Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000141-AS-000095

    Group
  • JBoss process owner execution permissions must be limited.

    JBoss EAP application server can be run as the OS admin, which is not advised. Running the application server with admin privileges increases the attack surface by granting the application server ...
    Rule High Severity
  • SRG-APP-000141-AS-000095

    Group
  • JBoss QuickStarts must be removed.

    JBoss QuickStarts are demo applications that can be deployed quickly. Demo applications are not written with security in mind and often open new attack vectors. QuickStarts must be removed.
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • Remote access to JMX subsystem must be disabled.

    The JMX subsystem allows you to trigger JDK and application management operations remotely. In a managed domain configuration, the JMX subsystem is removed by default. For a standalone configurati...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • Welcome Web Application must be disabled.

    The Welcome to JBoss web page provides a redirect to the JBoss admin console, which, by default, runs on TCP 9990 as well as redirects to the Online User Guide and Online User Groups hosted at loca...
    Rule Low Severity
  • SRG-APP-000141-AS-000095

    Group
  • Any unapproved applications must be removed.

    Extraneous services and applications running on an application server expands the attack surface and increases risk to the application server. Securing any server involves identifying and removing ...
    Rule Medium Severity
  • SRG-APP-000142-AS-000014

    Group
  • JBoss application and management ports must be approved by the PPSM CAL.

    Some networking protocols may not meet organizational security requirements to protect data and components. Application servers natively host a number of various features, such as management inter...
    Rule Medium Severity
  • SRG-APP-000148-AS-000101

    Group
  • The JBoss Server must be configured to utilize a centralized authentication mechanism such as AD or LDAP.

    To assure accountability and prevent unauthorized access, application server users must be uniquely identified and authenticated. This is typically accomplished via the use of a user store that is...
    Rule Medium Severity
  • SRG-APP-000149-AS-000102

    Group
  • The JBoss Server must be configured to use certificates to authenticate admins.

    Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the application server. If one factor is compromised or broken, the attacker s...
    Rule Medium Severity
  • SRG-APP-000153-AS-000104

    Group
  • The JBoss server must be configured to use individual accounts and not generic or shared accounts.

    To assure individual accountability and prevent unauthorized access, application server users (and any processes acting on behalf of application server users) must be individually identified and au...
    Rule Medium Severity
  • SRG-APP-000163-AS-000111

    Group
  • JBoss management Interfaces must be integrated with a centralized authentication mechanism that is configured to manage accounts according to DoD policy.

    JBoss EAP provides a security realm called ManagementRealm. By default, this realm uses the mgmt-users.properties file for authentication. Using file-based authentication does not allow the JBoss...
    Rule Medium Severity
  • SRG-APP-000171-AS-000119

    Group
  • The JBoss Password Vault must be used for storing passwords or other sensitive configuration information.

    JBoss EAP 6 has a Password Vault to encrypt sensitive strings, store them in an encrypted keystore, and decrypt them for applications and verification systems. Plain-text configuration files, such ...
    Rule Medium Severity
  • SRG-APP-000171-AS-000119

    Group
  • JBoss KeyStore and Truststore passwords must not be stored in clear text.

    Access to the JBoss Password Vault must be secured, and the password used to access must be encrypted. There is a specific process used to generate the encrypted password hash. This process must ...
    Rule Medium Severity
  • SRG-APP-000172-AS-000120

    Group
  • LDAP enabled security realm value allow-empty-passwords must be set to false.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. If passwords are not encrypted, they can be plainly read (i.e., cle...
    Rule Medium Severity
  • SRG-APP-000172-AS-000121

    Group
  • JBoss must utilize encryption when using LDAP for authentication.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. Application servers have the capability to utilize LDAP directories...
    Rule Medium Severity
  • SRG-APP-000176-AS-000125

    Group
  • The JBoss server must be configured to restrict access to the web servers private key to authenticated system administrators.

    The cornerstone of the PKI is the private key used to encrypt or digitally sign information. If the private key is stolen, this will lead to the compromise of the authentication and non-repudiatio...
    Rule Medium Severity
  • SRG-APP-000211-AS-000146

    Group
  • The JBoss server must separate hosted application functionality from application server management functionality.

    The application server consists of the management interface and hosted applications. By separating the management interface from hosted applications, the user must authenticate as a privileged use...
    Rule Medium Severity
  • SRG-APP-000231-AS-000133

    Group
  • JBoss file permissions must be configured to protect the confidentiality and integrity of application files.

    The JBoss EAP Application Server is a Java-based AS. It is installed on the OS file system and depends upon file system access controls to protect application data at rest. The file permissions s...
    Rule Medium Severity
  • SRG-APP-000267-AS-000170

    Group
  • Access to JBoss log files must be restricted to authorized users.

    If the application provides too much information in error logs and administrative messages to the screen, this could lead to compromise. The structure and content of error messages need to be caref...
    Rule Medium Severity
  • SRG-APP-000316-AS-000199

    Group
  • Network access to HTTP management must be disabled on domain-enabled application servers not designated as the domain controller.

    When configuring JBoss application servers into a domain configuration, HTTP management capabilities are not required on domain member servers as management is done via the server that has been des...
    Rule Medium Severity
  • SRG-APP-000340-AS-000185

    Group
  • The application server must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Restrict...
    Rule Medium Severity
  • SRG-APP-000343-AS-000030

    Group
  • The JBoss server must be configured to log all admin activity.

    In order to be able to provide a forensic history of activity, the application server must ensure users who are granted a privileged role or those who utilize a separate distinct account when acces...
    Rule Medium Severity
  • SRG-APP-000358-AS-000064

    Group
  • The JBoss server must be configured to utilize syslog logging.

    Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited to...
    Rule Medium Severity
  • SRG-APP-000380-AS-000088

    Group
  • Production JBoss servers must not allow automatic application deployment.

    When dealing with access restrictions pertaining to change control, it should be noted that any changes to the software and/or application server configuration can potentially have significant effe...
    Rule Medium Severity
  • SRG-APP-000381-AS-000089

    Group
  • Production JBoss servers must log when failed application deployments occur.

    Without logging the enforcement of access restrictions against changes to the application server configuration, it will be difficult to identify attempted attacks, and a log trail will not be avail...
    Rule Medium Severity
  • SRG-APP-000381-AS-000089

    Group
  • Production JBoss servers must log when successful application deployments occur.

    Without logging the enforcement of access restrictions against changes to the application server configuration, it will be difficult to identify attempted attacks, and a log trail will not be avail...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules