Application Security and Development Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The application must automatically disable accounts after a 35 day period of account inactivity.
<VulnDiscussion>Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an applicatio...Rule Low Severity -
SRG-APP-000025
<GroupDescription></GroupDescription>Group -
Unnecessary application accounts must be disabled, or deleted.
<VulnDiscussion>Test or demonstration accounts are sometimes created during the application installation process. This creates a security ris...Rule Medium Severity -
SRG-APP-000026
<GroupDescription></GroupDescription>Group -
The application must automatically audit account creation.
<VulnDiscussion>Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-esta...Rule Medium Severity -
SRG-APP-000027
<GroupDescription></GroupDescription>Group -
The application must automatically audit account modification.
<VulnDiscussion>One way for an attacker to establish persistent access is for the attacker to modify or copy an existing account. Auditing of...Rule Medium Severity -
SRG-APP-000028
<GroupDescription></GroupDescription>Group -
The application must automatically audit account disabling actions.
<VulnDiscussion>When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual appl...Rule Medium Severity -
SRG-APP-000029
<GroupDescription></GroupDescription>Group -
The application must automatically audit account removal actions.
<VulnDiscussion>When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying individual appli...Rule Medium Severity -
SRG-APP-000291
<GroupDescription></GroupDescription>Group -
The application must notify System Administrators and Information System Security Officers when accounts are created.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...Rule Low Severity -
SRG-APP-000292
<GroupDescription></GroupDescription>Group -
The application must notify System Administrators and Information System Security Officers when accounts are modified.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...Rule Low Severity -
SRG-APP-000293
<GroupDescription></GroupDescription>Group -
The application must notify System Administrators and Information System Security Officers of account disabling actions.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...Rule Low Severity -
SRG-APP-000294
<GroupDescription></GroupDescription>Group -
The application must notify System Administrators and Information System Security Officers of account removal actions.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...Rule Low Severity -
SRG-APP-000319
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.