Skip to content

Application Security and Development Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000125

    <GroupDescription></GroupDescription>
    Group
  • The application must back up audit records at least every seven days onto a different system or system component than the system or component being audited.

    &lt;VulnDiscussion&gt;Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up audit records to a differen...
    Rule Medium Severity
  • SRG-APP-000126

    <GroupDescription></GroupDescription>
    Group
  • The application must use cryptographic mechanisms to protect the integrity of audit information.

    &lt;VulnDiscussion&gt;Audit records may be tampered with; if the integrity of audit data were to become compromised, then forensic analysis and dis...
    Rule Medium Severity
  • SRG-APP-000290

    <GroupDescription></GroupDescription>
    Group
  • Application audit tools must be cryptographically hashed.

    &lt;VulnDiscussion&gt;Protecting the integrity of the tools used for auditing purposes is a critical step to ensuring the integrity of audit data. ...
    Rule Medium Severity
  • SRG-APP-000290

    <GroupDescription></GroupDescription>
    Group
  • The integrity of the audit tools must be validated by checking the files for changes in the cryptographic hash value.

    &lt;VulnDiscussion&gt;Protecting the integrity of the tools used for auditing purposes is a critical step to ensuring the integrity of audit data. ...
    Rule Medium Severity
  • The application must prohibit user installation of software without explicit privileged status.

    &lt;VulnDiscussion&gt;Allowing regular users to install software without explicit privileges creates the risk that untested or potentially maliciou...
    Rule Medium Severity
  • SRG-APP-000380

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce access restrictions associated with changes to application configuration.

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to application configuration may have significant effe...
    Rule Medium Severity
  • SRG-APP-000381

    <GroupDescription></GroupDescription>
    Group
  • The application must audit who makes configuration changes to the application.

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficul...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • The application must have the capability to prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the application. Verifying softwar...
    Rule Medium Severity
  • SRG-APP-000133

    <GroupDescription></GroupDescription>
    Group
  • The applications must limit privileges to change the software resident within software libraries.

    &lt;VulnDiscussion&gt;If the application were to allow any user to make changes to software libraries, then those changes might be implemented with...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • An application vulnerability assessment must be conducted.

    &lt;VulnDiscussion&gt;An application vulnerability assessment is a test conducted in order to identify weaknesses and security vulnerabilities that...
    Rule Medium Severity
  • SRG-APP-000384

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules