Application Server Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000118
<GroupDescription></GroupDescription>Group -
The application server must protect log information from any type of unauthorized read access.
<VulnDiscussion>If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially mali...Rule Medium Severity -
SRG-APP-000119
<GroupDescription></GroupDescription>Group -
The application server must protect log information from unauthorized modification.
<VulnDiscussion>If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially mali...Rule Medium Severity -
SRG-APP-000120
<GroupDescription></GroupDescription>Group -
The application server must protect log information from unauthorized deletion.
<VulnDiscussion>If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially mali...Rule Medium Severity -
SRG-APP-000121
<GroupDescription></GroupDescription>Group -
The application server must protect log tools from unauthorized access.
<VulnDiscussion>Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon...Rule Medium Severity -
SRG-APP-000122
<GroupDescription></GroupDescription>Group -
The application server must protect log tools from unauthorized modification.
<VulnDiscussion>Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon...Rule Medium Severity -
SRG-APP-000123
<GroupDescription></GroupDescription>Group -
The application server must protect log tools from unauthorized deletion.
<VulnDiscussion>Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon...Rule Medium Severity -
SRG-APP-000125
<GroupDescription></GroupDescription>Group -
The application server must back up log records at least every seven days onto a different system or system component than the system or component being logged.
<VulnDiscussion>Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up log records to a different ...Rule Medium Severity -
SRG-APP-000126
<GroupDescription></GroupDescription>Group -
The application server must use cryptographic mechanisms to protect the integrity of log information.
<VulnDiscussion>Protecting the integrity of log records helps to ensure log files are not tampered with. Cryptographic mechanisms are the ind...Rule Medium Severity -
SRG-APP-000131
<GroupDescription></GroupDescription>Group -
The application server must use an enterprise user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users).
<VulnDiscussion>To assure accountability and prevent unauthorized access, application server users must be uniquely identified and authentica...Rule Medium Severity -
The application server must prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate recognized and approved by the organization.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the application. Verifying softwar...Rule Medium Severity -
SRG-APP-000133
<GroupDescription></GroupDescription>Group -
The application server must limit privileges to change the software resident within software libraries.
<VulnDiscussion>Application servers have the ability to specify that the hosted applications utilize shared libraries. The application server...Rule Medium Severity -
SRG-APP-000133
<GroupDescription></GroupDescription>Group -
The application server must be capable of reverting to the last known good configuration in the event of failed installations and upgrades.
<VulnDiscussion>Any changes to the components of the application server can have significant effects on the overall security of the system. ...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The application server must adhere to the principles of least functionality by providing only essential capabilities.
<VulnDiscussion>Application servers provide a myriad of differing processes, features and functionalities. Some of these processes may be dee...Rule Medium Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group -
The application server must prohibit or restrict the use of nonsecure ports, protocols, modules, and/or services as defined in the PPSM CAL and vulnerability assessments.
<VulnDiscussion>Some networking protocols may not meet organizational security requirements to protect data and components. Application serv...Rule Medium Severity -
SRG-APP-000148
<GroupDescription></GroupDescription>Group -
The application server must use multifactor authentication for network access to privileged accounts.
<VulnDiscussion>Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the app...Rule High Severity -
SRG-APP-000151
<GroupDescription></GroupDescription>Group -
The application server must use multifactor authentication for local access to privileged accounts.
<VulnDiscussion>Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the app...Rule High Severity -
SRG-APP-000153
<GroupDescription></GroupDescription>Group -
The application server must authenticate users individually prior to using a group authenticator.
<VulnDiscussion>To ensure individual accountability and prevent unauthorized access, application server users (and any processes acting on be...Rule Medium Severity -
SRG-APP-000156
<GroupDescription></GroupDescription>Group -
The application server must provide security extensions to extend the SOAP protocol and provide secure authentication when accessing sensitive data.
<VulnDiscussion>Application servers may provide a web services capability that could be leveraged to allow remote access to sensitive applica...Rule Medium Severity -
SRG-APP-000163
<GroupDescription></GroupDescription>Group -
The application server must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
<VulnDiscussion>Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can p...Rule Medium Severity -
SRG-APP-000171
<GroupDescription></GroupDescription>Group -
SRG-APP-000211
<GroupDescription></GroupDescription>Group -
The application server must for password-based authentication, store passwords using an approved salted key derivation function, preferably using a keyed hash.
<VulnDiscussion>Applications must enforce password encryption when storing passwords. Passwords need to be protected at all times and encrypt...Rule Medium Severity -
SRG-APP-000172
<GroupDescription></GroupDescription>Group -
The application server must transmit only encrypted representations of passwords.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmissi...Rule Medium Severity -
SRG-APP-000172
<GroupDescription></GroupDescription>Group -
The application server must utilize encryption when using LDAP for authentication.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmissi...Rule Medium Severity -
SRG-APP-000175
<GroupDescription></GroupDescription>Group -
The application server must perform RFC 5280-compliant certification path validation.
<VulnDiscussion>A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
Only authenticated system administrators or the designated PKI Sponsor for the application server must have access to the web servers private key.
<VulnDiscussion>The cornerstone of the PKI is the private key used to encrypt or digitally sign information. If the private key is stolen, ...Rule Medium Severity -
SRG-APP-000177
<GroupDescription></GroupDescription>Group -
The application server must separate hosted application functionality from application server management functionality.
<VulnDiscussion>The application server consists of the management interface and hosted applications. By separating the management interface ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.