be configured.
InfoPath email forms can be designed by an external attacker and sent over the Internet as part of a phishing attempt. Users might fill out such forms and provide sensitive information to the attac...Rule Medium Severity -
DTOO171 - EMail forms in Restricted Security
Group -
DTOO159 - Fully trusted solutions access
Group -
Disabling of Fully Trusted Solutions access to computers must be configured.
InfoPath users can choose whether to allow trusted forms to run on their computers. The Full Trust security level allows a form to access local system resources, such as COM components or files on ...Rule Medium Severity -
DTOO158 - Solutions from the Internet Zone
Group -
Disabling the opening of solutions from the Internet Security Zone must be configured.
Attackers could use InfoPath solutions published to Internet Web sites to try to obtain sensitive information from users. By default, users can open InfoPath solutions that do not contain managed c...Rule Medium Severity -
DTOO168 - Sending templates with email form
Group -
DTOO170 - 2003 forms as email
Group -
InfoPath 2003 forms as email forms in InfoPath 2013 must be disallowed.
An attacker might target InfoPath 2003 forms to try and compromise an organization's security. InfoPath 2003 did not write a published location for email forms, which means forms could open without...Rule Medium Severity -
DTOO164 - Beaconing UI / forms opening
Group -
DTOO165 - Beaconing UI /forms opened Activex
Group -
Beaconing of UI forms with ActiveX controls must be enforced.
InfoPath makes it possible to host InfoPath forms in other applications as ActiveX controls. Such controls are known as InfoPath form controls. A malicious user could insert a web beacon into one o...Rule Medium Severity -
DTOO156 - Offline Mode Cache
Group -
Offline Mode capability to cache queries for offline mode must be configured.
InfoPath can function in online mode or offline mode. It can also cache queries for use in offline mode. If offline mode is used and cached queries are enabled, sensitive information contained in t...Rule Medium Severity -
DTOO160 - Unsafe File Attachments in InfoPath
Group -
DTOO127 - Add-ins are signed by Trusted Publisher
Group -
Add-ins to Office applications must be signed by a Trusted Publisher.
Office 2013 applications do not check the digital signature on application add-ins before opening them. Disabling or not configuring this setting may allow an application to load a dangerous add-i...Rule Medium Severity -
DTOO294 - E-mail forms from the Intranet
Group -
InfoPath must be enforced to not use email forms from the Intranet security zone.
InfoPath email forms can be designed by an internal attacker and sent over the local intranet, and users might fill out such forms and provide sensitive information to the attacker. By default, for...Rule Medium Severity -
DTOO295 - InfoPath e-mail forms in Outlook
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.