Application Security and Development Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000428
<GroupDescription></GroupDescription>Group -
The application must implement approved cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components.
<VulnDiscussion>Applications handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized ...Rule Medium Severity -
SRG-APP-000429
<GroupDescription></GroupDescription>Group -
The application must use appropriate cryptography in order to protect stored DoD information when required by the information owner or DoD policy.
<VulnDiscussion>Applications handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized ...Rule Medium Severity -
SRG-APP-000233
<GroupDescription></GroupDescription>Group -
The application must isolate security functions from non-security functions.
<VulnDiscussion>An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform...Rule Medium Severity -
SRG-APP-000431
<GroupDescription></GroupDescription>Group -
The application must maintain a separate execution domain for each executing process.
<VulnDiscussion>Applications can maintain separate execution domains for each executing process by assigning each process a separate address ...Rule Medium Severity -
SRG-APP-000243
<GroupDescription></GroupDescription>Group -
The application must protect the confidentiality and integrity of transmitted information.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...Rule High Severity -
SRG-APP-000440
<GroupDescription></GroupDescription>Group -
Applications must prevent unauthorized and unintended information transfer via shared system resources.
<VulnDiscussion>Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...Rule Medium Severity -
SRG-APP-000435
<GroupDescription></GroupDescription>Group -
XML-based applications must mitigate DoS attacks by using XML filters, parser options, or gateways.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-APP-000246
<GroupDescription></GroupDescription>Group -
The application must restrict the ability to launch Denial of Service (DoS) attacks against itself or other information systems.
<VulnDiscussion>Denial of Service (DoS) is a condition where a resource is not available for legitimate users. When this occurs, the organiza...Rule Medium Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
The web service design must include redundancy mechanisms when used with high-availability systems.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-APP-000439
<GroupDescription></GroupDescription>Group -
SRG-APP-000472
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.