Skip to content

Application Security and Development Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The application must enforce password complexity by requiring that at least one upper-case character be used.

    <VulnDiscussion>Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule Medium Severity
  • SRG-APP-000167

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce password complexity by requiring that at least one lower-case character be used.

    &lt;VulnDiscussion&gt;Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule Medium Severity
  • SRG-APP-000168

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce password complexity by requiring that at least one numeric character be used.

    &lt;VulnDiscussion&gt;Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule Medium Severity
  • SRG-APP-000169

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce password complexity by requiring that at least one special character be used.

    &lt;VulnDiscussion&gt;Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule Medium Severity
  • SRG-APP-000170

    <GroupDescription></GroupDescription>
    Group
  • The application must require the change of at least 8 of the total number of characters when passwords are changed.

    &lt;VulnDiscussion&gt;Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule Medium Severity
  • SRG-APP-000171

    <GroupDescription></GroupDescription>
    Group
  • The application must only store cryptographic representations of passwords.

    &lt;VulnDiscussion&gt;Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule High Severity
  • SRG-APP-000172

    <GroupDescription></GroupDescription>
    Group
  • The application must transmit only cryptographically-protected passwords.

    &lt;VulnDiscussion&gt;Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule High Severity
  • SRG-APP-000173

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce 24 hours/1 day as the minimum password lifetime.

    &lt;VulnDiscussion&gt;Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule Medium Severity
  • SRG-APP-000174

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce a 60-day maximum password lifetime restriction.

    &lt;VulnDiscussion&gt;Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule Medium Severity
  • SRG-APP-000165

    <GroupDescription></GroupDescription>
    Group
  • The application must prohibit password reuse for a minimum of five generations.

    &lt;VulnDiscussion&gt;Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule Medium Severity
  • SRG-APP-000397

    <GroupDescription></GroupDescription>
    Group
  • The application must allow the use of a temporary password for system logons with an immediate change to a permanent password.

    &lt;VulnDiscussion&gt;Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The application password must not be changeable by users other than the administrator or the user with which the password is associated.

    &lt;VulnDiscussion&gt;If the application allows user A to change user B's password, user B can be locked out of the application, and user A is pro...
    Rule Medium Severity
  • SRG-APP-000400

    <GroupDescription></GroupDescription>
    Group
  • The application must terminate existing user sessions upon account deletion.

    &lt;VulnDiscussion&gt;The application must ensure that a user does not retain any rights that may have been granted or retain access to the applica...
    Rule Medium Severity
  • SRG-APP-000175

    <GroupDescription></GroupDescription>
    Group
  • The application, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

    &lt;VulnDiscussion&gt;Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...
    Rule High Severity
  • The application, when using PKI-based authentication, must enforce authorized access to the corresponding private key.

    &lt;VulnDiscussion&gt;If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...
    Rule High Severity
  • SRG-APP-000177

    <GroupDescription></GroupDescription>
    Group
  • The application must map the authenticated identity to the individual user or group account for PKI-based authentication.

    &lt;VulnDiscussion&gt;Without mapping the certificate used to authenticate to a corresponding user account, the ability to determine the identity o...
    Rule Medium Severity
  • SRG-APP-000401

    <GroupDescription></GroupDescription>
    Group
  • The application, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.

    &lt;VulnDiscussion&gt;A local cache of revocation data is also known as a CRL list. This list contains a list of revoked certificates and can be pe...
    Rule Medium Severity
  • SRG-APP-000178

    <GroupDescription></GroupDescription>
    Group
  • The application must not display passwords/PINs as clear text.

    &lt;VulnDiscussion&gt;To prevent the compromise of authentication information such as passwords during the authentication process, the feedback fro...
    Rule High Severity
  • SRG-APP-000179

    <GroupDescription></GroupDescription>
    Group
  • The application must destroy the session ID value and/or cookie on logoff or browser close.

    &lt;VulnDiscussion&gt;Many web development frameworks such as PHP, .NET, and ASP include their own mechanisms for session management. Whenever poss...
    Rule High Severity
  • The application must use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.

    &lt;VulnDiscussion&gt;A cryptographic module is a hardware or software device or component that performs cryptographic operations securely within a...
    Rule High Severity
  • SRG-APP-000180

    <GroupDescription></GroupDescription>
    Group
  • The application must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    &lt;VulnDiscussion&gt;Lack of authentication and identification enables non-organizational users to gain access to the application or possibly othe...
    Rule Medium Severity
  • SRG-APP-000402

    <GroupDescription></GroupDescription>
    Group
  • The application must accept Personal Identity Verification (PIV) credentials from other federal agencies.

    &lt;VulnDiscussion&gt;Access may be denied to authorized users if federal agency PIV credentials are not accepted. Personal Identity Verification ...
    Rule Medium Severity
  • SRG-APP-000403

    <GroupDescription></GroupDescription>
    Group
  • The application must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies.

    &lt;VulnDiscussion&gt;Inappropriate access may be granted to unauthorized users if federal agency PIV credentials are not electronically verified. ...
    Rule Medium Severity
  • SRG-APP-000404

    <GroupDescription></GroupDescription>
    Group
  • The application must accept FICAM-approved third-party credentials.

    &lt;VulnDiscussion&gt;FICAM establishes a federated identity framework for the Federal Government. FICAM provides Government-wide services for comm...
    Rule Medium Severity
  • SRG-APP-000405

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000223

    <GroupDescription></GroupDescription>
    Group
  • The application must conform to FICAM-issued profiles.

    &lt;VulnDiscussion&gt;FICAM establishes a federated identity framework for the Federal Government. FICAM provides Government-wide services for comm...
    Rule Medium Severity
  • SRG-APP-000409

    <GroupDescription></GroupDescription>
    Group
  • Applications used for non-local maintenance sessions must audit non-local maintenance and diagnostic sessions for organization-defined auditable events.

    &lt;VulnDiscussion&gt;Non-local maintenance and diagnostic activities are those activities conducted by individuals communicating through a network...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules