Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000177-AS-000126

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must map the authenticated identity to the individual messaging user or group account for PKI-based authentication.

    &lt;VulnDiscussion&gt;The cornerstone of PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic...
    Rule Medium Severity
  • SRG-APP-000163-AS-000111

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.

    &lt;VulnDiscussion&gt;Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can p...
    Rule Medium Severity
  • SRG-APP-000148-AS-000101

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must use an enterprise user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthorized access, application server users must be uniquely identified and authentica...
    Rule Medium Severity
  • SRG-APP-000068-AS-000035

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server management interface must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.

    &lt;VulnDiscussion&gt;Messaging servers are required to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the ...
    Rule Medium Severity
  • SRG-APP-000089-AS-000050

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must generate log records for access and authentication events.

    &lt;VulnDiscussion&gt;Log records can be generated from various components within the messaging server. From a messaging server perspective, certai...
    Rule Medium Severity
  • SRG-APP-000224-AS-000152

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must generate a unique session identifier using a FIPS 140-2 approved random number generator.

    &lt;VulnDiscussion&gt;The messaging server will use session IDs to communicate between modules or applications within the messaging server and betw...
    Rule Medium Severity
  • SRG-APP-000394-AS-000241

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must authenticate all network-connected endpoint devices before establishing any connection.

    &lt;VulnDiscussion&gt;Device authentication requires unique identification and authentication that may be defined by type, by specific device, or b...
    Rule Medium Severity
  • SRG-APP-000395-AS-000109

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must authenticate all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.

    &lt;VulnDiscussion&gt;Device authentication requires unique identification and authentication that may be defined by type, by specific device, or b...
    Rule High Severity
  • SRG-APP-000514-AS-000136

    <GroupDescription></GroupDescription>
    Group
  • MQ Appliance messaging servers must use NIST-approved or NSA-approved key management technology and processes.

    &lt;VulnDiscussion&gt;An asymmetric encryption key must be protected during transmission. The public portion of an asymmetric key pair can be freel...
    Rule Medium Severity
  • SRG-APP-000179-AS-000129

    <GroupDescription></GroupDescription>
    Group
  • The MQ Appliance messaging server must utilize FIPS 140-2 approved encryption modules when authenticating users and processes.

    &lt;VulnDiscussion&gt;Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules