Skip to content

Application Security and Development Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The application must implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).

    <VulnDiscussion>Data is subject to manipulation and other integrity related attacks whenever that data is transferred across a network. To pr...
    Rule Medium Severity
  • SRG-APP-000441

    <GroupDescription></GroupDescription>
    Group
  • The application must maintain the confidentiality and integrity of information during preparation for transmission.

    &lt;VulnDiscussion&gt;Data is subject to manipulation and other integrity related attacks whenever that data is transferred across a network. To pr...
    Rule Medium Severity
  • SRG-APP-000442

    <GroupDescription></GroupDescription>
    Group
  • The application must maintain the confidentiality and integrity of information during reception.

    &lt;VulnDiscussion&gt;Data is subject to manipulation and other integrity related attacks whenever that data is transferred across a network. To pr...
    Rule Medium Severity
  • SRG-APP-000441

    <GroupDescription></GroupDescription>
    Group
  • The application must not disclose unnecessary information to users.

    &lt;VulnDiscussion&gt;Applications should not disclose information not required for the transaction. (e.g., a web application should not divulge th...
    Rule Medium Severity
  • SRG-APP-000441

    <GroupDescription></GroupDescription>
    Group
  • The application must not store sensitive information in hidden fields.

    &lt;VulnDiscussion&gt;Hidden fields allow developers to process application data without having to display it on the screen. Using hidden fields t...
    Rule High Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must protect from Cross-Site Scripting (XSS) vulnerabilities.

    &lt;VulnDiscussion&gt;XSS attacks are essentially code injection attacks against the various language interpreters contained within the browser. XS...
    Rule High Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must protect from Cross-Site Request Forgery (CSRF) vulnerabilities.

    &lt;VulnDiscussion&gt;Cross-Site Request Forgery (CSRF) is an attack where a website user is forced to execute an unwanted action on a website that...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must protect from command injection.

    &lt;VulnDiscussion&gt;A command injection attack is an attack on a vulnerable application where improperly validated input is passed to a command s...
    Rule High Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must protect from canonical representation vulnerabilities.

    &lt;VulnDiscussion&gt;Canonical representation vulnerabilities can occur when a data conversion process does not convert the data to its simplest f...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must validate all input.

    &lt;VulnDiscussion&gt;Checking the valid syntax and semantics of information system inputs (e.g., character set, length, numerical range, and accep...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules