Application Security and Development Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The application must generate audit records when successful/unsuccessful accesses to objects occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000508
<GroupDescription></GroupDescription>Group -
The application must generate audit records for all direct access to the information system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000509
<GroupDescription></GroupDescription>Group -
The application must generate audit records for all account creations, modifications, disabling, and termination events.
<VulnDiscussion>When application user accounts are created, modified, disabled or terminated the event must be logged. Centralized managemen...Rule Medium Severity -
SRG-APP-000092
<GroupDescription></GroupDescription>Group -
The application must log application shutdown events.
<VulnDiscussion>Forensics is a large part of security incident response. Applications must provide a record of their actions so application ...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
The application must log destination IP addresses.
<VulnDiscussion>The IP addresses of the systems that the application connects to are an important aspect of identifying application network r...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
The application must log user actions involving access to data.
<VulnDiscussion>When users access application data, there is risk of data compromise or seepage if the account used to access is compromised ...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
The application must log user actions involving changes to data.
<VulnDiscussion>When users change/modify application data, there is risk of data compromise if the account used to access is compromised or a...Rule Medium Severity -
SRG-APP-000096
<GroupDescription></GroupDescription>Group -
The application must produce audit records containing information to establish when (date and time) the events occurred.
<VulnDiscussion>Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to a...Rule Medium Severity -
SRG-APP-000097
<GroupDescription></GroupDescription>Group -
The application must produce audit records containing enough information to establish which component, feature or function of the application triggered the audit event.
<VulnDiscussion>It is impossible to establish, correlate, and investigate the events relating to an incident if the details regarding the sou...Rule Medium Severity -
SRG-APP-000098
<GroupDescription></GroupDescription>Group -
When using centralized logging; the application must include a unique identifier in order to distinguish itself from other application logs.
<VulnDiscussion>Without establishing the source, it is impossible to establish, correlate, and investigate the events leading up to an outage...Rule Medium Severity -
SRG-APP-000099
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.