Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000403

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies.

    &lt;VulnDiscussion&gt;Inappropriate access may be granted to unauthorized users if federal agency PIV credentials are not electronically verified. ...
    Rule Medium Severity
  • SRG-APP-000404

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must accept FICAM-approved third-party credentials.

    &lt;VulnDiscussion&gt;Access may be denied to legitimate users if FICAM-approved third-party credentials are not accepted. This requirement typic...
    Rule Medium Severity
  • SRG-APP-000405

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must conform to FICAM-issued profiles.

    &lt;VulnDiscussion&gt;Without conforming to FICAM-issued profiles, the information system may not be interoperable with FICAM-authentication protoc...
    Rule Medium Severity
  • SRG-APP-000409

    <GroupDescription></GroupDescription>
    Group
  • Mainframe Products must audit nonlocal maintenance and diagnostic sessions audit events as defined in site security plan.

    &lt;VulnDiscussion&gt;If events associated with nonlocal administrative access or diagnostic sessions are not logged and audited, a major tool for ...
    Rule Medium Severity
  • SRG-APP-000411

    <GroupDescription></GroupDescription>
    Group
  • Mainframe Products must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications.

    &lt;VulnDiscussion&gt;Privileged access contains control and configuration information which is particularly sensitive, so additional protections a...
    Rule Medium Severity
  • SRG-APP-000412

    <GroupDescription></GroupDescription>
    Group
  • Mainframe Products must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.

    &lt;VulnDiscussion&gt;Privileged access contains control and configuration information which is particularly sensitive, so additional protections a...
    Rule Medium Severity
  • SRG-APP-000413

    <GroupDescription></GroupDescription>
    Group
  • Mainframe Products must verify remote disconnection at the termination of nonlocal maintenance and diagnostic sessions.

    &lt;VulnDiscussion&gt;If the remote connection is not closed and verified as closed, the session may remain open and be exploited by an attacker; t...
    Rule Medium Severity
  • SRG-APP-000414

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must implement privileged access authorization to all information systems and infrastructure components for selected vulnerability scanning activities as defined in the site security plan.

    &lt;VulnDiscussion&gt;In certain situations, the nature of the vulnerability scanning may be more intrusive, or the information system component th...
    Rule Medium Severity
  • SRG-APP-000428

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must implement cryptographic mechanisms to prevent unauthorized modification of all information not cleared for public release at rest on system components outside of organization facilities.

    &lt;VulnDiscussion&gt;Applications handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized ...
    Rule Medium Severity
  • SRG-APP-000429

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must implement cryptographic mechanisms to prevent unauthorized disclosure of all information not cleared for public release at rest on system components outside of organization facilities.

    &lt;VulnDiscussion&gt;Applications handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules