No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000142-AAA-000020
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to use protocols that encrypt credentials when authenticating clients, as defined in the PPSM CAL and vulnerability assessments.
<VulnDiscussion>Authentication protection of the client credentials (specifically the password or shared secret) prevents unauthorized access...Rule High Severity -
SRG-APP-000023-AAA-000030
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to provide automated account management functions.
<VulnDiscussion>Enterprise environments make account management challenging and complex. A manual process for account management functions ad...Rule Medium Severity -
SRG-APP-000024-AAA-000050
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to automatically remove authorizations for temporary user accounts after 72 hours.
<VulnDiscussion>When temporary user accounts remain active after no longer needed or for an excessive period, these accounts may be used to g...Rule Medium Severity -
SRG-APP-000234-AAA-000060
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to prevent automatically removing emergency accounts.
<VulnDiscussion>Emergency accounts are administrator accounts that are established in response to crisis situations where the need for rapid ...Rule Medium Severity -
SRG-APP-000234-AAA-000070
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to prevent automatically disabling emergency accounts.
<VulnDiscussion>Emergency accounts are administrator accounts that are established in response to crisis situations where the need for rapid ...Rule Low Severity -
SRG-APP-000025-AAA-000080
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to automatically disable accounts after a 35-day period of account inactivity.
<VulnDiscussion>Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an applicatio...Rule Medium Severity -
SRG-APP-000026-AAA-000090
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to automatically audit account creation.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-APP-000027-AAA-000100
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to automatically audit account modification.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-APP-000028-AAA-000110
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to automatically audit account disabling actions.
<VulnDiscussion>When application accounts are disabled, user accessibility is affected. Once an attacker establishes access to an application...Rule Medium Severity -
SRG-APP-000029-AAA-000120
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to automatically audit account removal actions.
<VulnDiscussion>When application accounts are removed, user accessibility is affected. Once an attacker establishes access to an application,...Rule Medium Severity -
SRG-APP-000291-AAA-000130
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to notify the system administrators and ISSO when accounts are created.
<VulnDiscussion>Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...Rule Medium Severity -
SRG-APP-000292-AAA-000140
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to notify the system administrators and ISSO when accounts are modified.
<VulnDiscussion>When application accounts are modified, user accessibility is affected. Accounts are utilized for identifying individual user...Rule Medium Severity -
SRG-APP-000293-AAA-000150
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to notify the system administrators and ISSO for account disabling actions.
<VulnDiscussion>When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual user...Rule Medium Severity -
SRG-APP-000294-AAA-000160
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to notify the system administrators and ISSO for account removal actions.
<VulnDiscussion>When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for ide...Rule Medium Severity -
SRG-APP-000319-AAA-000170
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to automatically audit account enabling actions.
<VulnDiscussion>Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of reestabli...Rule Medium Severity -
SRG-APP-000320-AAA-000180
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to notify system administrators and ISSO of account enabling actions.
<VulnDiscussion>Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of reestabli...Rule Medium Severity -
SRG-APP-000329-AAA-000190
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to use Role-Based Access Control (RBAC) policy for levels of access authorization.
<VulnDiscussion>RBAC is an access control policy that restricts information system access to authorized users. Without these security policie...Rule Low Severity -
SRG-APP-000065-AAA-000200
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to automatically lock user accounts after three consecutive invalid logon attempts within a 15-minute time period.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-APP-000345-AAA-000210
<GroupDescription></GroupDescription>Group -
AAA Services must be configured to maintain locks on user accounts until released by an administrator.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-APP-000095-AAA-000220
<GroupDescription></GroupDescription>Group -
AAA Services configuration audit records must identify what type of events occurred.
<VulnDiscussion>Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events r...Rule Medium Severity -
SRG-APP-000096-AAA-000230
<GroupDescription></GroupDescription>Group -
AAA Services configuration audit records must identify when (date and time) the events occurred.
<VulnDiscussion>Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to a...Rule Medium Severity -
SRG-APP-000097-AAA-000240
<GroupDescription></GroupDescription>Group -
AAA Services configuration audit records must identify where the events occurred.
<VulnDiscussion>Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events relating to ...Rule Medium Severity -
SRG-APP-000098-AAA-000250
<GroupDescription></GroupDescription>Group -
AAA Services configuration audit records must identify the source of the events.
<VulnDiscussion>Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up...Rule Medium Severity -
SRG-APP-000099-AAA-000260
<GroupDescription></GroupDescription>Group -
AAA Services configuration audit records must identify the outcome of the events.
<VulnDiscussion>Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attac...Rule Medium Severity -
SRG-APP-000100-AAA-000270
<GroupDescription></GroupDescription>Group -
AAA Services configuration audit records must identify any individual user or process associated with the event.
<VulnDiscussion>Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.