Skip to content

Application Security and Development Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The application must allow the use of a temporary password for system logons with an immediate change to a permanent password.

    <VulnDiscussion>Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The application password must not be changeable by users other than the administrator or the user with which the password is associated.

    &lt;VulnDiscussion&gt;If the application allows user A to change user B's password, user B can be locked out of the application, and user A is pro...
    Rule Medium Severity
  • SRG-APP-000400

    <GroupDescription></GroupDescription>
    Group
  • The application must terminate existing user sessions upon account deletion.

    &lt;VulnDiscussion&gt;The application must ensure that a user does not retain any rights that may have been granted or retain access to the applica...
    Rule Medium Severity
  • SRG-APP-000175

    <GroupDescription></GroupDescription>
    Group
  • The application, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

    &lt;VulnDiscussion&gt;Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...
    Rule High Severity
  • The application, when using PKI-based authentication, must enforce authorized access to the corresponding private key.

    &lt;VulnDiscussion&gt;If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...
    Rule High Severity
  • SRG-APP-000177

    <GroupDescription></GroupDescription>
    Group
  • The application must map the authenticated identity to the individual user or group account for PKI-based authentication.

    &lt;VulnDiscussion&gt;Without mapping the certificate used to authenticate to a corresponding user account, the ability to determine the identity o...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules