Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000177-AS-000126

    Group
  • The MQ Appliance messaging server must map the authenticated identity to the individual messaging user or group account for PKI-based authentication.

    The cornerstone of PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information, but the key can ...
    Rule Medium Severity
  • SRG-APP-000163-AS-000111

    Group
  • The MQ Appliance must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.

    Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can potentially obtain and maintain undetected access to the application. Own...
    Rule Medium Severity
  • SRG-APP-000148-AS-000101

    Group
  • The MQ Appliance messaging server must use an enterprise user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users).

    To assure accountability and prevent unauthorized access, application server users must be uniquely identified and authenticated. This is typically accomplished via the use of a user store which is...
    Rule Medium Severity
  • SRG-APP-000068-AS-000035

    Group
  • The MQ Appliance messaging server management interface must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.

    Messaging servers are required to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system management interface, providing privacy and security notices cons...
    Rule Medium Severity
  • SRG-APP-000089-AS-000050

    Group
  • The MQ Appliance messaging server must generate log records for access and authentication events.

    Log records can be generated from various components within the messaging server. From a messaging server perspective, certain specific messaging server functionalities may be logged as well. The m...
    Rule Medium Severity
  • SRG-APP-000224-AS-000152

    Group
  • The MQ Appliance messaging server must generate a unique session identifier using a FIPS 140-2 approved random number generator.

    The messaging server will use session IDs to communicate between modules or applications within the messaging server and between the messaging server and users. The session ID allows the applicatio...
    Rule Medium Severity
  • SRG-APP-000394-AS-000241

    Group
  • The MQ Appliance messaging server must authenticate all network-connected endpoint devices before establishing any connection.

    Device authentication requires unique identification and authentication that may be defined by type, by specific device, or by a combination of type and device. Device authentication is accomplish...
    Rule Medium Severity
  • SRG-APP-000395-AS-000109

    Group
  • The MQ Appliance messaging server must authenticate all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.

    Device authentication requires unique identification and authentication that may be defined by type, by specific device, or by a combination of type and device. Bidirectional authentication provid...
    Rule High Severity
  • SRG-APP-000514-AS-000136

    Group
  • MQ Appliance messaging servers must use NIST-approved or NSA-approved key management technology and processes.

    An asymmetric encryption key must be protected during transmission. The public portion of an asymmetric key pair can be freely distributed without fear of compromise, and the private portion of the...
    Rule Medium Severity
  • SRG-APP-000179-AS-000129

    Group
  • The MQ Appliance messaging server must utilize FIPS 140-2 approved encryption modules when authenticating users and processes.

    Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon to provide confidentiality or integrity, and D...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules