Skip to content

Redis Enterprise 6.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000133-DB-000198

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.

    &lt;VulnDiscussion&gt;Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats.&lt;/VulnDiscussio...
    Rule Medium Severity
  • SRG-APP-000141-DB-000091

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS software installation account must be restricted to authorized users.

    &lt;VulnDiscussion&gt;When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components...
    Rule Medium Severity
  • SRG-APP-000133-DB-000199

    <GroupDescription></GroupDescription>
    Group
  • Database software, including DBMS configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications.

    &lt;VulnDiscussion&gt;When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components...
    Rule Medium Severity
  • SRG-APP-000133-DB-000362

    <GroupDescription></GroupDescription>
    Group
  • The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to Redis Enterprise DBMS, etc.) must be restricted to authorized users.

    &lt;VulnDiscussion&gt;If the DBMS were to allow any user to make changes to database structure or logic, those changes might be implemented without...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.

    &lt;VulnDiscussion&gt;Configuring the DBMS to implement organization-wide security implementation guides and security checklists ensures compliance...
    Rule Medium Severity
  • SRG-APP-000383-DB-000364

    <GroupDescription></GroupDescription>
    Group
  • Unused database components, DBMS software, and database objects must be removed.

    &lt;VulnDiscussion&gt;Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...
    Rule Medium Severity
  • SRG-APP-000141-DB-000092

    <GroupDescription></GroupDescription>
    Group
  • Unused database components that are integrated in Redis Enterprise DBMS and cannot be uninstalled must be disabled.

    &lt;VulnDiscussion&gt;Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...
    Rule Medium Severity
  • SRG-APP-000141-DB-000093

    <GroupDescription></GroupDescription>
    Group
  • Access to external executables must be disabled or restricted.

    &lt;VulnDiscussion&gt;Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...
    Rule Medium Severity
  • SRG-APP-000142-DB-000094

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity
  • SRG-APP-000389-DB-000372

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.

    &lt;VulnDiscussion&gt;The DOD standard for authentication of an interactive user is the presentation of a Common Access Card (CAC) or other physica...
    Rule Medium Severity
  • SRG-APP-000148-DB-000103

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;Redis Enterprise allows the user to configure unique users per role. Review roles and ensure roles use unique organizational ...
    Rule Medium Severity
  • SRG-APP-000171-DB-000074

    <GroupDescription></GroupDescription>
    Group
  • If passwords are used for authentication, Redis Enterprise DBMS must store only hashed, salted representations of passwords.

    &lt;VulnDiscussion&gt;The DOD standard for authentication is DOD-approved PKI certificates. Authentication based on User ID and Password may be us...
    Rule Medium Severity
  • SRG-APP-000400-DB-000367

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must prohibit the use of cached authenticators after an organization-defined time period.

    &lt;VulnDiscussion&gt;If cached authentication information is out of date, the validity of the authentication information may be questionable. For...
    Rule Medium Severity
  • SRG-APP-000175-DB-000067

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. A certificate's certification path is the path from th...
    Rule Medium Severity
  • SRG-APP-000176-DB-000068

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must enforce authorized access to all PKI private keys stored/used by Redis Enterprise DBMS.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. PKI certificate-based authentication is performed by re...
    Rule High Severity
  • SRG-APP-000177-DB-000069

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must map the PKI-authenticated identity to an associated user account.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Once a PKI certificate has been validated, it must be m...
    Rule Medium Severity
  • SRG-APP-000178-DB-000083

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Normally, with PKI authentication, the interaction wit...
    Rule High Severity
  • SRG-APP-000179-DB-000114

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.

    &lt;VulnDiscussion&gt;Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures ...
    Rule High Severity
  • SRG-APP-000180-DB-000115

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    &lt;VulnDiscussion&gt;Non-organizational users include all information system users other than organizational users, which include organizational e...
    Rule Medium Severity
  • SRG-APP-000416-DB-000380

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...
    Rule High Severity
  • SRG-APP-000514-DB-000381

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...
    Rule Medium Severity
  • SRG-APP-000514-DB-000382

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...
    Rule Medium Severity
  • SRG-APP-000514-DB-000383

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...
    Rule Medium Severity
  • SRG-APP-000211-DB-000122

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must separate user functionality (including user interface services) from database management functionality.

    &lt;VulnDiscussion&gt;Information system management functionality includes functions necessary to administer databases, network components, worksta...
    Rule Medium Severity
  • SRG-APP-000211-DB-000122

    <GroupDescription></GroupDescription>
    Group
  • Access to the Redis Enterprise control plane must be restricted.

    &lt;VulnDiscussion&gt;If administrative functionality or information regarding DBMS management is presented on an interface available for users, in...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules