JBoss Enterprise Application Platform 6.3 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The JBoss server must be configured to log all admin activity.
In order to be able to provide a forensic history of activity, the application server must ensure users who are granted a privileged role or those who utilize a separate distinct account when acces...Rule Medium Severity -
SRG-APP-000358-AS-000064
Group -
SRG-APP-000380-AS-000088
Group -
Production JBoss servers must not allow automatic application deployment.
When dealing with access restrictions pertaining to change control, it should be noted that any changes to the software and/or application server configuration can potentially have significant effe...Rule Medium Severity -
SRG-APP-000381-AS-000089
Group -
Production JBoss servers must log when failed application deployments occur.
Without logging the enforcement of access restrictions against changes to the application server configuration, it will be difficult to identify attempted attacks, and a log trail will not be avail...Rule Medium Severity -
SRG-APP-000381-AS-000089
Group -
Production JBoss servers must log when successful application deployments occur.
Without logging the enforcement of access restrictions against changes to the application server configuration, it will be difficult to identify attempted attacks, and a log trail will not be avail...Rule Medium Severity -
SRG-APP-000427-AS-000264
Group -
The JRE installed on the JBoss server must be kept up to date.
The JBoss product is available as Open Source; however, the Red Hat vendor provides updates, patches and support for the JBoss product. It is imperative that patches and updates be applied to JBos...Rule High Severity -
SRG-APP-000495-AS-000220
Group -
SRG-APP-000435-AS-000069
Group -
The JBoss server, when hosting mission critical applications, must be in a high-availability (HA) cluster.
A MAC I system is a system that handles data vital to the organization's operational readiness or effectiveness of deployed or contingency forces. A MAC I system must maintain the highest level of...Rule Medium Severity -
SRG-APP-000439-AS-000155
Group -
JBoss must be configured to use an approved TLS version.
Preventing the disclosure of transmitted information requires that the application server take measures to employ some form of cryptographic mechanism in order to protect the information during tra...Rule Medium Severity -
SRG-APP-000440-AS-000167
Group -
JBoss must be configured to use an approved cryptographic algorithm in conjunction with TLS.
Preventing the disclosure or modification of transmitted information requires that application servers take measures to employ approved cryptography in order to protect the information during trans...Rule Medium Severity -
SRG-APP-000456-AS-000266
Group -
Production JBoss servers must be supported by the vendor.
The JBoss product is available as Open Source; however, the Red Hat vendor provides updates, patches and support for the JBoss product. It is imperative that patches and updates be applied to JBos...Rule High Severity -
SRG-APP-000456-AS-000266
Group -
SRG-APP-000499-AS-000224
Group -
SRG-APP-000503-AS-000228
Group -
SRG-APP-000504-AS-000229
Group -
JBoss must be configured to generate log records for privileged activities.
Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...Rule Medium Severity -
SRG-APP-000505-AS-000230
Group -
SRG-APP-000506-AS-000231
Group -
JBoss must be configured to generate log records when concurrent logons from different workstations occur to the application server management interface.
Concurrent logons from different systems could possibly indicate a compromised account. When concurrent logons are made from different workstations to the management interface, a log record needs ...Rule Medium Severity -
SRG-APP-000509-AS-000234
Group -
JBoss must be configured to generate log records for all account creations, modifications, disabling, and termination events.
The maintenance of user accounts is a key activity within the system to determine access and privileges. Through changes to accounts, an attacker can create an account for persistent access, modif...Rule Medium Severity -
SRG-APP-000514-AS-000137
Group -
The JBoss server must be configured to use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates.
Class 3 PKI certificates are used for servers and software signing rather than for identifying individuals. Class 4 certificates are used for business-to-business transactions. Utilizing unapproved...Rule Medium Severity -
SRG-APP-000515-AS-000203
Group -
SRG-APP-000516-AS-000237
Group -
The JBoss server must be configured to bind the management interfaces to only management networks.
JBoss provides multiple interfaces for accessing the system. By default, these are called "public" and "management". Allowing non-management traffic to access the JBoss management interface incre...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.