JBoss Enterprise Application Platform 6.3 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
JBoss must be configured to generate log records that show starting and ending times for access to the application server management interface.
Determining when a user has accessed the management interface is important to determine the timeline of events when a security incident occurs. Generating these events, especially if the managemen...Rule Medium Severity -
JBoss servers must be configured to roll over and transfer logs on a minimum weekly basis.
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Protecting log data is important during a forensic investigation to ensure investigators can tr...Rule Medium Severity -
JBoss management interfaces must be secured.
JBoss utilizes the concept of security realms to secure the management interfaces used for JBoss server administration. If the security realm attribute is omitted or removed from the management in...Rule High Severity -
SRG-APP-000089-AS-000050
Group -
Remote access to JMX subsystem must be disabled.
The JMX subsystem allows you to trigger JDK and application management operations remotely. In a managed domain configuration, the JMX subsystem is removed by default. For a standalone configurati...Rule Medium Severity -
SRG-APP-000141-AS-000095
Group -
Welcome Web Application must be disabled.
The Welcome to JBoss web page provides a redirect to the JBoss admin console, which, by default, runs on TCP 9990 as well as redirects to the Online User Guide and Online User Groups hosted at loca...Rule Low Severity -
SRG-APP-000015-AS-000010
Group -
HTTPS must be enabled for JBoss web interfaces.
Encryption is critical for protection of web-based traffic. If encryption is not being used to protect the application server's web connectors, malicious users may gain the ability to read or modif...Rule Medium Severity -
SRG-APP-000033-AS-000024
Group -
SRG-APP-000033-AS-000024
Group -
The Java Security Manager must be enabled for the JBoss application server.
The Java Security Manager is a java class that manages the external boundary of the Java Virtual Machine (JVM) sandbox, controlling how code executing within the JVM can interact with resources out...Rule High Severity -
SRG-APP-000033-AS-000024
Group -
The JBoss server must be configured with Role Based Access Controls.
By default, the JBoss server is not configured to utilize role based access controls (RBAC). RBAC provides the capability to restrict user access to their designated management role, thereby limit...Rule High Severity -
SRG-APP-000033-AS-000024
Group -
SRG-APP-000033-AS-000024
Group -
Silent Authentication must be removed from the Default Application Security Realm.
Silent Authentication is a configuration setting that allows local OS users access to the JBoss server and a wide range of operations without specifically authenticating on an individual user basis...Rule High Severity -
SRG-APP-000033-AS-000024
Group -
Silent Authentication must be removed from the Default Management Security Realm.
Silent Authentication is a configuration setting that allows local OS users access to the JBoss server and a wide range of operations without specifically authenticating on an individual user basis...Rule High Severity -
SRG-APP-000033-AS-000024
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.