Central Log Server Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The Central Log Server must disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity.
<VulnDiscussion>Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can p...Rule Medium Severity -
SRG-APP-000164
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to enforce a minimum 15-character password length.
<VulnDiscussion>The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...Rule Medium Severity -
SRG-APP-000165
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to prohibit password reuse for a minimum of five generations.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Low Severity -
SRG-APP-000166
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to enforce password complexity by requiring that at least one upper-case character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Low Severity -
SRG-APP-000167
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to enforce password complexity by requiring that at least one lower-case character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Low Severity -
SRG-APP-000168
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to enforce password complexity by requiring that at least one special character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Low Severity -
SRG-APP-000170
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to require the change of at least 8 of the total number of characters when passwords are changed.
<VulnDiscussion>If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of pass...Rule Low Severity -
SRG-APP-000171
<GroupDescription></GroupDescription>Group -
For accounts using password authentication, the Central Log Server must be configured to store only cryptographic representations of passwords.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule High Severity -
SRG-APP-000172
<GroupDescription></GroupDescription>Group -
For accounts using password authentication, the Central Log Server must use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule High Severity -
SRG-APP-000173
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to enforce 24 hours/1 day as the minimum password lifetime.
<VulnDiscussion>Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforce...Rule Low Severity -
SRG-APP-000174
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.