Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000015-AS-000010

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must implement cryptography mechanisms to protect the integrity of the remote access session.

    &lt;VulnDiscussion&gt;Encryption is critical for protection of remote access sessions. If encryption is not being used for integrity, malicious use...
    Rule Medium Severity
  • SRG-APP-000358-AS-000064

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must off-load log records onto a different system or media from the system being logged.

    &lt;VulnDiscussion&gt;Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to...
    Rule Medium Severity
  • SRG-APP-000372-AS-000212

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must synchronize internal MQ Appliance messaging server clocks to an authoritative time source when the time difference is greater than the organization-defined time period.

    &lt;VulnDiscussion&gt;Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysi...
    Rule Low Severity
  • SRG-APP-000371-AS-000077

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must compare internal MQ Appliance messaging server clocks at least every 24 hours with an authoritative time source.

    &lt;VulnDiscussion&gt;Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysi...
    Rule Low Severity
  • SRG-APP-000416-AS-000140

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.

    &lt;VulnDiscussion&gt;Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested enc...
    Rule Medium Severity
  • SRG-APP-000400-AS-000246

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance WebGUI interface to the messaging server must prohibit the use of cached authenticators after one hour.

    &lt;VulnDiscussion&gt;When the messaging server is using PKI authentication, a local revocation cache must be stored for instances when the revocat...
    Rule Medium Severity
  • SRG-APP-000359-AS-000065

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must provide an immediate warning to the SA and ISSO, at a minimum, when allocated log record storage volume reaches 75% of maximum log record storage capacity.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log ...
    Rule Medium Severity
  • SRG-APP-000295-AS-000263

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must automatically terminate a SSH user session after organization-defined conditions or trigger events requiring a session disconnect.

    &lt;VulnDiscussion&gt;An attacker can take advantage of CLI user sessions that are left open, thus bypassing the user authentication process. To t...
    Rule Medium Severity
  • SRG-APP-000295-AS-000263

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance must automatically terminate a WebGUI user session after 600 seconds of idle time.

    &lt;VulnDiscussion&gt;An attacker can take advantage of WebGUI user sessions that are left open, thus bypassing the user authentication process. T...
    Rule Medium Severity
  • SRG-APP-000400-AS-000246

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance SSH interface to the messaging server must prohibit the use of cached authenticators after 600 seconds.

    &lt;VulnDiscussion&gt;When the messaging server is using PKI authentication, a local revocation cache must be stored for instances when the revocat...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules