Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000179-AS-000129

    Group
  • The Horizon Connection Server must only use FIPS 140-2 validated cryptographic modules.

    Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon to provide confidentiality or integrity, and D...
    Rule High Severity
  • SRG-APP-000220-AS-000148

    Group
  • The Horizon Connection Server must time out administrative sessions after 15 minutes or less.

    If communications sessions remain open for extended periods of time even when unused, there is the potential for an adversary to hijack the session and use it to gain access to the system. Horizon...
    Rule Medium Severity
  • SRG-APP-000267-AS-000170

    Group
  • The Horizon Connection Server must protect log files from unauthorized access.

    Error logs can contain sensitive information about system errors and system architecture that need to be protected from unauthorized access and modification. By default, Horizon Connection Server l...
    Rule Medium Severity
  • SRG-APP-000358-AS-000064

    Group
  • The Horizon Connection Server must offload events to a central log server in real time.

    Information system logging capability is critical for accurate forensic analysis. Centralized management of log records provides for efficiency in maintenance and management of records, as well as ...
    Rule Medium Severity
  • SRG-APP-000427-AS-000264

    Group
  • The Horizon Connection Server must be configured with a DoD-issued TLS certificate.

    The DoD will only accept PKI certificates obtained from a DoD-approved internal or external certificate authority (CA). If the CA used for verifying the certificate is not DoD-approved, trust of th...
    Rule Medium Severity
  • SRG-APP-000516-AS-000237

    Group
  • The Horizon Connection Server must reauthenticate users after a network interruption.

    Given the remote access nature of Horizon Connection Server, the client must be ensured to be under positive control as much as is possible from the server side. As such, whenever a network interru...
    Rule Medium Severity
  • SRG-APP-000516-AS-000237

    Group
  • The Horizon Connection Server must disconnect users after a maximum of ten hours.

    Horizon Connection Server is intended to provide remote desktops and applications, generally during working hours and for no more than an extended workday. Leaving sessions active for more than wha...
    Rule Medium Severity
  • SRG-APP-000516-AS-000237

    Group
  • The Horizon Connection Server must disconnect applications after two hours of idle time.

    Horizon View is intended to provide remote desktops and applications during for more or less continuous use. If an application is open and goes used for more than two hours, that application must b...
    Rule Medium Severity
  • SRG-APP-000516-AS-000237

    Group
  • The Horizon Connection Server must discard SSO credentials after 15 minutes.

    Horizon Connection Server caches user credentials temporarily to ensure that the user can connect to their desktop pools without reauthenticating, right after logging in to the broker. However, thi...
    Rule Medium Severity
  • SRG-APP-000516-AS-000237

    Group
  • The Horizon Connection Server must not accept pass-through client credentials.

    Horizon Connection Server has the ability to allow clients to authenticate using the local session credentials of their local endpoint. While convenient, this must be disabled for DoD deployments a...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules