Application Security and Development Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The application must not be vulnerable to SQL Injection.
<VulnDiscussion>SQL Injection is a code injection attack against database applications. Malicious SQL statements are inserted into an applica...Rule High Severity -
SRG-APP-000251
<GroupDescription></GroupDescription>Group -
The application must not be vulnerable to XML-oriented attacks.
<VulnDiscussion>Extensible Markup Language (XML) is widely employed in web technology and applications like web services (SOAP, REST, and WSD...Rule High Severity -
SRG-APP-000447
<GroupDescription></GroupDescription>Group -
The application must not be subject to input handling vulnerabilities.
<VulnDiscussion>A common application vulnerability is unpredictable behavior due to improper input validation. This requirement guards agains...Rule High Severity -
SRG-APP-000266
<GroupDescription></GroupDescription>Group -
The application must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-APP-000267
<GroupDescription></GroupDescription>Group -
The application must reveal error messages only to the ISSO, ISSM, or SA.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-APP-000450
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.