Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000292

    <GroupDescription></GroupDescription>
    Group
  • The container platform must notify system administrators and ISSO when accounts are modified.

    &lt;VulnDiscussion&gt;When application accounts are modified, user accessibility is affected. Accounts are utilized for identifying individual user...
    Rule Medium Severity
  • SRG-APP-000293

    <GroupDescription></GroupDescription>
    Group
  • The container platform must notify system administrators and ISSO for account disabling actions.

    &lt;VulnDiscussion&gt;When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual user...
    Rule Medium Severity
  • SRG-APP-000294

    <GroupDescription></GroupDescription>
    Group
  • The container platform must notify system administrators and ISSO for account removal actions.

    &lt;VulnDiscussion&gt;When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for ide...
    Rule Medium Severity
  • SRG-APP-000297

    <GroupDescription></GroupDescription>
    Group
  • Access to the container platform must display an explicit logout message to user indicating the reliable termination of authenticated communication sessions.

    &lt;VulnDiscussion&gt;Access to the container platform will occur through web and terminal sessions. Any web interfaces must conform to application...
    Rule Low Severity
  • SRG-APP-000317

    <GroupDescription></GroupDescription>
    Group
  • The container platform must terminate shared/group account credentials when members leave the group.

    &lt;VulnDiscussion&gt;If shared/group account credentials are not terminated when individuals leave the group, the user that left the group can sti...
    Rule Medium Severity
  • SRG-APP-000319

    <GroupDescription></GroupDescription>
    Group
  • The container platform must automatically audit account-enabling actions.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...
    Rule Medium Severity
  • SRG-APP-000320

    <GroupDescription></GroupDescription>
    Group
  • The container platform must notify system administrator and ISSO of account enabling actions.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...
    Rule Medium Severity
  • SRG-APP-000340

    <GroupDescription></GroupDescription>
    Group
  • The container platform must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    &lt;VulnDiscussion&gt;Controlling what users can perform privileged functions prevents unauthorized users from performing tasks that may expose dat...
    Rule Medium Severity
  • SRG-APP-000342

    <GroupDescription></GroupDescription>
    Group
  • Container images instantiated by the container platform must execute using least privileges.

    &lt;VulnDiscussion&gt;Containers running within the container platform must execute as non-privileged. When a container can execute as a privileged...
    Rule Medium Severity
  • SRG-APP-000343

    <GroupDescription></GroupDescription>
    Group
  • The container platform must audit the execution of privileged functions.

    &lt;VulnDiscussion&gt;Privileged functions within the container platform can be component specific or can envelope the entire container platform. B...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules