Application Security and Development Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Messages protected with WS_Security must use time stamps with creation and expiration times.
<VulnDiscussion>The lack of time stamps could lead to the eventual replay of the message, leaving the application susceptible to replay event...Rule High Severity -
SRG-APP-000014
<GroupDescription></GroupDescription>Group -
The application must ensure each unique asserting party provides unique assertion ID references for each SAML assertion.
<VulnDiscussion>SAML is a standard for exchanging authentication and authorization data between security domains. SAML uses security tokens c...Rule Medium Severity -
SRG-APP-000014
<GroupDescription></GroupDescription>Group -
The application must ensure encrypted assertions, or equivalent confidentiality protections are used when assertion data is passed through an intermediary, and confidentiality of the assertion data is required when passing through the intermediary.
<VulnDiscussion>SAML is a standard for exchanging authentication and authorization data between security domains. SAML uses security tokens ...Rule Medium Severity -
SRG-APP-000014
<GroupDescription></GroupDescription>Group -
The application must use the NotOnOrAfter condition when using the SubjectConfirmation element in a SAML assertion.
<VulnDiscussion>SAML is a standard for exchanging authentication and authorization data between security domains. SAML uses security tokens ...Rule High Severity -
SRG-APP-000014
<GroupDescription></GroupDescription>Group -
The application must use both the NotBefore and NotOnOrAfter elements or OneTimeUse element when using the Conditions element in a SAML assertion.
<VulnDiscussion>SAML is a standard for exchanging authentication and authorization data between security domains. SAML uses security tokens ...Rule High Severity -
SRG-APP-000014
<GroupDescription></GroupDescription>Group -
The application must ensure if a OneTimeUse element is used in an assertion, there is only one of the same used in the Conditions element portion of an assertion.
<VulnDiscussion>Multiple <OneTimeUse> elements used in a SAML assertion can lead to elevation of privileges, if the application does no...Rule Medium Severity -
SRG-APP-000014
<GroupDescription></GroupDescription>Group -
The application must provide automated mechanisms for supporting account management functions.
<VulnDiscussion>Enterprise environments make application account management challenging and complex. A manual process for account management ...Rule Medium Severity -
SRG-APP-000317
<GroupDescription></GroupDescription>Group -
Shared/group account credentials must be terminated when members leave the group.
<VulnDiscussion>If shared/group account credentials are not terminated when individuals leave the group, the user that left the group can sti...Rule Medium Severity -
SRG-APP-000024
<GroupDescription></GroupDescription>Group -
The application must automatically remove or disable temporary user accounts 72 hours after account creation.
<VulnDiscussion>If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The application must have a process, feature or function that prevents removal or disabling of emergency accounts.
<VulnDiscussion>Emergency accounts are administrator accounts which are established in response to crisis situations where the need for rapid...Rule Low Severity -
SRG-APP-000025
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.