Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • The DBMS must employ cryptographic mechanisms to protect the integrity and confidentiality of non-local maintenance and diagnostic communications.

    &lt;VulnDiscussion&gt;Non-local maintenance and diagnostic activities are those activities conducted by individuals communicating through a network...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • The DBMS must employ strong identification and authentication techniques when establishing non-local maintenance and diagnostic sessions.

    &lt;VulnDiscussion&gt;Non-local maintenance and diagnostic activities are those activities conducted by individuals communicating through a network...
    Rule Medium Severity
  • SRG-APP-000295-DB-000305

    <GroupDescription></GroupDescription>
    Group
  • The DBMS must terminate the network connection associated with a communications session at the end of the session or after 15 minutes of inactivity.

    &lt;VulnDiscussion&gt;Non-local maintenance and diagnostic activities are those activities conducted by individuals communicating through a network...
    Rule Medium Severity
  • SRG-APP-000179-DB-000114

    <GroupDescription></GroupDescription>
    Group
  • The DBMS must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.

    &lt;VulnDiscussion&gt;Use of cryptography to provide confidentiality and non-repudiation is not effective unless strong methods are employed. Many ...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Database data files containing sensitive information must be encrypted.

    &lt;VulnDiscussion&gt;Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested e...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • The DBMS must automatically terminate emergency accounts after an organization-defined time period for each type of account.

    &lt;VulnDiscussion&gt;Emergency application accounts are typically created due to an unforeseen operational event or could ostensibly be used in th...
    Rule Medium Severity
  • SRG-APP-000001-DB-000031

    <GroupDescription></GroupDescription>
    Group
  • The DBMS must protect against or limit the effects of the organization-defined types of Denial of Service (DoS) attacks.

    &lt;VulnDiscussion&gt;A variety of technologies exist to limit, or in some cases, eliminate the effects of DoS attacks. For example, boundary prote...
    Rule Medium Severity
  • SRG-APP-000133-DB-000179

    <GroupDescription></GroupDescription>
    Group
  • The DBMS must verify there have not been unauthorized changes to the DBMS software and information.

    &lt;VulnDiscussion&gt;Organizations are required to employ integrity verification applications on information systems to look for evidence of infor...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • The DBMS must support taking organization-defined list of least disruptive actions to terminate suspicious events.

    &lt;VulnDiscussion&gt;System availability is a key tenet of system security. Organizations need to have the flexibility to be able to define the au...
    Rule Medium Severity
  • SRG-APP-000133-DB-000198

    <GroupDescription></GroupDescription>
    Group
  • Use of the DBMS software installation account must be restricted.

    &lt;VulnDiscussion&gt;This requirement is intended to limit exposure due to operating from within a privileged account or role. The inclusion of ro...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules