II - Mission Support Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000428
<GroupDescription></GroupDescription>Group -
The application server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components.
<VulnDiscussion>Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, ta...Rule Medium Severity -
SRG-APP-000429
<GroupDescription></GroupDescription>Group -
The application must implement cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
<VulnDiscussion>Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, ta...Rule Medium Severity -
SRG-APP-000435
<GroupDescription></GroupDescription>Group -
The application server, when a MAC I system, must be in a high-availability (HA) cluster.
<VulnDiscussion>A MAC I system is a system that handles data vital to the organization's operational readiness or effectiveness of deployed o...Rule Medium Severity -
SRG-APP-000435
<GroupDescription></GroupDescription>Group -
The application server must protect against or limit the effects of all types of Denial of Service (DoS) attacks by employing organization-defined security safeguards.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot a...Rule Medium Severity -
SRG-APP-000439
<GroupDescription></GroupDescription>Group -
The application server must protect the confidentiality and integrity of transmitted information through the use of an approved TLS version.
<VulnDiscussion>Preventing the disclosure of transmitted information requires that the application server take measures to employ some form o...Rule High Severity -
SRG-APP-000439
<GroupDescription></GroupDescription>Group -
The application server must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
<VulnDiscussion>During the initial setup of a Transport Layer Security (TLS) connection to the application server, the client sends a list of...Rule High Severity -
SRG-APP-000440
<GroupDescription></GroupDescription>Group -
The application server must employ approved cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.
<VulnDiscussion>Preventing the disclosure or modification of transmitted information requires that application servers take measures to emplo...Rule Medium Severity -
SRG-APP-000441
<GroupDescription></GroupDescription>Group -
The application server must maintain the confidentiality and integrity of information during preparation for transmission.
<VulnDiscussion>Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission including,...Rule Medium Severity -
SRG-APP-000442
<GroupDescription></GroupDescription>Group -
The application server must maintain the confidentiality and integrity of information during reception.
<VulnDiscussion>Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, duri...Rule Medium Severity -
SRG-APP-000447
<GroupDescription></GroupDescription>Group -
The application server must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into an applications data entry field and the application is...Rule Medium Severity -
SRG-APP-000454
<GroupDescription></GroupDescription>Group -
The application server must remove organization-defined software components after updated versions have been installed.
<VulnDiscussion>Installation of patches and updates is performed when there are errors or security vulnerabilities in the current release of ...Rule Medium Severity -
SRG-APP-000456
<GroupDescription></GroupDescription>Group -
The application server must install security-relevant software updates within the time period directed by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs).
<VulnDiscussion>Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products t...Rule Medium Severity -
SRG-APP-000495
<GroupDescription></GroupDescription>Group -
The application server must generate log records when successful/unsuccessful attempts to modify privileges occur.
<VulnDiscussion>Changing privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful/unsuccessfu...Rule Medium Severity -
SRG-APP-000499
<GroupDescription></GroupDescription>Group -
The application server must generate log records when successful/unsuccessful attempts to delete privileges occur.
<VulnDiscussion>Deleting privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful and unsucce...Rule Medium Severity -
SRG-APP-000503
<GroupDescription></GroupDescription>Group -
The application server must generate log records when successful/unsuccessful logon attempts occur.
<VulnDiscussion>Logging the access to the application server allows the system administrators to monitor user accounts. By logging successfu...Rule Medium Severity -
SRG-APP-000504
<GroupDescription></GroupDescription>Group -
The application server must generate log records for privileged activities.
<VulnDiscussion>Without generating log records that are specific to the security and mission needs of the organization, it would be difficult...Rule Medium Severity -
SRG-APP-000505
<GroupDescription></GroupDescription>Group -
The application must generate log records showing starting and ending times for user access to the application server management interface.
<VulnDiscussion>Determining when a user has accessed the management interface is important to determine the timeline of events when a securit...Rule Medium Severity -
SRG-APP-000506
<GroupDescription></GroupDescription>Group -
The application server must generate log records when concurrent logons from different workstations occur to the application server management interface.
<VulnDiscussion>Being able to work on a system through multiple views into the application allows a user to work more efficiently and more ac...Rule Medium Severity -
SRG-APP-000509
<GroupDescription></GroupDescription>Group -
The application server must generate log records for all account creations, modifications, disabling, and termination events.
<VulnDiscussion>The maintenance of user accounts is a key activity within the system to determine access and privileges. Through changes to ...Rule Medium Severity -
SRG-APP-000514
<GroupDescription></GroupDescription>Group -
Application servers must use NIST-approved or NSA-approved key management technology and processes.
<VulnDiscussion>An asymmetric encryption key must be protected during transmission. The public portion of an asymmetric key pair can be freel...Rule Medium Severity -
SRG-APP-000514
<GroupDescription></GroupDescription>Group -
The application server must use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates.
<VulnDiscussion>Class 3 PKI certificates are used for servers and software signing rather than for identifying individuals. Class 4 certifica...Rule Medium Severity -
SRG-APP-000515
<GroupDescription></GroupDescription>Group -
The application server must, at a minimum, transfer the logs of interconnected systems in real time, and transfer the logs of standalone systems weekly.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Protecting log data is ...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The application server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
<VulnDiscussion>Configuring the application to implement organization-wide security implementation guides and security checklists ensures com...Rule Medium Severity -
SRG-APP-000416
<GroupDescription></GroupDescription>Group -
The application server must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
<VulnDiscussion>Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested enc...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.