No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000508
<GroupDescription></GroupDescription>Group -
The Mainframe Product must generate audit records for all direct access to the information system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000509
<GroupDescription></GroupDescription>Group -
The Mainframe Product must generate audit records for all account creations, modifications, disabling, and termination events.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000510
<GroupDescription></GroupDescription>Group -
The Mainframe Product must generate audit records for all kernel module load, unload, and restart events, and for all program initiations.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000514
<GroupDescription></GroupDescription>Group -
The Mainframe Product must implement NIST FIPS-validated cryptography to provision digital signatures in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application mu...Rule Medium Severity -
SRG-APP-000514
<GroupDescription></GroupDescription>Group -
The Mainframe Product must implement NIST FIPS-validated cryptography to generate and validate cryptographic hashes in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application mu...Rule Medium Severity -
SRG-APP-000514
<GroupDescription></GroupDescription>Group -
The Mainframe Product must implement NIST FIPS-validated cryptography to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application mu...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The Mainframe Product must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
<VulnDiscussion>Configuring the application to implement organization-wide security implementation guides and security checklists ensures com...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The Mainframe Product must provide the capability for authorized users to select a user session to capture/record or view/hear.
<VulnDiscussion>Without the capability to select a user session to capture/record or view/hear, investigations into suspicious or harmful eve...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The Mainframe Product must provide the capability for authorized users to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored.
<VulnDiscussion>Without the capability to remotely view/hear all content related to a user session, investigations into suspicious user activ...Rule Medium Severity -
SRG-APP-000416
<GroupDescription></GroupDescription>Group -
The Mainframe Product must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application mu...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.