Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000400-DB-000367

    <GroupDescription></GroupDescription>
    Group
  • MarkLogic Server must prohibit the use of cached authenticators after an organization-defined time period.

    &lt;VulnDiscussion&gt;If cached authentication information is out-of-date, the validity of the authentication information may be questionable.&lt;/...
    Rule Medium Severity
  • SRG-APP-000427-DB-000385

    <GroupDescription></GroupDescription>
    Group
  • MarkLogic Server must only accept end-entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.

    &lt;VulnDiscussion&gt;Only DoD-approved external PKIs have been evaluated to ensure that they have security controls and identity vetting procedure...
    Rule Medium Severity
  • SRG-APP-000428-DB-000386

    <GroupDescription></GroupDescription>
    Group
  • MarkLogic Server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.

    &lt;VulnDiscussion&gt;DBMSs handling data requiring data-at-rest protections must employ cryptographic mechanisms to prevent unauthorized disclosur...
    Rule Medium Severity
  • SRG-APP-000429-DB-000387

    <GroupDescription></GroupDescription>
    Group
  • MarkLogic Server must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.

    &lt;VulnDiscussion&gt;DBMSs handling data requiring data-at-rest protections must employ cryptographic mechanisms to prevent unauthorized disclosur...
    Rule Medium Severity
  • SRG-APP-000456-DB-000390

    <GroupDescription></GroupDescription>
    Group
  • Security-relevant software updates to MarkLogic Server must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    &lt;VulnDiscussion&gt;Security flaws with software applications, including database management systems, are discovered daily. Vendors are constantl...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules