Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000383

    Group
  • The version number of Apache Tomcat must be removed from the CATALINA_HOME/lib/catalina.jar file.

    If the version number of Apache Tomcat were visible to an intruder, they could use that information to search for known vulnerabilities of the app. Removal of unneeded or non-secure functions, port...
    Rule Medium Severity
  • SRG-APP-000383

    Group
  • Stack tracing must be disabled in Apache Tomcat.

    The default error page shows a full stack trace, which is a disclosure of sensitive information. Removal of unneeded or non-secure functions, ports, protocols, and services mitigate the risk of una...
    Rule Medium Severity
  • SRG-APP-000380

    Group
  • The Apache Tomcat shutdown port must be disabled.

    Tomcat uses a port (defaults to 8005) as a shutdown port. Someone could Telnet to the machine using this port and send the default command SHUTDOWN. Tomcat and all web apps would shut down in that ...
    Rule Medium Severity
  • SRG-APP-000380

    Group
  • The ISEC7 EMM Suite must remove any unnecessaryusers or groups that have permissions to the server.xml file in Apache Tomcat.

    Tomcat uses a port (defaults to 8005) as a shutdown port. Someone could Telnet to the machine using this port and send the default command SHUTDOWN. Tomcat and all web apps would shut down in that ...
    Rule Medium Severity
  • SRG-APP-000090

    Group
  • A manager role must be assigned to the Apache Tomcat Web apps (Manager, Host-Manager).

    If a manager role is not assigned to the Apache Tomcat web apps, the system administrator will not be able to manage and configure the web apps and security setting may not be configured correctly,...
    Rule Medium Severity
  • SRG-APP-000439

    Group
  • SSL must be enabled on Apache Tomcat.

    Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. This requiremen...
    Rule Medium Severity
  • SRG-APP-000439

    Group
  • Tomcat SSL must be restricted except for ISEC7 EMM Suite tasks.

    Restricting the use of SSL helps ensure only authorized users and processes have access to Tomcat Web apps and reduces the attack surface of the ISEC7 EMM Suite. Without protection of the transmitt...
    Rule Medium Severity
  • SRG-APP-000001

    Group
  • The ISEC7 EMM Suite must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.

    Application management includes the ability to control the number of users and user sessions that utilize an application. Limiting the number of allowed users and sessions per user is helpful in li...
    Rule Medium Severity
  • SRG-APP-000003

    Group
  • The ISEC7 EMM Suite must initiate a session lock after a 15-minute period of inactivity.

    A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system, but does not log out because of the tempora...
    Rule Medium Severity
  • SRG-APP-000014

    Group
  • The ISEC7 EMM Suite must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.

    Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks that exploit vulnerabilities in this protocol. This requ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules