Application Security and Development Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Recovery procedures and technical system features must exist so recovery is performed in a secure and verifiable manner. The ISSO will document circumstances inhibiting a trusted recovery.
<VulnDiscussion>Without a disaster recovery plan, the application is susceptible to interruption in service due to damage within the processi...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Data backup must be performed at required intervals in accordance with DoD policy.
<VulnDiscussion>Without proper backups, the application is not protected from the loss of data or the operating environment in the event of h...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Back-up copies of the application software or source code must be stored in a fire-rated container or stored separately (offsite).
<VulnDiscussion>Application developers and application administrators must take steps to ensure continuity of development effort and operatio...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Procedures must be in place to assure the appropriate physical and technical protection of the backup and restoration of the application.
<VulnDiscussion>Protection of backup and restoration assets is essential for the successful restore of operations after a catastrophic failur...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The application must use encryption to implement key exchange and authenticate endpoints prior to establishing a communication channel for key exchange.
<VulnDiscussion>If the application does not use encryption and authenticate endpoints prior to establishing a communication channel and prior...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The application must not contain embedded authentication data.
<VulnDiscussion>Authentication data stored in code could potentially be read and used by anonymous users to gain access to a backend database...Rule High Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The application must have the capability to mark sensitive/classified output when required.
<VulnDiscussion>Failure to properly mark output could result in a disclosure of sensitive or classified data which is an immediate loss in co...Rule High Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Prior to each release of the application, updates to system, or applying patches; tests plans and procedures must be created and executed.
<VulnDiscussion>Without test plans and procedures for application releases or updates, unexpected results may occur which could lead to a den...Rule Low Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Application files must be cryptographically hashed prior to deploying to DoD operational networks.
<VulnDiscussion>When application code and binaries are transferred from one environment to another, there is the potential for malware to be ...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
At least one tester must be designated to test for security flaws in addition to functional testing.
<VulnDiscussion>If there is no person designated to test for security flaws, vulnerabilities can potentially be missed during testing. This ...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.