Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • All Web applications included with Apache Tomcat that are not required must be removed.

    &lt;VulnDiscussion&gt;Removal of unneeded or non-secure functions, ports, protocols, and services mitigate the risk of unauthorized connection of d...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • LockOutRealm must not be removed from Apache Tomcat.

    &lt;VulnDiscussion&gt;LockOutRealm prevents brute force attacks against user passwords. Removal of unneeded or non-secure functions, ports, protoco...
    Rule Medium Severity
  • SRG-APP-000065

    <GroupDescription></GroupDescription>
    Group
  • The LockOutRealm must be configured with a login failure count of 3.

    &lt;VulnDiscussion&gt;LockOutRealm prevents brute force attacks against user passwords. Removal of unneeded or non-secure functions, ports, protoco...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The LockOutRealm must be configured with a login lockout time of 15 minutes.

    &lt;VulnDiscussion&gt;LockOutRealm prevents brute force attacks against user passwords. Removal of unneeded or non-secure functions, ports, protoco...
    Rule Medium Severity
  • SRG-APP-000164

    <GroupDescription></GroupDescription>
    Group
  • The Manager Web app password must be configured as follows: -15 or more characters -at least one lower case letter -at least one upper case letter -at least one number -at least one special character

    &lt;VulnDiscussion&gt;The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...
    Rule Medium Severity
  • SRG-APP-000439

    <GroupDescription></GroupDescription>
    Group
  • The ISEC7 EMM Suite must configure Enable HTTPS to use HTTP over SSL in Apache Tomcat.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • The version number of Apache Tomcat must be removed from the CATALINA_HOME/lib/catalina.jar file.

    &lt;VulnDiscussion&gt;If the version number of Apache Tomcat were visible to an intruder, they could use that information to search for known vulne...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Stack tracing must be disabled in Apache Tomcat.

    &lt;VulnDiscussion&gt;The default error page shows a full stack trace, which is a disclosure of sensitive information. Removal of unneeded or non-s...
    Rule Medium Severity
  • SRG-APP-000380

    <GroupDescription></GroupDescription>
    Group
  • The Apache Tomcat shutdown port must be disabled.

    &lt;VulnDiscussion&gt;Tomcat uses a port (defaults to 8005) as a shutdown port. Someone could Telnet to the machine using this port and send the de...
    Rule Medium Severity
  • SRG-APP-000380

    <GroupDescription></GroupDescription>
    Group
  • The ISEC7 EMM Suite must remove any unnecessaryusers or groups that have permissions to the server.xml file in Apache Tomcat.

    &lt;VulnDiscussion&gt;Tomcat uses a port (defaults to 8005) as a shutdown port. Someone could Telnet to the machine using this port and send the de...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules