Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000179

    <GroupDescription></GroupDescription>
    Group
  • The application server must utilize FIPS 140-2 approved encryption modules when authenticating users and processes.

    &lt;VulnDiscussion&gt;Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified...
    Rule High Severity
  • SRG-APP-000181

    <GroupDescription></GroupDescription>
    Group
  • The application server must provide a log reduction capability that supports on-demand reporting requirements.

    &lt;VulnDiscussion&gt;The ability to generate on-demand reports, including after the log data has been subjected to log reduction, greatly facilita...
    Rule Medium Severity
  • SRG-APP-000206

    <GroupDescription></GroupDescription>
    Group
  • The application server must identify prohibited mobile code.

    &lt;VulnDiscussion&gt;Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded an...
    Rule Medium Severity
  • SRG-APP-000211

    <GroupDescription></GroupDescription>
    Group
  • The application server must separate hosted application functionality from application server management functionality.

    &lt;VulnDiscussion&gt;The application server consists of the management interface and hosted applications. By separating the management interface ...
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • The application server must be configured to mutually authenticate connecting proxies, application servers or gateways.

    &lt;VulnDiscussion&gt;Application architecture may sometimes require a configuration where an application server is placed behind a web proxy, an a...
    Rule Medium Severity
  • SRG-APP-000220

    <GroupDescription></GroupDescription>
    Group
  • The application server must invalidate session identifiers upon user logout or other session termination.

    &lt;VulnDiscussion&gt;If communications sessions remain open for extended periods of time even when unused, there is the potential for an adversary...
    Rule Medium Severity
  • SRG-APP-000223

    <GroupDescription></GroupDescription>
    Group
  • The application server must generate a unique session identifier for each session.

    &lt;VulnDiscussion&gt;Unique session IDs are the opposite of sequentially generated session IDs, which can be easily guessed by an attacker. Unique...
    Rule Medium Severity
  • SRG-APP-000223

    <GroupDescription></GroupDescription>
    Group
  • The application server must recognize only system-generated session identifiers.

    &lt;VulnDiscussion&gt;This requirement focuses on communications protection at the application session, versus network packet level. The intent of ...
    Rule Medium Severity
  • SRG-APP-000224

    <GroupDescription></GroupDescription>
    Group
  • The application server must generate a unique session identifier using a FIPS 140-2 approved random number generator.

    &lt;VulnDiscussion&gt;The application server will use session IDs to communicate between modules or applications within the application server and ...
    Rule High Severity
  • SRG-APP-000225

    <GroupDescription></GroupDescription>
    Group
  • The application server must be configured to perform complete application deployments.

    &lt;VulnDiscussion&gt;Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules