Skip to content

JBoss Enterprise Application Platform 6.3 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000014-AS-000009

    Group
  • HTTP management session traffic must be encrypted.

    Types of management interfaces utilized by the JBoss EAP application server include web-based HTTP interfaces as well as command line-based management interfaces. In the event remote HTTP manageme...
    Rule Medium Severity
  • Java permissions must be set for hosted applications.

    The Java Security Manager is a java class that manages the external boundary of the Java Virtual Machine (JVM) sandbox, controlling how code executing within the JVM can interact with resources out...
    Rule High Severity
  • Users in JBoss Management Security Realms must be in the appropriate role.

    Security realms are a series of mappings between users and passwords and users and roles. There are 2 JBoss security realms provided by default; they are "management realm" and "application realm"...
    Rule Medium Severity
  • The JBoss server must generate log records for access and authentication events to the management interface.

    Log records can be generated from various components within the JBoss application server. The minimum list of logged events should be those pertaining to access and authentication events to the ma...
    Rule Medium Severity
  • JBoss must be configured to log the IP address of the remote system connecting to the JBoss system/cluster.

    Information system logging capability is critical for accurate forensic analysis. Without being able to establish what type of event occurred, it would be difficult to establish, correlate, and in...
    Rule Medium Severity
  • JBoss Log Formatter must be configured to produce log records that establish the date and time the events occurred.

    Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining th...
    Rule Medium Severity
  • JBoss must be configured to record the IP address and port information used by management interface network traffic.

    Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining th...
    Rule Medium Severity
  • JBoss ROOT logger must be configured to utilize the appropriate logging level.

    Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes: time stamps, source a...
    Rule Medium Severity
  • JBoss log records must be off-loaded onto a different system or system component a minimum of every seven days.

    JBoss logs by default are written to the local file system. A centralized logging solution like syslog should be used whenever possible; however, any log data stored to the file system needs to be...
    Rule Medium Severity
  • Any unapproved applications must be removed.

    Extraneous services and applications running on an application server expands the attack surface and increases risk to the application server. Securing any server involves identifying and removing ...
    Rule Medium Severity
  • JBoss application and management ports must be approved by the PPSM CAL.

    Some networking protocols may not meet organizational security requirements to protect data and components. Application servers natively host a number of various features, such as management inter...
    Rule Medium Severity
  • JBoss KeyStore and Truststore passwords must not be stored in clear text.

    Access to the JBoss Password Vault must be secured, and the password used to access must be encrypted. There is a specific process used to generate the encrypted password hash. This process must ...
    Rule Medium Severity
  • The JBoss server must separate hosted application functionality from application server management functionality.

    The application server consists of the management interface and hosted applications. By separating the management interface from hosted applications, the user must authenticate as a privileged use...
    Rule Medium Severity
  • JBoss file permissions must be configured to protect the confidentiality and integrity of application files.

    The JBoss EAP Application Server is a Java-based AS. It is installed on the OS file system and depends upon file system access controls to protect application data at rest. The file permissions s...
    Rule Medium Severity
  • The JBoss server must be configured to utilize syslog logging.

    Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited to...
    Rule Medium Severity
  • JBoss must be configured to use DoD PKI-established certificate authorities for verification of the establishment of protected sessions.

    Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD systems or by organizations with insufficient secur...
    Rule Medium Severity
  • JBoss must be configured to generate log records when successful/unsuccessful attempts to modify privileges occur.

    Changing privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful/unsuccessful changes are made, the event needs to be logged. By logging the event,...
    Rule Medium Severity
  • JBoss must be configured to generate log records when successful/unsuccessful attempts to delete privileges occur.

    Deleting privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful and unsuccessful privilege deletions are made, the events need to be logged. By lo...
    Rule Medium Severity
  • JBoss must be configured to generate log records when successful/unsuccessful logon attempts occur.

    Logging the access to the application server allows the system administrators to monitor user accounts. By logging successful/unsuccessful logons, the system administrator can determine if an acco...
    Rule Medium Severity
  • JBoss must be configured to generate log records that show starting and ending times for access to the application server management interface.

    Determining when a user has accessed the management interface is important to determine the timeline of events when a security incident occurs. Generating these events, especially if the managemen...
    Rule Medium Severity
  • JBoss servers must be configured to roll over and transfer logs on a minimum weekly basis.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Protecting log data is important during a forensic investigation to ensure investigators can tr...
    Rule Medium Severity
  • JBoss management interfaces must be secured.

    JBoss utilizes the concept of security realms to secure the management interfaces used for JBoss server administration. If the security realm attribute is omitted or removed from the management in...
    Rule High Severity
  • SRG-APP-000089-AS-000050

    Group
  • Remote access to JMX subsystem must be disabled.

    The JMX subsystem allows you to trigger JDK and application management operations remotely. In a managed domain configuration, the JMX subsystem is removed by default. For a standalone configurati...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • Welcome Web Application must be disabled.

    The Welcome to JBoss web page provides a redirect to the JBoss admin console, which, by default, runs on TCP 9990 as well as redirects to the Online User Guide and Online User Groups hosted at loca...
    Rule Low Severity
  • SRG-APP-000015-AS-000010

    Group
  • HTTPS must be enabled for JBoss web interfaces.

    Encryption is critical for protection of web-based traffic. If encryption is not being used to protect the application server's web connectors, malicious users may gain the ability to read or modif...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    Group
  • SRG-APP-000033-AS-000024

    Group
  • The Java Security Manager must be enabled for the JBoss application server.

    The Java Security Manager is a java class that manages the external boundary of the Java Virtual Machine (JVM) sandbox, controlling how code executing within the JVM can interact with resources out...
    Rule High Severity
  • SRG-APP-000033-AS-000024

    Group
  • The JBoss server must be configured with Role Based Access Controls.

    By default, the JBoss server is not configured to utilize role based access controls (RBAC). RBAC provides the capability to restrict user access to their designated management role, thereby limit...
    Rule High Severity
  • SRG-APP-000033-AS-000024

    Group
  • SRG-APP-000033-AS-000024

    Group
  • Silent Authentication must be removed from the Default Application Security Realm.

    Silent Authentication is a configuration setting that allows local OS users access to the JBoss server and a wide range of operations without specifically authenticating on an individual user basis...
    Rule High Severity
  • SRG-APP-000033-AS-000024

    Group
  • Silent Authentication must be removed from the Default Management Security Realm.

    Silent Authentication is a configuration setting that allows local OS users access to the JBoss server and a wide range of operations without specifically authenticating on an individual user basis...
    Rule High Severity
  • SRG-APP-000033-AS-000024

    Group
  • SRG-APP-000090-AS-000051

    Group
  • JBoss must be configured to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which loggable events are to be logged.

    The JBoss server must be configured to select which personnel are assigned the role of selecting which loggable events are to be logged. In JBoss, the role designated for selecting auditable events...
    Rule Medium Severity
  • SRG-APP-000092-AS-000053

    Group
  • JBoss must be configured to initiate session logging upon startup.

    Session logging activities are developed, integrated, and used in consultation with legal counsel in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations.
    Rule Medium Severity
  • SRG-APP-000095-AS-000056

    Group
  • SRG-APP-000095-AS-000056

    Group
  • JBoss must be configured to produce log records containing information to establish what type of events occurred.

    Information system logging capability is critical for accurate forensic analysis. Without being able to establish what type of event occurred, it would be difficult to establish, correlate, and in...
    Rule Medium Severity
  • SRG-APP-000096-AS-000059

    Group
  • SRG-APP-000097-AS-000060

    Group
  • JBoss must be configured to produce log records that establish which hosted application triggered the events.

    Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. By default, no...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules