Skip to content

Application Server Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The application server must control remote access methods.

    <VulnDiscussion>Application servers provide remote access capability and must be able to enforce remote access policy requirements or work in...
    Rule Medium Severity
  • SRG-APP-000316

    <GroupDescription></GroupDescription>
    Group
  • The application server must provide the capability to immediately disconnect or disable remote access to the management interface.

    &lt;VulnDiscussion&gt;Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking progress would n...
    Rule Medium Severity
  • SRG-APP-000340

    <GroupDescription></GroupDescription>
    Group
  • The application server must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    &lt;VulnDiscussion&gt;Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or proce...
    Rule Medium Severity
  • The application server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.

    &lt;VulnDiscussion&gt;In order to be able to provide a forensic history of activity, the application server must ensure users who are granted a pri...
    Rule Medium Severity
  • SRG-APP-000356

    <GroupDescription></GroupDescription>
    Group
  • The application server must provide centralized management and configuration of the content to be captured in log records generated by all application components.

    &lt;VulnDiscussion&gt;A clustered application server is made up of several servers working together to provide the user a failover and increased co...
    Rule Medium Severity
  • SRG-APP-000357

    <GroupDescription></GroupDescription>
    Group
  • The application server must allocate log record storage capacity in accordance with organization-defined log record storage requirements.

    &lt;VulnDiscussion&gt;The proper management of log records not only dictates proper archiving processes and procedures be established, it also requ...
    Rule Medium Severity
  • SRG-APP-000358

    <GroupDescription></GroupDescription>
    Group
  • The application server must off-load log records onto a different system or media from the system being logged.

    &lt;VulnDiscussion&gt;Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to...
    Rule Medium Severity
  • SRG-APP-000359

    <GroupDescription></GroupDescription>
    Group
  • The application server must provide an immediate warning to the SA and ISSO, at a minimum, when allocated log record storage volume reaches 75% of maximum log record storage capacity.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log ...
    Rule Medium Severity
  • SRG-APP-000360

    <GroupDescription></GroupDescription>
    Group
  • The application server must provide an immediate real-time alert to authorized users of all log failure events requiring real-time alerts.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log ...
    Rule Medium Severity
  • SRG-APP-000371

    <GroupDescription></GroupDescription>
    Group
  • The application server must compare internal application server clocks at least every 24 hours with an authoritative time source.

    &lt;VulnDiscussion&gt;Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysi...
    Rule Medium Severity
  • SRG-APP-000372

    <GroupDescription></GroupDescription>
    Group
  • The application server must synchronize internal application server clocks to an authoritative time source when the time difference is greater than the organization-defined time period.

    &lt;VulnDiscussion&gt;Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysi...
    Rule Medium Severity
  • SRG-APP-000374

    <GroupDescription></GroupDescription>
    Group
  • The application server must record time stamps for log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).

    &lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...
    Rule Medium Severity
  • SRG-APP-000375

    <GroupDescription></GroupDescription>
    Group
  • The application server must record time stamps for log records that meet a granularity of one second for a minimum degree of precision.

    &lt;VulnDiscussion&gt;To investigate an incident, the log records should be easily put into chronological order. Without sufficient granularity of...
    Rule Medium Severity
  • SRG-APP-000380

    <GroupDescription></GroupDescription>
    Group
  • The application server must enforce access restrictions associated with changes to application server configuration.

    &lt;VulnDiscussion&gt;When dealing with access restrictions pertaining to change control, it should be noted that any changes to the software, and/...
    Rule Medium Severity
  • SRG-APP-000381

    <GroupDescription></GroupDescription>
    Group
  • The application server must log the enforcement actions used to restrict access associated with changes to the application server.

    &lt;VulnDiscussion&gt;Without logging the enforcement of access restrictions against changes to the application server configuration, it will be di...
    Rule Medium Severity
  • SRG-APP-000389

    <GroupDescription></GroupDescription>
    Group
  • The application server must require users to re-authenticate when organization-defined circumstances or situations require re-authentication.

    &lt;VulnDiscussion&gt;Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When applic...
    Rule Medium Severity
  • SRG-APP-000390

    <GroupDescription></GroupDescription>
    Group
  • The application server must require devices to re-authenticate when organization-defined circumstances or situations require re-authentication.

    &lt;VulnDiscussion&gt;Without re-authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity...
    Rule Medium Severity
  • SRG-APP-000391

    <GroupDescription></GroupDescription>
    Group
  • The application server must accept Personal Identity Verification (PIV) credentials to access the management interface.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. PIV credentials are only...
    Rule High Severity
  • SRG-APP-000392

    <GroupDescription></GroupDescription>
    Group
  • The application server must electronically verify Personal Identity Verification (PIV) credentials for access to the management interface.

    &lt;VulnDiscussion&gt;The use of Personal Identity Verification (PIV) credentials facilitates standardization and reduces the risk of unauthorized ...
    Rule High Severity
  • SRG-APP-000400

    <GroupDescription></GroupDescription>
    Group
  • The application server must prohibit the use of cached authenticators after an organization-defined time period.

    &lt;VulnDiscussion&gt;When the application server is using PKI authentication, a local revocation cache must be stored for instances when the revoc...
    Rule Medium Severity
  • SRG-APP-000401

    <GroupDescription></GroupDescription>
    Group
  • The application server, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.

    &lt;VulnDiscussion&gt;The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptogra...
    Rule Medium Severity
  • SRG-APP-000402

    <GroupDescription></GroupDescription>
    Group
  • The application server must accept Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface.

    &lt;VulnDiscussion&gt;Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Public...
    Rule Medium Severity
  • SRG-APP-000403

    <GroupDescription></GroupDescription>
    Group
  • The application server must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface.

    &lt;VulnDiscussion&gt;Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Public...
    Rule Medium Severity
  • SRG-APP-000404

    <GroupDescription></GroupDescription>
    Group
  • The application server must accept FICAM-approved third-party credentials.

    &lt;VulnDiscussion&gt;Access may be denied to legitimate users if FICAM-approved third-party credentials are not accepted. This requirement typica...
    Rule Medium Severity
  • SRG-APP-000405

    <GroupDescription></GroupDescription>
    Group
  • The application server must conform to FICAM-issued profiles.

    &lt;VulnDiscussion&gt;Without conforming to FICAM-issued profiles, the information system may not be interoperable with FICAM-authentication protoc...
    Rule Medium Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • The application server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.

    &lt;VulnDiscussion&gt;Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules