JBoss Enterprise Application Platform 6.3 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Any unapproved applications must be removed.
Extraneous services and applications running on an application server expands the attack surface and increases risk to the application server. Securing any server involves identifying and removing ...Rule Medium Severity -
JBoss application and management ports must be approved by the PPSM CAL.
Some networking protocols may not meet organizational security requirements to protect data and components. Application servers natively host a number of various features, such as management inter...Rule Medium Severity -
JBoss KeyStore and Truststore passwords must not be stored in clear text.
Access to the JBoss Password Vault must be secured, and the password used to access must be encrypted. There is a specific process used to generate the encrypted password hash. This process must ...Rule Medium Severity -
The JBoss server must separate hosted application functionality from application server management functionality.
The application server consists of the management interface and hosted applications. By separating the management interface from hosted applications, the user must authenticate as a privileged use...Rule Medium Severity -
JBoss file permissions must be configured to protect the confidentiality and integrity of application files.
The JBoss EAP Application Server is a Java-based AS. It is installed on the OS file system and depends upon file system access controls to protect application data at rest. The file permissions s...Rule Medium Severity -
The JBoss server must be configured to utilize syslog logging.
Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited to...Rule Medium Severity -
JBoss must be configured to use DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD systems or by organizations with insufficient secur...Rule Medium Severity -
JBoss must be configured to generate log records when successful/unsuccessful attempts to modify privileges occur.
Changing privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful/unsuccessful changes are made, the event needs to be logged. By logging the event,...Rule Medium Severity -
JBoss must be configured to generate log records when successful/unsuccessful attempts to delete privileges occur.
Deleting privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful and unsuccessful privilege deletions are made, the events need to be logged. By lo...Rule Medium Severity -
JBoss must be configured to generate log records when successful/unsuccessful logon attempts occur.
Logging the access to the application server allows the system administrators to monitor user accounts. By logging successful/unsuccessful logons, the system administrator can determine if an acco...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.