Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000015-AS-000010

    Group
  • The Horizon Connection Server must be configured to only support TLS 1.2 connections.

    Preventing the disclosure of transmitted information requires that the application server take measures to employ strong cryptographic mechanisms to protect the information during transmission. Thi...
    Rule High Severity
  • SRG-APP-000015-AS-000010

    Group
  • The Blast Secure Gateway must be configured to only support TLS 1.2 connections.

    Preventing the disclosure of transmitted information requires that the application server take measures to employ strong cryptographic mechanisms to protect the information during transmission. Thi...
    Rule High Severity
  • SRG-APP-000015-AS-000010

    Group
  • The Horizon Connection Server must force server cipher preference.

    By default, during the initial setup of a Transport Layer Security (TLS) connection to the Horizon Connection Server, the client sends a list of supported cipher suites in order of preference. The ...
    Rule High Severity
  • SRG-APP-000016-AS-000013

    Group
  • The Horizon Connection Server must be configured to debug level logging.

    To ensure that all security-relevant information and events are logged, the Horizon Connection Server must be configured with the "debug" logging level. This is the default value but since it could...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    Group
  • The Horizon Connection Server administrators must be limited in terms of quantity, scope, and permissions.

    Role based access and least privilege are two fundamental security concepts that must be properly implemented in Horizon View to ensure the right user and groups have the right permissions on the r...
    Rule Medium Severity
  • SRG-APP-000080-AS-000045

    Group
  • The Horizon Connection Server must require DoD PKI for administrative logins.

    The Horizon Connection Server console supports CAC login as required for cryptographic non-repudiation. CAC login can be configured as disabled, optional or required but for maximum assurance it mu...
    Rule High Severity
  • SRG-APP-000089-AS-000050

    Group
  • The Horizon Connection Server must be configured with an events database.

    The Horizon Connection Server stores application level events and actions in a dedicated database versus log files. This makes day-to-day administration easier while offloading these events to a se...
    Rule Medium Severity
  • SRG-APP-000090-AS-000051

    Group
  • The Horizon Connection Server must limit access to the global configuration privilege.

    The Horizon Connection Server comes with pre-defined privileges that can be combined in any combination into a role. That role is then assigned to a user or group. Any role that has the "Manage Glo...
    Rule Medium Severity
  • SRG-APP-000175-AS-000124

    Group
  • The Horizon Connection Server must perform full path validation on server-to-server TLS connection certificates.

    The Horizon Connection Server performs certificate revocation checking on its own certificate and on those of the security servers paired to it. Each instance also checks the certificates of vCente...
    Rule Medium Severity
  • SRG-APP-000175-AS-000124

    Group
  • The Horizon Connection Server must validate client and administrator certificates.

    The Horizon Connection Server can be configured to check the revocation status of PKI certificates over both OCSP and CRL. This capability is disabled by default and must be enabled post-deployment...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules