Skip to content

Central Log Server Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000154

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to use multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.

    &lt;VulnDiscussion&gt;Using an authentication device, such as a DOD common access card (CAC) or token separate from the information system, ensures...
    Rule Medium Severity
  • SRG-APP-000156

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.

    &lt;VulnDiscussion&gt;A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...
    Rule Medium Severity
  • SRG-APP-000163

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity.

    &lt;VulnDiscussion&gt;Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can p...
    Rule Medium Severity
  • SRG-APP-000164

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...
    Rule Medium Severity
  • SRG-APP-000166

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to enforce password complexity by requiring that at least one uppercase character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Low Severity
  • SRG-APP-000167

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to enforce password complexity by requiring that at least one lowercase character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Low Severity
  • SRG-APP-000168

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to enforce password complexity by requiring that at least one numeric character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Low Severity
  • SRG-APP-000169

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to enforce password complexity by requiring that at least one special character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Low Severity
  • SRG-APP-000170

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to require the change of at least eight of the total number of characters when passwords are changed.

    &lt;VulnDiscussion&gt;If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of pass...
    Rule Low Severity
  • SRG-APP-000171

    <GroupDescription></GroupDescription>
    Group
  • For accounts using password authentication, the Central Log Server must be configured to store only cryptographic representations of passwords.

    &lt;VulnDiscussion&gt;Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules