HPE 3PAR SSMC Web Server Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000142-WSR-000089
<GroupDescription></GroupDescription>Group -
SRG-APP-000092-WSR-000055
<GroupDescription></GroupDescription>Group -
SSMC web server must initiate session logging upon start up.
<VulnDiscussion>An attacker can compromise a web server during the startup process. If logging is not initiated until all the web server proc...Rule Medium Severity -
SRG-APP-000001-WSR-000001
<GroupDescription></GroupDescription>Group -
SSMC web server must limit the number of allowed simultaneous session requests.
<VulnDiscussion>Web server management includes the ability to control the number of users and user sessions that utilize a web server. Limiti...Rule Medium Severity -
SRG-APP-000014-WSR-000006
<GroupDescription></GroupDescription>Group -
SSMC web server must use encryption strength in accordance with the categorization of data hosted by the web server when remote connections are provided.
<VulnDiscussion>The SSMC web server has several remote communications channels. Examples are user requests via http/https, communication to a...Rule High Severity -
SRG-APP-000015-WSR-000014
<GroupDescription></GroupDescription>Group -
SSMC web server must use cryptography to protect the integrity of remote sessions.
<VulnDiscussion>Data exchanged between the user and the web server can range from static display data to credentials used to Log on to the ho...Rule High Severity -
SRG-APP-000016-WSR-000005
<GroupDescription></GroupDescription>Group -
SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
<VulnDiscussion>Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Rem...Rule Medium Severity -
SRG-APP-000016-WSR-000005
<GroupDescription></GroupDescription>Group -
SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
<VulnDiscussion>Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Rem...Rule Medium Severity -
SRG-APP-000016-WSR-000005
<GroupDescription></GroupDescription>Group -
SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
<VulnDiscussion>Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Rem...Rule Medium Severity -
The SSMC web server must be configured to use a specified IP address and port.
<VulnDiscussion>The web server must be configured to listen on a specified IP address and port. Without specifying an IP address and port for...Rule Medium Severity -
SRG-APP-000175-WSR-000095
<GroupDescription></GroupDescription>Group -
The SSMC web server must perform RFC 5280-compliant certification path validation.
<VulnDiscussion>A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...Rule Medium Severity -
SRG-APP-000295-WSR-000012
<GroupDescription></GroupDescription>Group -
SSMC web server must set an absolute timeout for sessions.
<VulnDiscussion>Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to a...Rule Medium Severity -
SRG-APP-000295-WSR-000134
<GroupDescription></GroupDescription>Group -
SSMC web server must set an inactive timeout for sessions.
<VulnDiscussion>Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to a...Rule Medium Severity -
SRG-APP-000295-WSR-000134
<GroupDescription></GroupDescription>Group -
SSMC web server must set an inactive timeout for shell sessions.
<VulnDiscussion>Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to a...Rule Medium Severity -
SRG-APP-000315-WSR-000004
<GroupDescription></GroupDescription>Group -
SRG-APP-000108-WSR-000166
<GroupDescription></GroupDescription>Group -
SSMC web server must restrict connections from nonsecure zones.
<VulnDiscussion>Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Rem...Rule Medium Severity -
SRG-APP-000176-WSR-000096
<GroupDescription></GroupDescription>Group -
SSMC web server application, libraries, and configuration files must only be accessible to privileged users.
<VulnDiscussion>A web server can be modified through parameter modification, patch installation, upgrades to the web server or modules, and s...Rule Medium Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
SSMC web server must enable strict two-factor authentication for access to the webUI.
<VulnDiscussion>Accounts secured with only a password are subject to multiple forms of attack, from brute force, to social engineering. By en...Rule Medium Severity -
SRG-APP-000358-WSR-000063
<GroupDescription></GroupDescription>Group -
SSMC web server must not impede the ability to write specified log record content to an audit log server.
<VulnDiscussion>Writing events to a centralized management audit system offers many benefits to the enterprise over having dispersed logs. Ce...Rule Medium Severity -
SRG-APP-000089-WSR-000047
<GroupDescription></GroupDescription>Group -
SSMC web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
<VulnDiscussion>Log records can be generated from various components within the web server (e.g., httpd, plug-ins to external backends, etc.)...Rule Medium Severity -
SSMC web server must use a logging mechanism that is configured to alert the ISSO and SA in the event of a processing failure.
<VulnDiscussion>Reviewing log data allows an investigator to recreate the path of an attacker and to capture forensic data for later use. Log...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.