No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000390
<GroupDescription></GroupDescription>Group -
The application server must require devices to re-authenticate when organization-defined circumstances or situations require re-authentication.
<VulnDiscussion>Without re-authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity...Rule Medium Severity -
SRG-APP-000391
<GroupDescription></GroupDescription>Group -
The application server must accept Personal Identity Verification (PIV) credentials to access the management interface.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. PIV credentials are only...Rule High Severity -
SRG-APP-000392
<GroupDescription></GroupDescription>Group -
The application server must electronically verify Personal Identity Verification (PIV) credentials for access to the management interface.
<VulnDiscussion>The use of Personal Identity Verification (PIV) credentials facilitates standardization and reduces the risk of unauthorized ...Rule High Severity -
SRG-APP-000400
<GroupDescription></GroupDescription>Group -
The application server must prohibit the use of cached authenticators after an organization-defined time period.
<VulnDiscussion>When the application server is using PKI authentication, a local revocation cache must be stored for instances when the revoc...Rule Medium Severity -
SRG-APP-000401
<GroupDescription></GroupDescription>Group -
The application server, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
<VulnDiscussion>The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptogra...Rule Medium Severity -
SRG-APP-000402
<GroupDescription></GroupDescription>Group -
The application server must accept Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface.
<VulnDiscussion>Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Public...Rule Medium Severity -
SRG-APP-000403
<GroupDescription></GroupDescription>Group -
The application server must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface.
<VulnDiscussion>Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Public...Rule Medium Severity -
SRG-APP-000404
<GroupDescription></GroupDescription>Group -
The application server must accept FICAM-approved third-party credentials.
<VulnDiscussion>Access may be denied to legitimate users if FICAM-approved third-party credentials are not accepted. This requirement typica...Rule Medium Severity -
SRG-APP-000405
<GroupDescription></GroupDescription>Group -
The application server must conform to FICAM-issued profiles.
<VulnDiscussion>Without conforming to FICAM-issued profiles, the information system may not be interoperable with FICAM-authentication protoc...Rule Medium Severity -
SRG-APP-000427
<GroupDescription></GroupDescription>Group -
The application server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
<VulnDiscussion>Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.