II - Mission Support Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000360-AS-000066
Group -
The WebSphere Application Server must provide an immediate real-time alert to authorized users of all log failure events requiring real-time alerts.
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures include software/hardware errors, failures in the log...Rule Medium Severity -
SRG-APP-000108-AS-000067
Group -
The WebSphere Application Server must alert the SA and ISSO, at a minimum, in the event of a log processing failure.
Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a security incident. When log processing fails, the events during the failure...Rule Low Severity -
SRG-APP-000108-AS-000067
Group -
The WebSphere Application Server audit subsystem failure action must be set to Log warning.
Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a security incident. When log processing fails, the events during the failure...Rule Medium Severity -
SRG-APP-000109-AS-000068
Group -
The WebSphere Application Server must shut down by default upon log failure (unless availability is an overriding concern).
It is critical that, when a system is at risk of failing to process logs, it detects and takes action to mitigate the failure. Log processing failures include software/hardware errors, failures in ...Rule Low Severity -
SRG-APP-000109-AS-000070
Group -
The WebSphere Application Server high availability applications must be configured to fail over to another system in the event of log subsystem failure.
This requirement is dependent upon system MAC and availability. If the system MAC and availability do not specify redundancy requirements, this requirement is NA. It is critical that, when a syste...Rule Low Severity -
SRG-APP-000118-AS-000078
Group -
The WebSphere Application Server must be configured to protect log information from any type of unauthorized read access.
WebSphere uses role-based access controls to restrict access to log data. To take advantage of this capability, WebSphere administrators must identify specific users and place them into their respe...Rule Low Severity -
SRG-APP-000119-AS-000079
Group -
The WebSphere Application Server must protect log information from unauthorized modification.
WebSphere uses role-based access controls to restrict access to log data. To take advantage of this capability, WebSphere administrators must identify specific users and place them into their respe...Rule Medium Severity -
SRG-APP-000120-AS-000080
Group -
The WebSphere Application Server must protect log information from unauthorized deletion.
WebSphere uses role based access controls to restrict access to log data. To take advantage of this capability, WebSphere administrators must identify specific users and place them into their respe...Rule Medium Severity -
SRG-APP-000121-AS-000081
Group -
The WebSphere Application Server wsadmin file must be protected from unauthorized access.
Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon the log format and application, system and application log tools may pr...Rule Medium Severity -
SRG-APP-000122-AS-000082
Group -
The WebSphere Application Server wsadmin file must be protected from unauthorized modification.
Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon the log format and application, system and application log tools may pr...Rule Medium Severity -
SRG-APP-000123-AS-000083
Group -
The WebSphere Application Server wsadmin file must be protected from unauthorized deletion.
Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon the log format and application, system and application log tools may pr...Rule Medium Severity -
SRG-APP-000126-AS-000085
Group -
The WebSphere Application Server must be configured to encrypt log information.
Protection of log records is of critical importance. Encrypting log records provides a level of protection that does not rely on host-based protections that can be accidentally misconfigured, such ...Rule Medium Severity -
SRG-APP-000126-AS-000085
Group -
The WebSphere Application Server must be configured to sign log information.
Protection of log records is of critical importance. Encrypting log records provides a level of protection that does not rely on host-based protections that can be accidentally misconfigured, such ...Rule Medium Severity -
SRG-APP-000141-AS-000095
Group -
The WebSphere Application Server process must not be started from the command line with the -password option.
The use of the -password option to launch a WebSphere process from the command line can result in a security exposure. Password information may become visible to any user with the ability to view s...Rule Medium Severity -
SRG-APP-000141-AS-000095
Group -
The WebSphere Application Server files must be owned by the non-root WebSphere user ID.
Having files owned by the root or administrator user is an indication that the WebSphere processes are being run with escalated privileges. Running as root/admin user gives attackers elevated privi...Rule Medium Severity -
SRG-APP-000141-AS-000095
Group -
The WebSphere Application Server sample applications must be removed.
WebSphere samples are not intended for use in a production environment. Do not run them there, as they create significant security risks. In particular, the snoop servlet can provide an outsider wi...Rule Low Severity -
SRG-APP-000141-AS-000095
Group -
The WebSphere Application Server must remove JREs left by web server and plug-in installers for web servers and plugins running in the DMZ.
When you install IBM HTTP Server, the installer leaves behind a JRE. Remove this JRE, as it provides functions that are not needed by the Web server or plug-in under normal conditions. Keep in mind...Rule Low Severity -
SRG-APP-000141-AS-000095
Group -
The WebSphere Application Server must be run as a non-admin user.
Running WebSphere as an admin user gives attackers immediate admin privileges in the event the WebSphere processes are compromised. Best practice is to operate the WebSphere server with an accoun...Rule Medium Severity -
SRG-APP-000141-AS-000095
Group -
The WebSphere Application Server must disable JSP class reloading.
Application servers provide a myriad of differing processes, features, and functionalities. Some of these processes may be deemed to be unnecessary or too unsecure to run on a production DoD system...Rule Medium Severity -
SRG-APP-000142-AS-000014
Group -
The WebSphere Application Server must prohibit or restrict the use of nonsecure ports, protocols, modules, and/or services as defined in the PPSM CAL and vulnerability assessments.
Some networking protocols may not meet organizational security requirements to protect data and components. Application servers natively host a number of various features, such as management inter...Rule Medium Severity -
SRG-APP-000148-AS-000101
Group -
The WebSphere Application Server LDAP user registry must be used.
To assure accountability and prevent unauthorized access, application server users must be uniquely identified and authenticated. This is typically accomplished via the use of a user store which is...Rule Medium Severity -
SRG-APP-000148-AS-000101
Group -
The WebSphere Application Server local file-based user registry must not be used.
WebSphere does not provide direct audit of changes to the built-in file registry. The built-in file registry must not be used to support user logon accounts. Use an LDAP/AD server and manage user a...Rule Medium Severity -
SRG-APP-000149-AS-000102
Group -
The WebSphere Application Server multifactor authentication for network access to privileged accounts must be used.
Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the application server. If one factor is compromised or broken, the attacker st...Rule Medium Severity -
SRG-APP-000156-AS-000106
Group -
The WebSphere Application Server must provide security extensions to extend the SOAP protocol and provide secure authentication when accessing sensitive data.
Application servers may provide a web services capability that could be leveraged to allow remote access to sensitive application data. A web service which is a repeatable process used to make data...Rule Medium Severity -
SRG-APP-000156-AS-000106
Group -
The WebSphere Application Server must provide security extensions to extend the SOAP protocol and provide secure authentication when accessing sensitive data.
Application servers may provide a web services capability that could be leveraged to allow remote access to sensitive application data. A web service, which is a repeatable process used to make dat...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.