Microsoft InfoPath 2013 STIG
Rules, Groups, and Values defined within the XCCDF Benchmark
-
DTOO133-Disable all trusted locations
<GroupDescription></GroupDescription>Group -
All automatic loading from Trusted Locations must be disabled.
<VulnDiscussion>Trusted locations specified in the Trust Center are used to define file locations assumed to be safe. Content, code, and add-...Rule Medium Severity -
DTOO157 - SharePoint Services Gradual Upgrade
<GroupDescription></GroupDescription>Group -
Redirection behavior for upgraded web sites by SharePoint must be blocked.
<VulnDiscussion>InfoPath automatically redirects user requests for sites that have not been upgraded to the temporary URL if it is located on...Rule Medium Severity -
DTOO167 - Forms Opening behavior - EMail /w code
<GroupDescription></GroupDescription>Group -
Opening behavior for Email forms containing code or scripts must be controlled.
<VulnDiscussion>InfoPath notifies and prompts users before opening InfoPath email forms that contain code or script. If this restriction is r...Rule Medium Severity -
DTOO176 - Email forms beaconing UI
<GroupDescription></GroupDescription>Group -
Email with InfoPath forms must be configured to show UI to recipients.
<VulnDiscussion>Malicious users could send InfoPath email forms with embedded web beacons that can be used to track when recipients open the ...Rule Medium Severity -
DTOO169 - Disable dynamic caching / form template
<GroupDescription></GroupDescription>Group -
Disable dynamic caching of the form template in InfoPath eMail forms.
<VulnDiscussion>By default, InfoPath 2007 caches form templates when they are attached to a mail item that is recognized as an InfoPath e-mai...Rule Medium Severity -
DTOO173 - E-Mail forms from Full Trust Zone
<GroupDescription></GroupDescription>Group -
Disabling of email forms from the Full Trust Security Zone must be configured.
<VulnDiscussion>InfoPath provides three security levels for form templates: Restricted, Domain, and Full Trust. The security levels determine...Rule Medium Severity -
DTOO172 - EMail forms from Internet Zone
<GroupDescription></GroupDescription>Group -
Disabling email forms from the Internet Security Zone must be configured.
<VulnDiscussion>InfoPath email forms can be designed by an external attacker and sent over the Internet as part of a phishing attempt. Users ...Rule Medium Severity -
DTOO171 - EMail forms in Restricted Security
<GroupDescription></GroupDescription>Group -
Disabling email forms running in Restricted Security Level must be configured.
<VulnDiscussion>InfoPath forms running with the restricted security level, can only access data stored on the forms. However, a malicious use...Rule Medium Severity -
DTOO159 - Fully trusted solutions access
<GroupDescription></GroupDescription>Group -
Disabling of Fully Trusted Solutions access to computers must be configured.
<VulnDiscussion>InfoPath users can choose whether to allow trusted forms to run on their computers. The Full Trust security level allows a fo...Rule Medium Severity -
DTOO158 - Solutions from the Internet Zone
<GroupDescription></GroupDescription>Group -
Disabling the opening of solutions from the Internet Security Zone must be configured.
<VulnDiscussion>Attackers could use InfoPath solutions published to Internet Web sites to try to obtain sensitive information from users. By ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.