Application Server Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000149
<GroupDescription></GroupDescription>Group -
SRG-APP-000225
<GroupDescription></GroupDescription>Group -
SRG-APP-000001
<GroupDescription></GroupDescription>Group -
SRG-APP-000068
<GroupDescription></GroupDescription>Group -
The application server management interface must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
<VulnDiscussion>Application servers are required to display the Standard Mandatory DoD Notice and Consent Banner before granting access to th...Rule Medium Severity -
SRG-APP-000069
<GroupDescription></GroupDescription>Group -
The application server management interface must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
<VulnDiscussion>To establish acceptance of system usage policy, a click-through banner at the application server management interface logon i...Rule Medium Severity -
SRG-APP-000080
<GroupDescription></GroupDescription>Group -
The application server must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.
<VulnDiscussion>Application management includes the ability to control the number of sessions that utilize an application by all accounts and...Rule Medium Severity -
SRG-APP-000014
<GroupDescription></GroupDescription>Group -
The application server must use encryption strength in accordance with the categorization of the management data during remote access management sessions.
<VulnDiscussion>Remote management access is accomplished by leveraging common communication protocols and establishing a remote connection to...Rule Medium Severity -
SRG-APP-000015
<GroupDescription></GroupDescription>Group -
The application server must implement cryptography mechanisms to protect the integrity of the remote access session.
<VulnDiscussion>Encryption is critical for protection of remote access sessions. If encryption is not being used for integrity, malicious use...Rule Medium Severity -
SRG-APP-000016
<GroupDescription></GroupDescription>Group -
The application server must ensure remote sessions for accessing security functions and security-relevant information are logged.
<VulnDiscussion>Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed f...Rule Medium Severity -
SRG-APP-000033
<GroupDescription></GroupDescription>Group -
The application server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
<VulnDiscussion>Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policie...Rule Medium Severity -
The application server must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
<VulnDiscussion>Non-repudiation of actions taken is required in order to maintain application integrity. Examples of particular actions taken...Rule Medium Severity -
SRG-APP-000086
<GroupDescription></GroupDescription>Group -
For application servers providing log record aggregation, the application server must compile log records from organization-defined information system components into a system-wide log trail that is time-correlated with an organization-defined level of tolerance for the relationship between time stamps of individual records in the log trail.
<VulnDiscussion>Log generation and log records can be generated from various components within the application server. The list of logged eve...Rule Medium Severity -
SRG-APP-000089
<GroupDescription></GroupDescription>Group -
The application server must generate log records for access and authentication events.
<VulnDiscussion>Log records can be generated from various components within the application server. From an application server perspective, ...Rule Medium Severity -
SRG-APP-000090
<GroupDescription></GroupDescription>Group -
The application server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which logable events are to be logged.
<VulnDiscussion>Log records can be generated from various components within the application server, (e.g., httpd, beans, etc.) From an applic...Rule Medium Severity -
SRG-APP-000091
<GroupDescription></GroupDescription>Group -
The application server must generate log records when successful/unsuccessful attempts to access subject privileges occur.
<VulnDiscussion>Accessing a subject's privileges can be used to elevate a lower-privileged subject's privileges temporarily in order to cause...Rule Medium Severity -
SRG-APP-000092
<GroupDescription></GroupDescription>Group -
The application server must initiate session logging upon startup.
<VulnDiscussion>Session logging activities are developed, integrated, and used in consultation with legal counsel in accordance with applicab...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
The application server must produce log records containing information to establish what type of events occurred.
<VulnDiscussion>Information system logging capability is critical for accurate forensic analysis. Without being able to establish what type ...Rule Medium Severity -
SRG-APP-000096
<GroupDescription></GroupDescription>Group -
The application server must produce log records containing sufficient information to establish when (date and time) the events occurred.
<VulnDiscussion>Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate informatio...Rule Medium Severity -
SRG-APP-000097
<GroupDescription></GroupDescription>Group -
The application server must produce log records containing sufficient information to establish where the events occurred.
<VulnDiscussion>Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information...Rule Medium Severity -
SRG-APP-000098
<GroupDescription></GroupDescription>Group -
The application server must produce log records containing sufficient information to establish the sources of the events.
<VulnDiscussion>Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate informatio...Rule Medium Severity -
SRG-APP-000099
<GroupDescription></GroupDescription>Group -
The application server must produce log records that contain sufficient information to establish the outcome of events.
<VulnDiscussion>Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to...Rule Medium Severity -
SRG-APP-000100
<GroupDescription></GroupDescription>Group -
The application server must generate log records containing information that establishes the identity of any individual or process associated with the event.
<VulnDiscussion>Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to...Rule Medium Severity -
SRG-APP-000101
<GroupDescription></GroupDescription>Group -
The application server must generate log records containing the full-text recording of privileged commands or the individual identities of group account users.
<VulnDiscussion>Privileged commands are commands that change the configuration or data of the application server. Since this type of command...Rule Medium Severity -
SRG-APP-000108
<GroupDescription></GroupDescription>Group -
The application server must alert the SA and ISSO, at a minimum, in the event of a log processing failure.
<VulnDiscussion>Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a sec...Rule Medium Severity -
SRG-APP-000109
<GroupDescription></GroupDescription>Group -
The application server must shut down by default upon log failure (unless availability is an overriding concern).
<VulnDiscussion>It is critical that, when a system is at risk of failing to process logs, it detects and takes action to mitigate the failure...Rule Medium Severity -
SRG-APP-000109
<GroupDescription></GroupDescription>Group -
The application server must be configured to fail over to another system in the event of log subsystem failure.
<VulnDiscussion>This requirement is dependent upon system MAC and availability. If the system MAC and availability do not specify redundancy...Rule Medium Severity -
SRG-APP-000116
<GroupDescription></GroupDescription>Group -
The application server must use internal system clocks to generate time stamps for log records.
<VulnDiscussion>Without the use of an approved and synchronized time source configured on the systems, events cannot be accurately correlated...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.