Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000319-ALG-000020

    <GroupDescription></GroupDescription>
    Group
  • To protect against data mining, the ALG providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.

    &lt;VulnDiscussion&gt;Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure t...
    Rule Medium Severity
  • SRG-NET-000235-ALG-000118

    <GroupDescription></GroupDescription>
    Group
  • The ALG must fail to a secure state upon failure of initialization, shutdown, or abort actions.

    &lt;VulnDiscussion&gt;Failure to a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized acces...
    Rule Medium Severity
  • SRG-NET-000521-ALG-000002

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must conceal, via the session lock, information previously visible on the display with a publicly viewable image.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • SRG-NET-000514-ALG-000514

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must initiate a session lock after a 15-minute period of inactivity.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • SRG-NET-000515-ALG-000515

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must provide the capability for users to directly initiate a session lock.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-NET-000516-ALG-000516

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must retain the session lock until the user reestablishes access using established identification and authentication procedures.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-NET-000517-ALG-000006

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must automatically terminate a user session when organization-defined conditions or trigger events that require a session disconnect occur.

    &lt;VulnDiscussion&gt;Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...
    Rule Medium Severity
  • SRG-NET-000518-ALG-000007

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must provide a logoff capability for user-initiated communications sessions.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker. However, for some ty...
    Rule Medium Severity
  • SRG-NET-000519-ALG-000008

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker; this is referred to a...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000092

    <GroupDescription></GroupDescription>
    Group
  • The ALG that stores secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.

    &lt;VulnDiscussion&gt;Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules