Skip to content

JBoss Enterprise Application Platform 6.3 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000090-AS-000051

    Group
  • JBoss must be configured to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which loggable events are to be logged.

    The JBoss server must be configured to select which personnel are assigned the role of selecting which loggable events are to be logged. In JBoss, the role designated for selecting auditable events...
    Rule Medium Severity
  • SRG-APP-000092-AS-000053

    Group
  • JBoss must be configured to initiate session logging upon startup.

    Session logging activities are developed, integrated, and used in consultation with legal counsel in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations.
    Rule Medium Severity
  • SRG-APP-000095-AS-000056

    Group
  • SRG-APP-000095-AS-000056

    Group
  • JBoss must be configured to produce log records containing information to establish what type of events occurred.

    Information system logging capability is critical for accurate forensic analysis. Without being able to establish what type of event occurred, it would be difficult to establish, correlate, and in...
    Rule Medium Severity
  • SRG-APP-000096-AS-000059

    Group
  • SRG-APP-000097-AS-000060

    Group
  • JBoss must be configured to produce log records that establish which hosted application triggered the events.

    Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. By default, no...
    Rule Medium Severity
  • SRG-APP-000098-AS-000061

    Group
  • SRG-APP-000099-AS-000062

    Group
  • The application server must produce log records that contain sufficient information to establish the outcome of events.

    Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited to...
    Rule Medium Severity
  • SRG-APP-000100-AS-000063

    Group
  • SRG-APP-000141-AS-000095

    Group
  • SRG-APP-000142-AS-000014

    Group
  • SRG-APP-000118-AS-000078

    Group
  • File permissions must be configured to protect log information from any type of unauthorized read access.

    If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. Whe...
    Rule Medium Severity
  • SRG-APP-000119-AS-000079

    Group
  • File permissions must be configured to protect log information from unauthorized modification.

    If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. Whe...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules