Skip to content

Application Security and Development Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The application must allow the use of a temporary password for system logons with an immediate change to a permanent password.

    <VulnDiscussion>Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The application password must not be changeable by users other than the administrator or the user with which the password is associated.

    &lt;VulnDiscussion&gt;If the application allows user A to change user B's password, user B can be locked out of the application, and user A is pro...
    Rule Medium Severity
  • SRG-APP-000400

    <GroupDescription></GroupDescription>
    Group
  • The application must terminate existing user sessions upon account deletion.

    &lt;VulnDiscussion&gt;The application must ensure that a user does not retain any rights that may have been granted or retain access to the applica...
    Rule Medium Severity
  • SRG-APP-000175

    <GroupDescription></GroupDescription>
    Group
  • The application, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

    &lt;VulnDiscussion&gt;Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...
    Rule High Severity
  • The application, when using PKI-based authentication, must enforce authorized access to the corresponding private key.

    &lt;VulnDiscussion&gt;If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...
    Rule High Severity
  • SRG-APP-000177

    <GroupDescription></GroupDescription>
    Group
  • The application must map the authenticated identity to the individual user or group account for PKI-based authentication.

    &lt;VulnDiscussion&gt;Without mapping the certificate used to authenticate to a corresponding user account, the ability to determine the identity o...
    Rule Medium Severity
  • SRG-APP-000401

    <GroupDescription></GroupDescription>
    Group
  • The application, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.

    &lt;VulnDiscussion&gt;A local cache of revocation data is also known as a CRL list. This list contains a list of revoked certificates and can be pe...
    Rule Medium Severity
  • SRG-APP-000178

    <GroupDescription></GroupDescription>
    Group
  • The application must not display passwords/PINs as clear text.

    &lt;VulnDiscussion&gt;To prevent the compromise of authentication information such as passwords during the authentication process, the feedback fro...
    Rule High Severity
  • SRG-APP-000179

    <GroupDescription></GroupDescription>
    Group
  • The application must destroy the session ID value and/or cookie on logoff or browser close.

    &lt;VulnDiscussion&gt;Many web development frameworks such as PHP, .NET, and ASP include their own mechanisms for session management. Whenever poss...
    Rule High Severity
  • The application must use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.

    &lt;VulnDiscussion&gt;A cryptographic module is a hardware or software device or component that performs cryptographic operations securely within a...
    Rule High Severity
  • SRG-APP-000180

    <GroupDescription></GroupDescription>
    Group
  • The application must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    &lt;VulnDiscussion&gt;Lack of authentication and identification enables non-organizational users to gain access to the application or possibly othe...
    Rule Medium Severity
  • SRG-APP-000402

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules