Skip to content

Application Server Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • The application server must map the authenticated identity to the individual user or group account for PKI-based authentication.

    &lt;VulnDiscussion&gt;The cornerstone of PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic...
    Rule Medium Severity
  • SRG-APP-000178

    <GroupDescription></GroupDescription>
    Group
  • The application server must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

    &lt;VulnDiscussion&gt;To prevent the compromise of authentication information during the authentication process, the application server authenticat...
    Rule Medium Severity
  • SRG-APP-000179

    <GroupDescription></GroupDescription>
    Group
  • The application server must utilize FIPS 140-2 approved encryption modules when authenticating users and processes.

    &lt;VulnDiscussion&gt;Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified...
    Rule High Severity
  • SRG-APP-000181

    <GroupDescription></GroupDescription>
    Group
  • The application server must provide a log reduction capability that supports on-demand reporting requirements.

    &lt;VulnDiscussion&gt;The ability to generate on-demand reports, including after the log data has been subjected to log reduction, greatly facilita...
    Rule Medium Severity
  • SRG-APP-000206

    <GroupDescription></GroupDescription>
    Group
  • The application server must identify prohibited mobile code.

    &lt;VulnDiscussion&gt;Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded an...
    Rule Medium Severity
  • The application server must be configured to mutually authenticate connecting proxies, application servers or gateways.

    &lt;VulnDiscussion&gt;Application architecture may sometimes require a configuration where an application server is placed behind a web proxy, an a...
    Rule Medium Severity
  • SRG-APP-000220

    <GroupDescription></GroupDescription>
    Group
  • The application server must invalidate session identifiers upon user logout or other session termination.

    &lt;VulnDiscussion&gt;If communications sessions remain open for extended periods of time even when unused, there is the potential for an adversary...
    Rule Medium Severity
  • SRG-APP-000223

    <GroupDescription></GroupDescription>
    Group
  • The application server must generate a unique session identifier for each session.

    &lt;VulnDiscussion&gt;Unique session IDs are the opposite of sequentially generated session IDs, which can be easily guessed by an attacker. Unique...
    Rule Medium Severity
  • SRG-APP-000223

    <GroupDescription></GroupDescription>
    Group
  • The application server must recognize only system-generated session identifiers.

    &lt;VulnDiscussion&gt;This requirement focuses on communications protection at the application session, versus network packet level. The intent of ...
    Rule Medium Severity
  • SRG-APP-000224

    <GroupDescription></GroupDescription>
    Group
  • The application server must generate a unique session identifier using a FIPS 140-2 approved random number generator.

    &lt;VulnDiscussion&gt;The application server will use session IDs to communicate between modules or applications within the application server and ...
    Rule High Severity
  • The application server must be configured to perform complete application deployments.

    &lt;VulnDiscussion&gt;Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules