I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000380-DB-000360
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must enforce access restrictions associated with changes to the configuration of Redis Enterprise DBMS or database(s).
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the o...Rule Medium Severity -
SRG-APP-000133-DB-000179
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must limit privileges to change software modules; to include stored procedures, functions, and triggers, and links to software external to Redis Enterprise DBMS.
<VulnDiscussion>If the system were to allow any user to make changes to software libraries, those changes might be implemented without underg...Rule Medium Severity -
SRG-APP-000133-DB-000198
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS software installation account must be restricted to authorized users.
<VulnDiscussion>When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components...Rule Medium Severity -
SRG-APP-000133-DB-000199
<GroupDescription></GroupDescription>Group -
Database software, including DBMS configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications.
<VulnDiscussion>When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components...Rule Medium Severity -
SRG-APP-000133-DB-000362
<GroupDescription></GroupDescription>Group -
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to Redis Enterprise DBMS, etc.) must be restricted to authorized users.
<VulnDiscussion>If the DBMS were to allow any user to make changes to database structure or logic, those changes might be implemented without...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.
<VulnDiscussion>Configuring the DBMS to implement organization-wide security implementation guides and security checklists ensures compliance...Rule Medium Severity -
SRG-APP-000383-DB-000364
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
<VulnDiscussion>Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats.</VulnDiscussio...Rule Medium Severity -
SRG-APP-000456-DB-000400
<GroupDescription></GroupDescription>Group -
Redis Enterprise products must be a version supported by the vendor.
<VulnDiscussion>Unsupported commercial and database systems should not be used because fixes to newly identified bugs will not be implemented...Rule High Severity -
SRG-APP-000141-DB-000091
<GroupDescription></GroupDescription>Group -
Unused database components, DBMS software, and database objects must be removed.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...Rule Medium Severity -
SRG-APP-000141-DB-000092
<GroupDescription></GroupDescription>Group -
Unused database components that are integrated in Redis Enterprise DBMS and cannot be uninstalled must be disabled.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...Rule Medium Severity -
SRG-APP-000141-DB-000093
<GroupDescription></GroupDescription>Group -
Access to external executables must be disabled or restricted.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...Rule Medium Severity -
SRG-APP-000142-DB-000094
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
<VulnDiscussion>To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...Rule Medium Severity -
SRG-APP-000389-DB-000372
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
<VulnDiscussion>The DoD standard for authentication of an interactive user is the presentation of a Common Access Card (CAC) or other physica...Rule Medium Severity -
SRG-APP-000148-DB-000103
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
<VulnDiscussion>Redis Enterprise allows the user to configure unique users per role. Review roles and ensure roles use unique organizational ...Rule Medium Severity -
SRG-APP-000171-DB-000074
<GroupDescription></GroupDescription>Group -
If passwords are used for authentication, Redis Enterprise DBMS must store only hashed, salted representations of passwords.
<VulnDiscussion>The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be us...Rule Medium Severity -
SRG-APP-000400-DB-000367
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must prohibit the use of cached authenticators after an organization-defined time period.
<VulnDiscussion>If cached authentication information is out of date, the validity of the authentication information may be questionable. For...Rule Medium Severity -
SRG-APP-000175-DB-000067
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.
<VulnDiscussion>The DoD standard for authentication is DoD-approved PKI certificates. A certificate's certification path is the path from th...Rule Medium Severity -
SRG-APP-000176-DB-000068
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must enforce authorized access to all PKI private keys stored/used by Redis Enterprise DBMS.
<VulnDiscussion>The DoD standard for authentication is DoD-approved PKI certificates. PKI certificate-based authentication is performed by re...Rule High Severity -
SRG-APP-000177-DB-000069
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must map the PKI-authenticated identity to an associated user account.
<VulnDiscussion>The DoD standard for authentication is DoD-approved PKI certificates. Once a PKI certificate has been validated, it must be m...Rule Medium Severity -
SRG-APP-000178-DB-000083
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
<VulnDiscussion>The DoD standard for authentication is DoD-approved PKI certificates. Normally, with PKI authentication, the interaction wit...Rule High Severity -
SRG-APP-000179-DB-000114
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.
<VulnDiscussion>Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures ...Rule High Severity -
SRG-APP-000180-DB-000115
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
<VulnDiscussion>Non-organizational users include all information system users other than organizational users, which include organizational e...Rule Medium Severity -
SRG-APP-000416-DB-000380
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...Rule High Severity -
SRG-APP-000514-DB-000381
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...Rule Medium Severity -
SRG-APP-000514-DB-000382
<GroupDescription></GroupDescription>Group -
Redis Enterprise DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.