III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000109-AS-000070
Group -
The MQ Appliance messaging server must be configured to fail over to another system in the event of log subsystem failure.
This requirement is dependent upon system MAC and availability. If the system MAC and availability do not specify redundancy requirements, this requirement is NA. It is critical that, when a syste...Rule Medium Severity -
SRG-APP-000225-AS-000154
Group -
The MQ Appliance messaging server must provide a clustering capability.
This requirement is dependent upon system criticality and confidentiality requirements. If the system categorization and confidentiality levels do not specify redundancy requirements, this requirem...Rule Medium Severity -
SRG-APP-000219-AS-000147
Group -
The MQ Appliance messaging server must ensure authentication of both SSH client and server during the entire session.
This control focuses on communications protection at the session, versus packet level. At the application layer, session IDs are tokens generated by web applications to uniquely identify an applic...Rule Medium Severity -
SRG-APP-000158-AS-000108
Group -
The MQ Appliance messaging server must uniquely identify all network-connected endpoint devices before establishing any connection.
Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. For distributed messaging servers and components, the decisions regarding t...Rule Medium Severity -
SRG-APP-000172-AS-000121
Group -
Access to the MQ Appliance messaging server must utilize encryption when using LDAP for authentication.
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. Messaging servers have the capability to utilize LDAP directories ...Rule Medium Severity -
SRG-APP-000177-AS-000126
Group -
The MQ Appliance messaging server must map the authenticated identity to the individual messaging user or group account for PKI-based authentication.
The cornerstone of PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information, but the key can ...Rule Medium Severity -
SRG-APP-000163-AS-000111
Group -
The MQ Appliance must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can potentially obtain and maintain undetected access to the application. Own...Rule Medium Severity -
SRG-APP-000148-AS-000101
Group -
The MQ Appliance messaging server must use an enterprise user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users).
To assure accountability and prevent unauthorized access, application server users must be uniquely identified and authenticated. This is typically accomplished via the use of a user store which is...Rule Medium Severity -
SRG-APP-000068-AS-000035
Group -
The MQ Appliance messaging server management interface must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
Messaging servers are required to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system management interface, providing privacy and security notices cons...Rule Medium Severity -
SRG-APP-000089-AS-000050
Group -
The MQ Appliance messaging server must generate log records for access and authentication events.
Log records can be generated from various components within the messaging server. From a messaging server perspective, certain specific messaging server functionalities may be logged as well. The m...Rule Medium Severity -
SRG-APP-000224-AS-000152
Group -
The MQ Appliance messaging server must generate a unique session identifier using a FIPS 140-2 approved random number generator.
The messaging server will use session IDs to communicate between modules or applications within the messaging server and between the messaging server and users. The session ID allows the applicatio...Rule Medium Severity -
SRG-APP-000394-AS-000241
Group -
The MQ Appliance messaging server must authenticate all network-connected endpoint devices before establishing any connection.
Device authentication requires unique identification and authentication that may be defined by type, by specific device, or by a combination of type and device. Device authentication is accomplish...Rule Medium Severity -
SRG-APP-000395-AS-000109
Group -
The MQ Appliance messaging server must authenticate all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
Device authentication requires unique identification and authentication that may be defined by type, by specific device, or by a combination of type and device. Bidirectional authentication provid...Rule High Severity -
SRG-APP-000514-AS-000136
Group -
MQ Appliance messaging servers must use NIST-approved or NSA-approved key management technology and processes.
An asymmetric encryption key must be protected during transmission. The public portion of an asymmetric key pair can be freely distributed without fear of compromise, and the private portion of the...Rule Medium Severity -
SRG-APP-000179-AS-000129
Group -
The MQ Appliance messaging server must utilize FIPS 140-2 approved encryption modules when authenticating users and processes.
Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon to provide confidentiality or integrity, and D...Rule Medium Severity -
SRG-APP-000343-AS-000030
Group -
The MQ Appliance messaging server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.
In order to be able to provide a forensic history of activity, the messaging server must ensure users who are granted a privileged role or those who utilize a separate distinct account when accessi...Rule Medium Severity -
SRG-APP-000427-AS-000264
Group -
The MQ Appliance messaging server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected (messaging) sessions.
Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD systems or by organizations with insufficient secur...Rule Medium Severity -
SRG-APP-000080-AS-000045
Group -
The MQ Appliance messaging server must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
Non-repudiation of actions taken is required in order to messaging service application integrity. Examples of particular actions taken by individuals include creating information, sending a message...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.