Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000400-DB-000367

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must prohibit the use of cached authenticators after an organization-defined time period.

    &lt;VulnDiscussion&gt;If cached authentication information is out of date, the validity of the authentication information may be questionable. For...
    Rule Medium Severity
  • SRG-APP-000175-DB-000067

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. A certificate's certification path is the path from th...
    Rule Medium Severity
  • SRG-APP-000176-DB-000068

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must enforce authorized access to all PKI private keys stored/used by Redis Enterprise DBMS.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. PKI certificate-based authentication is performed by re...
    Rule High Severity
  • SRG-APP-000177-DB-000069

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must map the PKI-authenticated identity to an associated user account.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Once a PKI certificate has been validated, it must be m...
    Rule Medium Severity
  • SRG-APP-000178-DB-000083

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Normally, with PKI authentication, the interaction wit...
    Rule High Severity
  • SRG-APP-000179-DB-000114

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.

    &lt;VulnDiscussion&gt;Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures ...
    Rule High Severity
  • SRG-APP-000180-DB-000115

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    &lt;VulnDiscussion&gt;Non-organizational users include all information system users other than organizational users, which include organizational e...
    Rule Medium Severity
  • SRG-APP-000416-DB-000380

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...
    Rule High Severity
  • SRG-APP-000514-DB-000381

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...
    Rule Medium Severity
  • SRG-APP-000514-DB-000382

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules