Skip to content

Application Security and Development Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • An Application Configuration Guide must be created and included with the application.

    <VulnDiscussion>The Application Configuration Guide is any document or collection of documents used to configure the application. These docu...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The application development team must provide an application incident response plan.

    &lt;VulnDiscussion&gt;An application incident response process is managed by the development team and should include a method for individuals to su...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • All products must be supported by the vendor or the development team.

    &lt;VulnDiscussion&gt;Unsupported commercial and government developed software products should not be used because fixes to newly identified bugs w...
    Rule High Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The application must be decommissioned when maintenance or support is no longer available.

    &lt;VulnDiscussion&gt;Unsupported software products should not be used because fixes to newly identified bugs will not be implemented by the vendor...
    Rule High Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Procedures must be in place to notify users when an application is decommissioned.

    &lt;VulnDiscussion&gt;When maintenance no longer exists for an application, there are no individuals responsible for making security updates. The a...
    Rule Low Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Unnecessary built-in application accounts must be disabled.

    &lt;VulnDiscussion&gt;Default passwords and properties of built-in accounts are often publicly available. Anyone with necessary knowledge, internal...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Default passwords must be changed.

    &lt;VulnDiscussion&gt;Default passwords can easily be compromised by attackers allowing immediate access to the applications.&lt;/VulnDiscussion&gt...
    Rule High Severity
  • The designer must ensure uncategorized or emerging mobile code is not used in applications.

    &lt;VulnDiscussion&gt;By definition, mobile code is software obtained from remote systems outside the enclave boundary, transferred across a networ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Production database exports must have database administration credentials and sensitive data removed before releasing the export.

    &lt;VulnDiscussion&gt;Production database exports are often used to populate development databases. Test and development environments do not typica...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Protections against DoS attacks must be implemented.

    &lt;VulnDiscussion&gt;Known DoS threats documented in the threat model should be mitigated, to prevent DoS type attacks.&lt;/VulnDiscussion&gt;&lt;...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The system must alert an administrator when low resource conditions are encountered.

    &lt;VulnDiscussion&gt;In order to prevent DoS type attacks, applications should be monitored when resource conditions reach a predefined threshold....
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules