Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000001-WSR-000002

    <GroupDescription></GroupDescription>
    Group
  • The Automation Controller web server must manage sessions.

    &lt;VulnDiscussion&gt;Session management on client and server is required to protect identity and authorization information. Sessions for the Auto...
    Rule Medium Severity
  • SRG-APP-000014-WSR-000006

    <GroupDescription></GroupDescription>
    Group
  • The Automation Controller servers must use encrypted communication for all channels given the high impact of those services to an organization's infrastructure.

    &lt;VulnDiscussion&gt;The Automation Controller communicates information about configuration of other information systems through its web interface...
    Rule Medium Severity
  • SRG-APP-000015-WSR-000014

    <GroupDescription></GroupDescription>
    Group
  • The Automation Controller NGINX web server must use cryptography on all remote connections.

    &lt;VulnDiscussion&gt;Nondisplayed data on a web page may expose information that could put the organization at risk and negatively affect data int...
    Rule Medium Severity
  • SRG-APP-000016-WSR-000005

    <GroupDescription></GroupDescription>
    Group
  • The Automation Controller must generate the appropriate log records.

    &lt;VulnDiscussion&gt;Automation Controller's web server must log all details related to user sessions in support of troubleshooting, debugging, an...
    Rule Medium Severity
  • SRG-APP-000131-WSR-000051

    <GroupDescription></GroupDescription>
    Group
  • All Automation Controller NGINX front-end web server files must be verified for their integrity (e.g., checksums and hashes) before becoming part of the production web server.

    &lt;VulnDiscussion&gt;Being able to verify that a patch, upgrade, certificate, etc., being added to the web server is unchanged from the producer o...
    Rule High Severity
  • SRG-APP-000131-WSR-000073

    <GroupDescription></GroupDescription>
    Group
  • Expansion modules must be fully reviewed, tested, and signed before they can exist on a production Automation Controller NGINX front-end web server.

    &lt;VulnDiscussion&gt;In the case of a production web server, areas for content development and testing will not exist, as this type of content is ...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000015

    <GroupDescription></GroupDescription>
    Group
  • All Automation Controller NGINX front-end web servers must not perform user management for hosted applications.

    &lt;VulnDiscussion&gt;Web servers require enterprise-wide user management capability in order to prevent unauthorized access, with features like at...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000076

    <GroupDescription></GroupDescription>
    Group
  • All Automation Controller NGINX web servers must not be a proxy server for any process other than the Automation Controller application.

    &lt;VulnDiscussion&gt;The Automation Controller NGINX web server must be primarily a web server or a proxy server but not both, for the same reason...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000078

    <GroupDescription></GroupDescription>
    Group
  • All Automation Controller NGINX webserver accounts not utilized by installed features (i.e., tools, utilities, specific services, etc.) must not be created and must be deleted when the web server feature is uninstalled.

    &lt;VulnDiscussion&gt;If web server accounts are not being used, they must be deleted when the web server is uninstalled. This is because the accou...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000081

    <GroupDescription></GroupDescription>
    Group
  • All Automation Controller NGINX web servers must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.

    &lt;VulnDiscussion&gt;Controlling what a user of a hosted application can access is part of the security posture of the Automation Controller NGINX...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000085

    <GroupDescription></GroupDescription>
    Group
  • All Automation Controller NGINX web servers must have Web Distributed Authoring (WebDAV) disabled.

    &lt;VulnDiscussion&gt;Automation Controller NGINX web servers can be installed with functionality that, just by its nature, is not secure. Web Dist...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000086

    <GroupDescription></GroupDescription>
    Group
  • All Automation Controller NGINX web servers must protect system resources and privileged operations from hosted applications.

    &lt;VulnDiscussion&gt;Automation Controller NGINX web servers may host too many applications. Each application will need certain system resources a...
    Rule Low Severity
  • SRG-APP-000142-WSR-000089

    <GroupDescription></GroupDescription>
    Group
  • All Automation Controller NGINX web servers must be configured to use a specified IP address and port.

    &lt;VulnDiscussion&gt;From a security perspective, it is important that all Automation Controller NGINX web servers are configured to use a specifi...
    Rule Medium Severity
  • SRG-APP-000176-WSR-000096

    <GroupDescription></GroupDescription>
    Group
  • Only authenticated system administrators or the designated PKI Sponsor for an Automation Controller NGINX web server must have access to any Automation Controller NGINX web server's private key.

    &lt;VulnDiscussion&gt;Each Automation Controller NGINX web server's private key is used to prove the identity of the server to clients and securely...
    Rule Medium Severity
  • SRG-APP-000211-WSR-000030

    <GroupDescription></GroupDescription>
    Group
  • All Automation Controller NGINX web server accounts accessing the directory tree, the shell, or other operating system functions and utilities must only be administrative accounts.

    &lt;VulnDiscussion&gt;AIT is important to limit access to Automation Controller nginx web servers and provide access on a need-to-know basis. For e...
    Rule Medium Severity
  • SRG-APP-000223-WSR-000011

    <GroupDescription></GroupDescription>
    Group
  • Cookies exchanged between any Automation Controller NGINX web server and any client, such as session cookies, must have security settings that disallow cookie access outside the originating Automation Controller NGINX web server and hosted application.

    &lt;VulnDiscussion&gt;It is important that cookies exchanged between any Automation Controller NGINX webserver and any client have security setting...
    Rule Medium Severity
  • SRG-APP-000233-WSR-000146

    <GroupDescription></GroupDescription>
    Group
  • The Automation Controller NGINX web server document directory must be in a separate partition from the web server's system files.

    &lt;VulnDiscussion&gt;It is important that Automation Controller NGINX web server restricts the ability of clients to launch denial-of-service (DoS...
    Rule Medium Severity
  • SRG-APP-000251-WSR-000157

    <GroupDescription></GroupDescription>
    Group
  • The Automation Controller NGINX web server must limit the character set used for data entry.

    &lt;VulnDiscussion&gt;It is important that Automation Controller NGINX web server limit the character set used for data entry and disallow Unicode ...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000142

    <GroupDescription></GroupDescription>
    Group
  • The Automation Controller NGINX web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.

    &lt;VulnDiscussion&gt;It is important that Automation Controller NGINX web server display a default hosted application web paged and not a director...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000160

    <GroupDescription></GroupDescription>
    Group
  • Debugging and trace information, within Automation Controller NGINX web server, used to diagnose the web server must be disabled.

    &lt;VulnDiscussion&gt;It is important that Automation Controller NGINX web server debugging and trace information used to diagnose the web server i...
    Rule Medium Severity
  • SRG-APP-000340-WSR-000029

    <GroupDescription></GroupDescription>
    Group
  • Nonprivileged accounts on the hosting system must only access Automation Controller NGINX web server security-relevant information and functions through a distinct administrative account.

    &lt;VulnDiscussion&gt;It is important that Automation Controller NGINX web server security features are separated from nonprivileged users. Special...
    Rule Medium Severity
  • SRG-APP-000380-WSR-000072

    <GroupDescription></GroupDescription>
    Group
  • The Automation Controller NGINX web server application, libraries, and configuration files must only be accessible to privileged users.

    &lt;VulnDiscussion&gt;Automation Controller NGINX web servers can be modified through parameter modification, patch installation, upgrades to the w...
    Rule Medium Severity
  • SRG-APP-000435-WSR-000147

    <GroupDescription></GroupDescription>
    Group
  • The Automation Controller NGINX web server must be protected from being stopped by a nonprivileged user.

    &lt;VulnDiscussion&gt;An attacker has at least two reasons to stop an Automation Controller NGINX web server. The first is to cause a DoS, and the ...
    Rule Medium Severity
  • SRG-APP-000439-WSR-000151

    <GroupDescription></GroupDescription>
    Group
  • The Automation Controller NGINX web server must employ cryptographic mechanisms (TLS/DTLS/SSL) to prevent the unauthorized disclosure of information during transmission.

    &lt;VulnDiscussion&gt;Preventing the disclosure of transmitted information requires that the Automation Controller web server take measures to empl...
    Rule Medium Severity
  • SRG-APP-000439-WSR-000156

    <GroupDescription></GroupDescription>
    Group
  • Automation Controller NGINX web servers must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.

    &lt;VulnDiscussion&gt;Transport Layer Security (TLS) is a required transmission protocol for a web server hosting controlled information. The use o...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules