Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000001-AS-000001

    Group
  • The WebSphere Application Server maximum in-memory session count must be set according to application requirements.

    Application management includes the ability to control the number of sessions that utilize an application by all accounts and/or account types. Limiting the number of allowed sessions is helpful in...
    Rule Medium Severity
  • SRG-APP-000295-AS-000263

    Group
  • The WebSphere Application Server admin console session timeout must be configured.

    An attacker can take advantage of user sessions that are left open, thus bypassing the user authentication process. To thwart the vulnerability of open and unused user sessions, the application se...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    Group
  • The WebSphere Application Server automatic repository checkpoints must be enabled to track configuration changes.

    Without enabling repository checkpoints, you will not be able to determine the history of changes to WebSphere configuration files, and who made those changes.
    Rule Medium Severity
  • SRG-APP-000315-AS-000094

    Group
  • The WebSphere Application Server administrative security must be enabled.

    In previous releases of WebSphere® Application Server, when a user enabled global security, both administrative and application security were enabled. The previous notion of global security is spl...
    Rule High Severity
  • SRG-APP-000315-AS-000095

    Group
  • The WebSphere Application Server bus security must be enabled.

    A service integration bus is a group of one or more application servers or server clusters in a WebSphere® Application Server cell that cooperate to provide asynchronous messaging services. The app...
    Rule High Severity
  • SRG-APP-000016-AS-000013

    Group
  • The WebSphere Application Server security auditing must be enabled.

    Security auditing will not be performed unless the audit security subsystem has been enabled. Global security must be enabled for the security audit subsystem to function, as no security auditing o...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    Group
  • The WebSphere Application Server groups in the user registry mapped to WebSphere auditor roles must be configured in accordance with the security plan.

    Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident. Remote access by adm...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    Group
  • The WebSphere Application Server users in the WebSphere auditor role must be configured in accordance with the System Security Plan.

    Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident. Remote access by adm...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    Group
  • The WebSphere Application Server audit event type filters must be configured.

    Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident. Remote access by adm...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    Group
  • The WebSphere Application Server audit service provider must be enabled.

    Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident. Remote access by adm...
    Rule Medium Severity
  • SRG-APP-000315-AS-000094

    Group
  • The WebSphere Application Server users in a local user registry group must be authorized for that group.

    Application servers provide remote access capability and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requiremen...
    Rule Medium Severity
  • SRG-APP-000014-AS-000009

    Group
  • The WebSphere Application Server Quality of Protection (QoP) must be set to use TLSv1.2 or higher.

    Quality of Protection specifies the security level, ciphers, and mutual authentication settings for the Secure Socket Layer (SSL/TLS) configuration.
    Rule Medium Severity
  • SRG-APP-000014-AS-000009

    Group
  • The WebSphere Application Server global application security must be enabled.

    Application security enables security for the applications in your environment. This setting provides application isolation and meets security requirements such as using SSL for authenticating appl...
    Rule High Severity
  • SRG-APP-000014-AS-000009

    Group
  • The WebSphere Application Server Single Sign On (SSO) must have SSL enabled for Web and SIP Security.

    Remote management access is accomplished by leveraging common communication protocols and establishing a remote connection to the application server via a network for the purposes of managing the a...
    Rule High Severity
  • SRG-APP-000015-AS-000010

    Group
  • The WebSphere Application Server security cookies must be set to HTTPOnly.

    Web applications use cookies to track users across requests. These cookies, while typically not sensitive in themselves, connect you to your existing state on the back end system. If an intruder we...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    Group
  • The WebSphere Application Server Java 2 security must be enabled.

    Java 2 security provides a policy-based fine grained access control mechanism that increases overall system integrity by checking for permissions before allowing access to certain protected system ...
    Rule High Severity
  • SRG-APP-000033-AS-000024

    Group
  • The WebSphere Application Server Java 2 security must not be bypassed.

    WebSphere provides a passive filter mechanism that will allow administrators to set Java 2 security in the admin console as enabled while still allowing applications to access host resources. This ...
    Rule High Severity
  • SRG-APP-000033-AS-000024

    Group
  • The WebSphere Application Server users in the admin role must be authorized.

    Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    Group
  • The WebSphere Application Server LDAP groups must be authorized for the WebSphere role.

    Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement...
    Rule Medium Severity
  • SRG-APP-000340-AS-000185

    Group
  • The WebSphere Application Server users in a LDAP user registry group must be authorized for that group.

    Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Restrict...
    Rule Medium Severity
  • SRG-APP-000068-AS-000035

    Group
  • The WebSphere Application Server management interface must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.

    Application servers are required to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system management interface, providing privacy and security notices co...
    Rule Medium Severity
  • SRG-APP-000069-AS-000036

    Group
  • The WebSphere Application Server management interface must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.

    To establish acceptance of system usage policy, a click-through banner at the application server management interface logon is required. The banner shall prevent further activity on the application...
    Rule Medium Severity
  • SRG-APP-000091-AS-000052

    Group
  • The WebSphere Application Server must generate log records when successful/unsuccessful attempts to access subject privileges occur.

    Accessing a subject's privileges can be used to elevate a lower-privileged subject's privileges temporarily in order to cause harm to the application server or to gain privileges to operate tempora...
    Rule Low Severity
  • SRG-APP-000357-AS-000038

    Group
  • The WebSphere Application Server must allocate JVM log record storage capacity in accordance with organization-defined log record storage requirements.

    JVM logs are logs used to store application and runtime related events, rather than audit related events. They are mainly used to diagnose application or runtime bugs. But sometimes they may be use...
    Rule Medium Severity
  • SRG-APP-000357-AS-000038

    Group
  • The WebSphere Application Server must allocate audit log record storage capacity in accordance with organization-defined log record storage requirements.

    The proper management of log records not only dictates proper archiving processes and procedures be established, it also requires allocating enough storage space to maintain the logs online for a d...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules