Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000516-ALG-000516

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must retain the session lock until the user reestablishes access using established identification and authentication procedures.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-NET-000517-ALG-000006

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must automatically terminate a user session when organization-defined conditions or trigger events that require a session disconnect occur.

    &lt;VulnDiscussion&gt;Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...
    Rule Medium Severity
  • SRG-NET-000518-ALG-000007

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must provide a logoff capability for user-initiated communications sessions.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker. However, for some ty...
    Rule Medium Severity
  • SRG-NET-000519-ALG-000008

    <GroupDescription></GroupDescription>
    Group
  • The ALG providing user access control intermediary services must display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end a session, the session may remain open and be exploited by an attacker; this is referred to a...
    Rule Medium Severity
  • SRG-NET-000062-ALG-000092

    <GroupDescription></GroupDescription>
    Group
  • The ALG that stores secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.

    &lt;VulnDiscussion&gt;Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Co...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules