I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000014-AS-000009
Group -
The WebSphere Liberty Server Quality of Protection (QoP) must be set to use TLSv1.2 or higher.
Quality of Protection in WebSphere Liberty specifies the security level, ciphers, and mutual authentication settings for the Secure Socket Layer (SSL/TLS) configuration. For Quality of Protection s...Rule Medium Severity -
SRG-APP-000015-AS-000010
Group -
Security cookies must be set to HTTPOnly.
Web applications use cookies to track users across requests. These cookies, while typically not sensitive in themselves, connect to the existing state on the back-end system. If an intruder were to...Rule Medium Severity -
SRG-APP-000016-AS-000013
Group -
The WebSphere Liberty Server must log remote session and security activity.
Security auditing must be configured in order to log remote session activity. Security auditing will not be performed unless the audit feature (audit-1.0) has been enabled. The security feature (ap...Rule Medium Severity -
SRG-APP-000033-AS-000024
Group -
Users in the REST API admin role must be authorized.
Users with console access and OS permissions to the folders where the Liberty Server is installed can make changes to the server. In addition, REST API calls that execute server management tasks ar...Rule High Severity -
SRG-APP-000109-AS-000070
Group -
The WebSphere Liberty Server must be configured to offload logs to a centralized system.
Log processing failures include, but are not limited to, failures in the application server log capturing mechanisms or log storage capacity being reached or exceeded. In some instances, it is pref...Rule Medium Severity -
SRG-APP-000119-AS-000079
Group -
The WebSphere Liberty Server must protect log information from unauthorized access or changes.
WebSphere Liberty provides the capability to encrypt and sign the log data to prevent unauthorized modification. - The security feature (appSecurity-2.0) must be defined in order to configure a u...Rule Medium Severity -
SRG-APP-000121-AS-000081
Group -
The WebSphere Liberty Server must protect log tools from unauthorized access.
Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending on the log format and application, system and application log tools may provid...Rule Medium Severity -
SRG-APP-000126-AS-000085
Group -
The WebSphere Liberty Server must be configured to encrypt log information.
Protection of log records is of critical importance. Encrypting log records provides a level of protection that does not rely on host-based protections that can be accidentally misconfigured, such ...Rule Medium Severity -
SRG-APP-000133-AS-000092
Group -
The WebSphere Liberty Server must protect software libraries from unauthorized access.
Application servers have the ability to specify that the hosted applications use shared libraries. The application server must have a capability to divide roles based upon duties wherein one projec...Rule Medium Severity -
SRG-APP-000142-AS-000014
Group -
The WebSphere Liberty Server must prohibit or restrict the use of nonsecure ports, protocols, modules, and/or services as defined in the PPSM CAL and vulnerability assessments.
Some networking protocols may not meet organizational security requirements to protect data and components. Application servers natively host a number of various features, such as management inter...Rule Medium Severity -
SRG-APP-000148-AS-000101
Group -
The WebSphere Liberty Server must use an LDAP user registry.
To ensure accountability and prevent unauthorized access, application server users must be uniquely identified and authenticated. This is typically accomplished via the use of a user store which is...Rule Medium Severity -
SRG-APP-000148-AS-000101
Group -
Basic Authentication must be disabled.
Basic authentication does not use a centralized user store like LDAP. Not using a centralized user store complicates user management tasks and increases the risk that user accounts could remain on ...Rule Medium Severity -
SRG-APP-000149-AS-000102
Group -
Multifactor authentication for network access to privileged accounts must be used.
Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the application server. If one factor is compromised or broken, the attacker st...Rule High Severity -
SRG-APP-000171-AS-000119
Group -
The WebSphere Liberty Server must store only encrypted representations of user passwords.
WebSphere Liberty can either provide a local account store or integrate with enterprise account stores such as LDAP directories. If the application server stores application passwords in the server...Rule High Severity -
SRG-APP-000172-AS-000120
Group -
The WebSphere Liberty Server must use TLS-enabled LDAP.
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. If passwords are not encrypted, they can be plainly read (i.e., clea...Rule High Severity -
SRG-APP-000177-AS-000126
Group -
The WebSphere Liberty Server must use DoD-issued/signed certificates.
The cornerstone of PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information, but the key can ...Rule Medium Severity -
SRG-APP-000179-AS-000129
Group -
The WebSphere Liberty Server must use FIPS 140-2 approved encryption modules when authenticating users and processes.
Application servers must use and meet requirements of the DoD Enterprise PKI infrastructure for application authentication. Encryption is only as good as the encryption modules used. Unapproved cry...Rule High Severity -
SRG-APP-000295-AS-000263
Group -
HTTP session timeout must be configured.
An attacker can take advantage of user sessions that are left open, thus bypassing the user authentication process. To thwart the vulnerability of open and unused user sessions, the application se...Rule Medium Severity -
SRG-APP-000315-AS-000094
Group -
Application security must be enabled on the WebSphere Liberty Server.
Application security enables security for the applications in the environment. This type of security provides application isolation and requirements for authenticating application users. When a use...Rule High Severity -
SRG-APP-000340-AS-000185
Group -
Users in a reader-role must be authorized.
The reader role is a management role that allows read-only access to select administrative REST APIs as well as the Admin Center UI (adminCenter-1.0). Preventing non-privileged users from viewing p...Rule Medium Severity -
SRG-APP-000357-AS-000038
Group -
The WebSphere Liberty Server must allocate JVM log record storage capacity in accordance with organization-defined log record storage requirements.
JVM logs are logs used to store application and runtime related events, rather than audit related events. They are mainly used to diagnose application or runtime bugs. However, they are useful for ...Rule Medium Severity -
SRG-APP-000380-AS-000088
Group -
The server.xml file must be protected from unauthorized modification.
When dealing with access restrictions pertaining to change control, it should be noted that any changes to the software, and/or application server configuration could potentially have significant a...Rule Medium Severity -
SRG-APP-000400-AS-000246
Group -
The WebSphere Liberty Server must prohibit the use of cached authenticators after an organization-defined time period.
Larger authentication cache timeout values can increase security risks. For example, a user who is revoked can still log in by using a credential that is cached in the authentication cache until th...Rule Medium Severity -
SRG-APP-000428-AS-000265
Group -
The WebSphere Liberty Server LTPA keys password must be changed.
The default location of the automatically generated Lightweight Third Party Authentication (LTPA) keys file is ${server.output.dir}/resources/security/ltpa.keys. The LTPA keys are encrypted with ...Rule Medium Severity -
SRG-APP-000439-AS-000274
Group -
The WebSphere Liberty Server must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
Export grade encryption suites are not strong and do not meet DoD requirements. The encryption for the session becomes easy for the attacker to break. Do not use export grade encryption.Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.