Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000001-AS-000001

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server maximum in-memory session count must be set according to application requirements.

    &lt;VulnDiscussion&gt;Application management includes the ability to control the number of sessions that utilize an application by all accounts and...
    Rule Medium Severity
  • SRG-APP-000295-AS-000263

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server admin console session timeout must be configured.

    &lt;VulnDiscussion&gt;An attacker can take advantage of user sessions that are left open, thus bypassing the user authentication process. To thwar...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server automatic repository checkpoints must be enabled to track configuration changes.

    &lt;VulnDiscussion&gt;Without enabling repository checkpoints, you will not be able to determine the history of changes to WebSphere configuration ...
    Rule Medium Severity
  • SRG-APP-000315-AS-000094

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server administrative security must be enabled.

    &lt;VulnDiscussion&gt;In previous releases of WebSphere® Application Server, when a user enabled global security, both administrative and applicati...
    Rule High Severity
  • SRG-APP-000315-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server bus security must be enabled.

    &lt;VulnDiscussion&gt;A service integration bus is a group of one or more application servers or server clusters in a WebSphere® Application Server...
    Rule High Severity
  • SRG-APP-000016-AS-000013

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server security auditing must be enabled.

    &lt;VulnDiscussion&gt;Security auditing will not be performed unless the audit security subsystem has been enabled. Global security must be enabled...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server groups in the user registry mapped to WebSphere auditor roles must be configured in accordance with the security plan.

    &lt;VulnDiscussion&gt;Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed f...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server users in the WebSphere auditor role must be configured in accordance with the System Security Plan.

    &lt;VulnDiscussion&gt;Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed f...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server audit event type filters must be configured.

    &lt;VulnDiscussion&gt;Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed f...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server audit service provider must be enabled.

    &lt;VulnDiscussion&gt;Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed f...
    Rule Medium Severity
  • SRG-APP-000315-AS-000094

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server users in a local user registry group must be authorized for that group.

    &lt;VulnDiscussion&gt;Application servers provide remote access capability and must be able to enforce remote access policy requirements or work in...
    Rule Medium Severity
  • SRG-APP-000014-AS-000009

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server Quality of Protection (QoP) must be set to use TLSv1.2 or higher.

    &lt;VulnDiscussion&gt;Quality of Protection specifies the security level, ciphers, and mutual authentication settings for the Secure Socket Layer (...
    Rule Medium Severity
  • SRG-APP-000014-AS-000009

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server global application security must be enabled.

    &lt;VulnDiscussion&gt;Application security enables security for the applications in your environment. This setting provides application isolation a...
    Rule High Severity
  • SRG-APP-000014-AS-000009

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server Single Sign On (SSO) must have SSL enabled for Web and SIP Security.

    &lt;VulnDiscussion&gt;Remote management access is accomplished by leveraging common communication protocols and establishing a remote connection to...
    Rule High Severity
  • SRG-APP-000015-AS-000010

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server security cookies must be set to HTTPOnly.

    &lt;VulnDiscussion&gt;Web applications use cookies to track users across requests. These cookies, while typically not sensitive in themselves, conn...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server Java 2 security must be enabled.

    &lt;VulnDiscussion&gt;Java 2 security provides a policy-based fine grained access control mechanism that increases overall system integrity by chec...
    Rule High Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server Java 2 security must not be bypassed.

    &lt;VulnDiscussion&gt;WebSphere provides a passive filter mechanism that will allow administrators to set Java 2 security in the admin console as e...
    Rule High Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server users in the admin role must be authorized.

    &lt;VulnDiscussion&gt;Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policie...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server LDAP groups must be authorized for the WebSphere role.

    &lt;VulnDiscussion&gt;Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policie...
    Rule Medium Severity
  • SRG-APP-000340-AS-000185

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server users in a LDAP user registry group must be authorized for that group.

    &lt;VulnDiscussion&gt;Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or proce...
    Rule Medium Severity
  • SRG-APP-000068-AS-000035

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server management interface must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.

    &lt;VulnDiscussion&gt;Application servers are required to display the Standard Mandatory DoD Notice and Consent Banner before granting access to th...
    Rule Medium Severity
  • SRG-APP-000069-AS-000036

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server management interface must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.

    &lt;VulnDiscussion&gt;To establish acceptance of system usage policy, a click-through banner at the application server management interface logon i...
    Rule Medium Severity
  • SRG-APP-000091-AS-000052

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server must generate log records when successful/unsuccessful attempts to access subject privileges occur.

    &lt;VulnDiscussion&gt;Accessing a subject's privileges can be used to elevate a lower-privileged subject's privileges temporarily in order to cause...
    Rule Low Severity
  • SRG-APP-000357-AS-000038

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server must allocate JVM log record storage capacity in accordance with organization-defined log record storage requirements.

    &lt;VulnDiscussion&gt;JVM logs are logs used to store application and runtime related events, rather than audit related events. They are mainly use...
    Rule Medium Severity
  • SRG-APP-000357-AS-000038

    <GroupDescription></GroupDescription>
    Group
  • The WebSphere Application Server must allocate audit log record storage capacity in accordance with organization-defined log record storage requirements.

    &lt;VulnDiscussion&gt;The proper management of log records not only dictates proper archiving processes and procedures be established, it also requ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules