Skip to content

JBoss Enterprise Application Platform 6.3 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000014-AS-000009

    Group
  • HTTP management session traffic must be encrypted.

    Types of management interfaces utilized by the JBoss EAP application server include web-based HTTP interfaces as well as command line-based management interfaces. In the event remote HTTP manageme...
    Rule Medium Severity
  • Java permissions must be set for hosted applications.

    The Java Security Manager is a java class that manages the external boundary of the Java Virtual Machine (JVM) sandbox, controlling how code executing within the JVM can interact with resources out...
    Rule High Severity
  • Users in JBoss Management Security Realms must be in the appropriate role.

    Security realms are a series of mappings between users and passwords and users and roles. There are 2 JBoss security realms provided by default; they are "management realm" and "application realm"...
    Rule Medium Severity
  • The JBoss server must generate log records for access and authentication events to the management interface.

    Log records can be generated from various components within the JBoss application server. The minimum list of logged events should be those pertaining to access and authentication events to the ma...
    Rule Medium Severity
  • JBoss must be configured to log the IP address of the remote system connecting to the JBoss system/cluster.

    Information system logging capability is critical for accurate forensic analysis. Without being able to establish what type of event occurred, it would be difficult to establish, correlate, and in...
    Rule Medium Severity
  • JBoss Log Formatter must be configured to produce log records that establish the date and time the events occurred.

    Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining th...
    Rule Medium Severity
  • JBoss must be configured to record the IP address and port information used by management interface network traffic.

    Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining th...
    Rule Medium Severity
  • JBoss ROOT logger must be configured to utilize the appropriate logging level.

    Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes: time stamps, source a...
    Rule Medium Severity
  • JBoss log records must be off-loaded onto a different system or system component a minimum of every seven days.

    JBoss logs by default are written to the local file system. A centralized logging solution like syslog should be used whenever possible; however, any log data stored to the file system needs to be...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules