Skip to content

Application Security and Development Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000429

    <GroupDescription></GroupDescription>
    Group
  • The application must use appropriate cryptography in order to protect stored DoD information when required by the information owner or DoD policy.

    &lt;VulnDiscussion&gt;Applications handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized ...
    Rule Medium Severity
  • SRG-APP-000233

    <GroupDescription></GroupDescription>
    Group
  • The application must isolate security functions from non-security functions.

    &lt;VulnDiscussion&gt;An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform...
    Rule Medium Severity
  • SRG-APP-000431

    <GroupDescription></GroupDescription>
    Group
  • The application must maintain a separate execution domain for each executing process.

    &lt;VulnDiscussion&gt;Applications can maintain separate execution domains for each executing process by assigning each process a separate address ...
    Rule Medium Severity
  • SRG-APP-000243

    <GroupDescription></GroupDescription>
    Group
  • Applications must prevent unauthorized and unintended information transfer via shared system resources.

    &lt;VulnDiscussion&gt;Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...
    Rule Medium Severity
  • SRG-APP-000435

    <GroupDescription></GroupDescription>
    Group
  • XML-based applications must mitigate DoS attacks by using XML filters, parser options, or gateways.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-APP-000246

    <GroupDescription></GroupDescription>
    Group
  • The application must restrict the ability to launch Denial of Service (DoS) attacks against itself or other information systems.

    &lt;VulnDiscussion&gt;Denial of Service (DoS) is a condition where a resource is not available for legitimate users. When this occurs, the organiza...
    Rule Medium Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • The web service design must include redundancy mechanisms when used with high-availability systems.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-APP-000439

    <GroupDescription></GroupDescription>
    Group
  • The application must not store sensitive information in hidden fields.

    &lt;VulnDiscussion&gt;Hidden fields allow developers to process application data without having to display it on the screen. Using hidden fields t...
    Rule High Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must protect the confidentiality and integrity of transmitted information.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...
    Rule High Severity
  • SRG-APP-000440

    <GroupDescription></GroupDescription>
    Group
  • The application must implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).

    &lt;VulnDiscussion&gt;Data is subject to manipulation and other integrity related attacks whenever that data is transferred across a network. To pr...
    Rule Medium Severity
  • SRG-APP-000441

    <GroupDescription></GroupDescription>
    Group
  • The application must maintain the confidentiality and integrity of information during preparation for transmission.

    &lt;VulnDiscussion&gt;Data is subject to manipulation and other integrity related attacks whenever that data is transferred across a network. To pr...
    Rule Medium Severity
  • SRG-APP-000442

    <GroupDescription></GroupDescription>
    Group
  • The application must maintain the confidentiality and integrity of information during reception.

    &lt;VulnDiscussion&gt;Data is subject to manipulation and other integrity related attacks whenever that data is transferred across a network. To pr...
    Rule Medium Severity
  • SRG-APP-000441

    <GroupDescription></GroupDescription>
    Group
  • The application must not disclose unnecessary information to users.

    &lt;VulnDiscussion&gt;Applications should not disclose information not required for the transaction. (e.g., a web application should not divulge th...
    Rule Medium Severity
  • SRG-APP-000441

    <GroupDescription></GroupDescription>
    Group
  • The application must protect from Cross-Site Scripting (XSS) vulnerabilities.

    &lt;VulnDiscussion&gt;XSS attacks are essentially code injection attacks against the various language interpreters contained within the browser. XS...
    Rule High Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must protect from Cross-Site Request Forgery (CSRF) vulnerabilities.

    &lt;VulnDiscussion&gt;Cross-Site Request Forgery (CSRF) is an attack where a website user is forced to execute an unwanted action on a website that...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must protect from command injection.

    &lt;VulnDiscussion&gt;A command injection attack is an attack on a vulnerable application where improperly validated input is passed to a command s...
    Rule High Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must protect from canonical representation vulnerabilities.

    &lt;VulnDiscussion&gt;Canonical representation vulnerabilities can occur when a data conversion process does not convert the data to its simplest f...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must validate all input.

    &lt;VulnDiscussion&gt;Checking the valid syntax and semantics of information system inputs (e.g., character set, length, numerical range, and accep...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must not be vulnerable to SQL Injection.

    &lt;VulnDiscussion&gt;SQL Injection is a code injection attack against database applications. Malicious SQL statements are inserted into an applica...
    Rule High Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must not be vulnerable to XML-oriented attacks.

    &lt;VulnDiscussion&gt;Extensible Markup Language (XML) is widely employed in web technology and applications like web services (SOAP, REST, and WSD...
    Rule High Severity
  • SRG-APP-000447

    <GroupDescription></GroupDescription>
    Group
  • The application must not be subject to input handling vulnerabilities.

    &lt;VulnDiscussion&gt;A common application vulnerability is unpredictable behavior due to improper input validation. This requirement guards agains...
    Rule High Severity
  • SRG-APP-000266

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000472

    <GroupDescription></GroupDescription>
    Group
  • The application must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-APP-000267

    <GroupDescription></GroupDescription>
    Group
  • The application must reveal error messages only to the ISSO, ISSM, or SA.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-APP-000450

    <GroupDescription></GroupDescription>
    Group
  • The application must not be vulnerable to overflow attacks.

    &lt;VulnDiscussion&gt;A buffer overflow occurs when a program exceeds the amount of data allocated to a buffer. The buffer is a sequential section ...
    Rule High Severity
  • SRG-APP-000454

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules