ISEC7 Sphere Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The ISEC7 SPHERE must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the ISEC7 SPHERE.
<VulnDiscussion>Display of the DOD-approved use notification before granting access to the application ensures privacy and security notificat...Rule Medium Severity -
SRG-APP-000090
<GroupDescription></GroupDescription>Group -
The ISEC7 SPHERE server must be configured to have at least one user in the following Administrator roles: Security Administrator, Site Administrator, and Help Desk User.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Medium Severity -
SRG-APP-000108
<GroupDescription></GroupDescription>Group -
The ISEC7 SPHERE must alert the information system security officer (ISSO) and system administrator (SA) (at a minimum) in the event of an audit processing failure.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-APP-000125
<GroupDescription></GroupDescription>Group -
The ISEC7 SPHERE must back up audit records at least every seven days onto a different system or system component than the system or component being audited, provide centralized management and configuration of the content to be captured in audit records generated by all ISEC7 SPHERE components, and offload audit records onto a different system or media than the system being audited.
<VulnDiscussion>Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up audit records to a differen...Rule Medium Severity -
SRG-APP-000148
<GroupDescription></GroupDescription>Group -
The LockOutRealm must be configured with a login lockout time of 15 minutes.
<VulnDiscussion>LockOutRealm prevents brute force attacks against user passwords. Removal of unneeded or nonsecure functions, ports, protocol...Rule Medium Severity -
When using PKI-based authentication for user access, the ISEC7 SPHERE must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
<VulnDiscussion>Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.