Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • SharePoint must implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions.

    &lt;VulnDiscussion&gt;The information system isolates security functions from nonsecurity functions by means of an isolation boundary (implemented ...
    Rule High Severity
  • SRG-APP-000238

    <GroupDescription></GroupDescription>
    Group
  • SharePoint must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.

    &lt;VulnDiscussion&gt;The information system isolates security functions from nonsecurity functions by means of an isolation boundary (implemented ...
    Rule Medium Severity
  • SRG-APP-000440

    <GroupDescription></GroupDescription>
    Group
  • SharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures.

    &lt;VulnDiscussion&gt;Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptogr...
    Rule High Severity
  • SRG-APP-000340

    <GroupDescription></GroupDescription>
    Group
  • SharePoint must prevent non-privileged users from circumventing malicious code protection capabilities.

    &lt;VulnDiscussion&gt;Malicious code protection software must be protected to prevent a non-privileged user or malicious piece of software from dis...
    Rule High Severity
  • SRG-APP-000179

    <GroupDescription></GroupDescription>
    Group
  • SharePoint must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.

    &lt;VulnDiscussion&gt;Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. D...
    Rule High Severity
  • SRG-APP-000212

    <GroupDescription></GroupDescription>
    Group
  • The SharePoint Central Administration site must not be accessible from Extranet or Internet connections.

    &lt;VulnDiscussion&gt;SharePoint must prevent the presentation of information system management-related functionality at an interface utilized by g...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • For environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed, must not be installed in the DMZ.

    &lt;VulnDiscussion&gt;Information flow control regulates where information is allowed to travel within an information system and between informatio...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The SharePoint farm service account (database access account) must be configured with minimum privileges in Active Directory (AD).

    &lt;VulnDiscussion&gt;Separation of duties is a prevalent Information Technology control implemented at different layers of the information system ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The SharePoint farm service account (database access account) must be configured with minimum privileges on the SQL server.

    &lt;VulnDiscussion&gt;Separation of duties is a prevalent Information Technology control implemented at different layers of the information system ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The SharePoint setup account must be configured with the minimum privileges in Active Directory.

    &lt;VulnDiscussion&gt;Separation of duties is a prevalent Information Technology control implemented at different layers of the information system ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules