Application Security and Development Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000447
<GroupDescription></GroupDescription>Group -
The application must not be subject to input handling vulnerabilities.
<VulnDiscussion>A common application vulnerability is unpredictable behavior due to improper input validation. This requirement guards agains...Rule High Severity -
SRG-APP-000266
<GroupDescription></GroupDescription>Group -
SRG-APP-000472
<GroupDescription></GroupDescription>Group -
The application must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-APP-000267
<GroupDescription></GroupDescription>Group -
The application must reveal error messages only to the ISSO, ISSM, or SA.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-APP-000450
<GroupDescription></GroupDescription>Group -
The application must not be vulnerable to overflow attacks.
<VulnDiscussion>A buffer overflow occurs when a program exceeds the amount of data allocated to a buffer. The buffer is a sequential section ...Rule High Severity -
SRG-APP-000454
<GroupDescription></GroupDescription>Group -
The application must remove organization-defined software components after updated versions have been installed.
<VulnDiscussion>Previous versions of software components that are not removed from the information system after updates have been installed m...Rule Medium Severity -
SRG-APP-000456
<GroupDescription></GroupDescription>Group -
Security-relevant software updates and patches must be kept up to date.
<VulnDiscussion>Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products t...Rule Medium Severity -
The application performing organization-defined security functions must verify correct operation of security functions.
<VulnDiscussion>Without verification, security functions may not operate correctly and this failure may go unnoticed. Security function is d...Rule Medium Severity -
SRG-APP-000473
<GroupDescription></GroupDescription>Group -
The application must perform verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days.
<VulnDiscussion>Without verification, security functions may not operate correctly and this failure may go unnoticed. Security function is d...Rule Medium Severity -
SRG-APP-000275
<GroupDescription></GroupDescription>Group -
The application must notify the ISSO and ISSM of failed security verification tests.
<VulnDiscussion>If personnel are not notified of failed security verification tests, they will not be able to take corrective action and the ...Rule Low Severity -
SRG-APP-000206
<GroupDescription></GroupDescription>Group -
Unsigned Category 1A mobile code must not be used in the application in accordance with DoD policy.
<VulnDiscussion>Use of un-trusted Level 1A mobile code technologies can introduce security vulnerabilities and malicious code into the client...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.