Application Security and Development Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
When using centralized logging; the application must include a unique identifier in order to distinguish itself from other application logs.
<VulnDiscussion>Without establishing the source, it is impossible to establish, correlate, and investigate the events leading up to an outage...Rule Medium Severity -
SRG-APP-000099
<GroupDescription></GroupDescription>Group -
The application must produce audit records that contain information to establish the outcome of the events.
<VulnDiscussion>Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attac...Rule Medium Severity -
SRG-APP-000100
<GroupDescription></GroupDescription>Group -
The application must generate audit records containing information that establishes the identity of any individual or process associated with the event.
<VulnDiscussion>Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associ...Rule Medium Severity -
SRG-APP-000101
<GroupDescription></GroupDescription>Group -
The application must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
<VulnDiscussion>Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. Or...Rule Medium Severity -
SRG-APP-000101
<GroupDescription></GroupDescription>Group -
The application must implement transaction recovery logs when transaction based.
<VulnDiscussion>Without required logging and access control, security issues related to data changes will not be identified. This could lead ...Rule Medium Severity -
SRG-APP-000356
<GroupDescription></GroupDescription>Group -
The application must provide centralized management and configuration of the content to be captured in audit records generated by all application components.
<VulnDiscussion>Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...Rule Medium Severity -
SRG-APP-000358
<GroupDescription></GroupDescription>Group -
The application must off-load audit records onto a different system or media than the system being audited.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. In addition, attackers ...Rule Medium Severity -
SRG-APP-000515
<GroupDescription></GroupDescription>Group -
The application must be configured to write application logs to a centralized log repository.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. In addition, attackers ...Rule Medium Severity -
SRG-APP-000359
<GroupDescription></GroupDescription>Group -
The application must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
<VulnDiscussion>If security personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for ...Rule Medium Severity -
SRG-APP-000360
<GroupDescription></GroupDescription>Group -
The application must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.
<VulnDiscussion>Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records....Rule Medium Severity -
SRG-APP-000118
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.