Skip to content

Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000112

    Group
  • Adobe Reader DC must prevent opening files other than PDF or FDF.

    Attachments represent a potential security risk because they can contain malicious content, open other dangerous files, or launch applications. Certainly file types such as .bin, .exe, .bat, and so...
    Rule Medium Severity
  • SRG-APP-000112

    Group
  • Adobe Reader DC must block Flash Content.

    Flash content is commonly hosted on a web page, but it can also be embedded in PDF and other documents. Flash could be used to surreptitious install malware on the end-users computer. Flash Conten...
    Rule Medium Severity
  • SRG-APP-000133

    Group
  • SRG-APP-000141

    Group
  • Adobe Reader DC must disable all service access to Document Cloud Services.

    By default, Adobe online services are tightly integrated in Adobe Reader DC. With the integration of Adobe Document Cloud, disabling this feature prevents the risk of additional attack vectors. Wi...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • Adobe Reader DC must disable Cloud Synchronization.

    By default, Adobe online services are tightly integrated in Adobe Reader DC. When the Adobe Cloud synchronization is disabled it prevents the synchronization of desktop preferences across devices o...
    Rule Medium Severity
  • SRG-APP-000141

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules