Skip to content

Mainframe Product Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Mainframe Product must accept Personal Identity Verification (PIV) credentials.

    <VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...
    Rule Medium Severity
  • SRG-APP-000392

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must electronically verify Personal Identity Verification (PIV) credentials.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...
    Rule Medium Severity
  • SRG-APP-000400

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must prohibit the use of cached authenticators after one hour.

    &lt;VulnDiscussion&gt;If cached authentication information is out of date, the validity of the authentication information may be questionable.&lt;/...
    Rule Medium Severity
  • SRG-APP-000402

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must accept Personal Identity Verification (PIV) credentials from other federal agencies.

    &lt;VulnDiscussion&gt;Access may be denied to authorized users if federal agency PIV credentials are not accepted. PIV credentials are those cred...
    Rule Medium Severity
  • SRG-APP-000403

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies.

    &lt;VulnDiscussion&gt;Inappropriate access may be granted to unauthorized users if federal agency PIV credentials are not electronically verified. ...
    Rule Medium Severity
  • SRG-APP-000404

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.

    &lt;VulnDiscussion&gt;Access may be denied to legitimate users if FICAM-approved third-party credentials are not accepted. This requirement typic...
    Rule Medium Severity
  • SRG-APP-000405

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.

    &lt;VulnDiscussion&gt;Without conforming to FICAM-issued profiles, the information system may not be interoperable with FICAM-authentication protoc...
    Rule Medium Severity
  • SRG-APP-000409

    <GroupDescription></GroupDescription>
    Group
  • Mainframe Products must audit nonlocal maintenance and diagnostic sessions audit events as defined in site security plan.

    &lt;VulnDiscussion&gt;If events associated with nonlocal administrative access or diagnostic sessions are not logged and audited, a major tool for ...
    Rule Medium Severity
  • SRG-APP-000411

    <GroupDescription></GroupDescription>
    Group
  • Mainframe Products must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications.

    &lt;VulnDiscussion&gt;Privileged access contains control and configuration information which is particularly sensitive, so additional protections a...
    Rule Medium Severity
  • SRG-APP-000412

    <GroupDescription></GroupDescription>
    Group
  • Mainframe Products must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.

    &lt;VulnDiscussion&gt;Privileged access contains control and configuration information which is particularly sensitive, so additional protections a...
    Rule Medium Severity
  • SRG-APP-000413

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must implement privileged access authorization to all information systems and infrastructure components for selected vulnerability scanning activities as defined in the site security plan.

    &lt;VulnDiscussion&gt;In certain situations, the nature of the vulnerability scanning may be more intrusive, or the information system component th...
    Rule Medium Severity
  • SRG-APP-000428

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must implement cryptographic mechanisms to prevent unauthorized modification of all information not cleared for public release at rest on system components outside of organization facilities.

    &lt;VulnDiscussion&gt;Applications handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized ...
    Rule High Severity
  • SRG-APP-000429

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must implement cryptographic mechanisms to prevent unauthorized disclosure of all information not cleared for public release at rest on system components outside of organization facilities.

    &lt;VulnDiscussion&gt;Applications handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized ...
    Rule High Severity
  • SRG-APP-000431

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must maintain a separate execution domain for each executing process.

    &lt;VulnDiscussion&gt;Applications can maintain separate execution domains for each executing process by assigning each process a separate address ...
    Rule Medium Severity
  • SRG-APP-000447

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.

    &lt;VulnDiscussion&gt;A common vulnerability of applications is unpredictable behavior when invalid inputs are received. This requirement guards ag...
    Rule Medium Severity
  • SRG-APP-000450

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must implement security safeguards to protect its memory from unauthorized code execution.

    &lt;VulnDiscussion&gt;Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...
    Rule Medium Severity
  • SRG-APP-000454

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must remove all upgraded/replaced software components that are no longer required for operation after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of software components that are not removed from the information system after updates have been installed m...
    Rule Medium Severity
  • SRG-APP-000456

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVMs, CTOs, DTMs, and STIGs).

    &lt;VulnDiscussion&gt;Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products t...
    Rule Medium Severity
  • SRG-APP-000472

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product performing organization-defined security functions must verify correct operation of security functions.

    &lt;VulnDiscussion&gt;Without verification, security functions may not operate correctly and this failure may go unnoticed. Security function is ...
    Rule Medium Severity
  • SRG-APP-000473

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must perform verification of the correct operation of security functions upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days.

    &lt;VulnDiscussion&gt;Without verification, security functions may not operate correctly and this failure may go unnoticed. Security function is ...
    Rule Medium Severity
  • SRG-APP-000474

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product, upon detection of a potential integrity violation, must initiate one or more of the following actions: generate an audit record, alert the current user, alert personnel or roles as defined in the site security plan, and/or perform other actions as defined in the SSP.

    &lt;VulnDiscussion&gt;Without an audit capability, an integrity violation may not be detected. Organizations select response actions based on types...
    Rule Medium Severity
  • SRG-APP-000488

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must either shut down, restart, and/or notify the appropriate personnel when anomalies in the operation of the security functions as defined in site security plan are discovered.

    &lt;VulnDiscussion&gt;If anomalies are not acted on, security functions may fail to secure the system. Security function is defined as the hardwa...
    Rule Medium Severity
  • SRG-APP-000475

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe product must perform an integrity check of all software from vendors/sources that provide cryptographic mechanisms to enable the validation of code authenticity and integrity at startup, at transitional states as defined in site security plan or security-relevant events, or annually.

    &lt;VulnDiscussion&gt;Unauthorized changes to software can occur due to errors or malicious activity (e.g., tampering). Software includes, for exam...
    Rule Medium Severity
  • SRG-APP-000477

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must perform an integrity check of information as defined in site security plan at startup, at transitional states as defined in site security plan or security-relevant events, or annually.

    &lt;VulnDiscussion&gt;Unauthorized changes to information can occur due to errors or malicious activity (e.g., tampering). Information includes met...
    Rule Medium Severity
  • SRG-APP-000480

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must automatically shut down the information system, restart the information system, and/or implement security safeguards as conditions as defined in site security plan when integrity violations are discovered.

    &lt;VulnDiscussion&gt;Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity (e.g., tampering). ...
    Rule Medium Severity
  • SRG-APP-000484

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules