Skip to content

Application Security and Development Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The application must ensure if a OneTimeUse element is used in an assertion, there is only one of the same used in the Conditions element portion of an assertion.

    <VulnDiscussion>Multiple <OneTimeUse> elements used in a SAML assertion can lead to elevation of privileges, if the application does no...
    Rule Medium Severity
  • SRG-APP-000014

    <GroupDescription></GroupDescription>
    Group
  • The application must provide automated mechanisms for supporting account management functions.

    &lt;VulnDiscussion&gt;Enterprise environments make application account management challenging and complex. A manual process for account management ...
    Rule Medium Severity
  • SRG-APP-000317

    <GroupDescription></GroupDescription>
    Group
  • Shared/group account credentials must be terminated when members leave the group.

    &lt;VulnDiscussion&gt;If shared/group account credentials are not terminated when individuals leave the group, the user that left the group can sti...
    Rule Medium Severity
  • SRG-APP-000024

    <GroupDescription></GroupDescription>
    Group
  • The application must automatically remove or disable temporary user accounts 72 hours after account creation.

    &lt;VulnDiscussion&gt;If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The application must have a process, feature or function that prevents removal or disabling of emergency accounts.

    &lt;VulnDiscussion&gt;Emergency accounts are administrator accounts which are established in response to crisis situations where the need for rapid...
    Rule Low Severity
  • SRG-APP-000025

    <GroupDescription></GroupDescription>
    Group
  • The application must automatically disable accounts after a 35 day period of account inactivity.

    &lt;VulnDiscussion&gt;Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an applicatio...
    Rule Low Severity
  • SRG-APP-000025

    <GroupDescription></GroupDescription>
    Group
  • Unnecessary application accounts must be disabled, or deleted.

    &lt;VulnDiscussion&gt;Test or demonstration accounts are sometimes created during the application installation process. This creates a security ris...
    Rule Medium Severity
  • SRG-APP-000026

    <GroupDescription></GroupDescription>
    Group
  • The application must automatically audit account creation.

    &lt;VulnDiscussion&gt;Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-esta...
    Rule Medium Severity
  • SRG-APP-000027

    <GroupDescription></GroupDescription>
    Group
  • The application must automatically audit account modification.

    &lt;VulnDiscussion&gt;One way for an attacker to establish persistent access is for the attacker to modify or copy an existing account. Auditing of...
    Rule Medium Severity
  • SRG-APP-000028

    <GroupDescription></GroupDescription>
    Group
  • The application must automatically audit account disabling actions.

    &lt;VulnDiscussion&gt;When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual appl...
    Rule Medium Severity
  • SRG-APP-000029

    <GroupDescription></GroupDescription>
    Group
  • The application must automatically audit account removal actions.

    &lt;VulnDiscussion&gt;When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying individual appli...
    Rule Medium Severity
  • SRG-APP-000291

    <GroupDescription></GroupDescription>
    Group
  • The application must notify System Administrators and Information System Security Officers when accounts are created.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Low Severity
  • SRG-APP-000292

    <GroupDescription></GroupDescription>
    Group
  • The application must notify System Administrators and Information System Security Officers when accounts are modified.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Low Severity
  • SRG-APP-000293

    <GroupDescription></GroupDescription>
    Group
  • The application must notify System Administrators and Information System Security Officers of account disabling actions.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Low Severity
  • SRG-APP-000294

    <GroupDescription></GroupDescription>
    Group
  • The application must notify System Administrators and Information System Security Officers of account removal actions.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Low Severity
  • SRG-APP-000319

    <GroupDescription></GroupDescription>
    Group
  • The application must automatically audit account enabling actions.

    &lt;VulnDiscussion&gt;When application accounts are enabled, user accessibility is affected. Accounts are utilized for identifying individual appli...
    Rule Medium Severity
  • SRG-APP-000320

    <GroupDescription></GroupDescription>
    Group
  • The application must notify System Administrators and Information System Security Officers of account enabling actions.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Low Severity
  • SRG-APP-000323

    <GroupDescription></GroupDescription>
    Group
  • Application data protection requirements must be identified and documented.

    &lt;VulnDiscussion&gt;Failure to protect organizational information from data mining may result in a compromise of information. In order to assign ...
    Rule Medium Severity
  • SRG-APP-000324

    <GroupDescription></GroupDescription>
    Group
  • The application must utilize organization-defined data mining detection techniques for organization-defined data storage objects to adequately detect data mining attempts.

    &lt;VulnDiscussion&gt;Failure to protect organizational information from data mining may result in a compromise of information. Data mining occurs...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

    &lt;VulnDiscussion&gt;To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...
    Rule High Severity
  • SRG-APP-000328

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce organization-defined discretionary access control policies over defined subjects and objects.

    &lt;VulnDiscussion&gt;Discretionary Access Control allows users to determine who is allowed to access their data. To mitigate the risk of unauthori...
    Rule Medium Severity
  • SRG-APP-000038

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce approved authorizations for controlling the flow of information within the system based on organization-defined information flow control policies.

    &lt;VulnDiscussion&gt;A mechanism to detect and prevent unauthorized communication flow must be configured or provided as part of the system design...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce approved authorizations for controlling the flow of information between interconnected systems based on organization-defined information flow control policies.

    &lt;VulnDiscussion&gt;A mechanism to detect and prevent unauthorized communication flow must be configured or provided as part of the system design...
    Rule Medium Severity
  • SRG-APP-000340

    <GroupDescription></GroupDescription>
    Group
  • The application must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    &lt;VulnDiscussion&gt;Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or proce...
    Rule Medium Severity
  • SRG-APP-000342

    <GroupDescription></GroupDescription>
    Group
  • The application must execute without excessive account permissions.

    &lt;VulnDiscussion&gt;Applications are often designed to utilize a user account. The account represents a means to control application permissions...
    Rule High Severity
  • SRG-APP-000343

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules