Application Security and Development Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The application must generate audit records for all direct access to the information system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000509
<GroupDescription></GroupDescription>Group -
The application must generate audit records for all account creations, modifications, disabling, and termination events.
<VulnDiscussion>When application user accounts are created, modified, disabled or terminated the event must be logged. Centralized managemen...Rule Medium Severity -
SRG-APP-000092
<GroupDescription></GroupDescription>Group -
The application must initiate session auditing upon startup.
<VulnDiscussion>If the application does not begin logging upon startup, important log events could be missed.</VulnDiscussion><False...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
The application must log application shutdown events.
<VulnDiscussion>Forensics is a large part of security incident response. Applications must provide a record of their actions so application ...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
The application must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...Rule Medium Severity -
The application must log destination IP addresses.
<VulnDiscussion>The IP addresses of the systems that the application connects to are an important aspect of identifying application network r...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
The application must log user actions involving access to data.
<VulnDiscussion>When users access application data, there is risk of data compromise or seepage if the account used to access is compromised ...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
The application must log user actions involving changes to data.
<VulnDiscussion>When users change/modify application data, there is risk of data compromise if the account used to access is compromised or a...Rule Medium Severity -
SRG-APP-000096
<GroupDescription></GroupDescription>Group -
The application must produce audit records containing information to establish when (date and time) the events occurred.
<VulnDiscussion>Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to a...Rule Medium Severity -
SRG-APP-000097
<GroupDescription></GroupDescription>Group -
The application must produce audit records containing enough information to establish which component, feature or function of the application triggered the audit event.
<VulnDiscussion>It is impossible to establish, correlate, and investigate the events relating to an incident if the details regarding the sou...Rule Medium Severity -
SRG-APP-000098
<GroupDescription></GroupDescription>Group -
SRG-APP-000375
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.