Skip to content

Application Security and Development Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The ISSO must ensure an account management process is implemented, verifying only authorized users can gain access to the application, and individual accounts designated as inactive, suspended, or terminated are promptly removed.

    &lt;VulnDiscussion&gt;A comprehensive account management process will ensure that only authorized users can gain access to applications and that in...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Application web servers must be on a separate network segment from the application and database servers if it is a tiered application operating in the DoD DMZ.

    &lt;VulnDiscussion&gt;A tiered application usually consists of 3 tiers, the web layer (presentation tier), the application layer (application logic...
    Rule High Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The ISSO must ensure application audit trails are retained for at least 1 year for applications without SAMI data, and 5 years for applications including SAMI data.

    &lt;VulnDiscussion&gt;Log files are a requirement to trace intruder activity or to audit user activity.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The ISSO must review audit trails periodically based on system documentation recommendations or immediately upon system security events.

    &lt;VulnDiscussion&gt;Without access control the data is not secure. It can be compromised, misused, or changed by unauthorized access at any time....
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The ISSO must report all suspected violations of IA policies in accordance with DoD information system IA procedures.

    &lt;VulnDiscussion&gt;Violations of IA policies must be reviewed and reported. If there are no policies regarding the reporting of IA violations, I...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The ISSO must ensure active vulnerability testing is performed.

    &lt;VulnDiscussion&gt;Use of automated scanning tools accompanied with manual testing/validation which confirms or expands on the automated test re...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Execution flow diagrams and design documents must be created to show how deadlock and recursion issues in web services are being mitigated.

    &lt;VulnDiscussion&gt;In order to understand data flows within web services, the process flow of data must be developed and documented. There are ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The designer must ensure the application does not store configuration and control files in the same directory as user data.

    &lt;VulnDiscussion&gt;Application configuration settings and user data are required to be stored in separate locations in order to prevent applicat...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The ISSO must ensure if a DoD STIG or NSA guide is not available, a third-party product will be configured by following available guidance.

    &lt;VulnDiscussion&gt;Not all COTS products are covered by a STIG. Those products not covered by a STIG, should follow commercially accepted best p...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • New IP addresses, data services, and associated ports used by the application must be submitted to the appropriate approving authority for the organization, which in turn will be submitted through the DoD Ports, Protocols, and Services Management (DoD PPSM)

    &lt;VulnDiscussion&gt;Failure to comply with DoD Ports, Protocols, and Services (PPS) Vulnerability Analysis and associated PPS mitigations may res...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules