Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000392

    <GroupDescription></GroupDescription>
    Group
  • The application server must electronically verify Personal Identity Verification (PIV) credentials for access to the management interface.

    &lt;VulnDiscussion&gt;The use of Personal Identity Verification (PIV) credentials facilitates standardization and reduces the risk of unauthorized ...
    Rule High Severity
  • SRG-APP-000400

    <GroupDescription></GroupDescription>
    Group
  • The application server must prohibit the use of cached authenticators after an organization-defined time period.

    &lt;VulnDiscussion&gt;When the application server is using PKI authentication, a local revocation cache must be stored for instances when the revoc...
    Rule Medium Severity
  • SRG-APP-000401

    <GroupDescription></GroupDescription>
    Group
  • The application server, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.

    &lt;VulnDiscussion&gt;The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptogra...
    Rule Medium Severity
  • SRG-APP-000402

    <GroupDescription></GroupDescription>
    Group
  • The application server must accept Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface.

    &lt;VulnDiscussion&gt;Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Public...
    Rule Medium Severity
  • SRG-APP-000403

    <GroupDescription></GroupDescription>
    Group
  • The application server must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface.

    &lt;VulnDiscussion&gt;Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Public...
    Rule Medium Severity
  • SRG-APP-000404

    <GroupDescription></GroupDescription>
    Group
  • The application server must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.

    &lt;VulnDiscussion&gt;Access may be denied to legitimate users if FICAM-approved third-party credentials are not accepted. This requirement typica...
    Rule Medium Severity
  • SRG-APP-000405

    <GroupDescription></GroupDescription>
    Group
  • The application server must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.

    &lt;VulnDiscussion&gt;Without conforming to FICAM-issued profiles, the information system may not be interoperable with FICAM-authentication protoc...
    Rule Medium Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • The application server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.

    &lt;VulnDiscussion&gt;Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...
    Rule Medium Severity
  • SRG-APP-000428

    <GroupDescription></GroupDescription>
    Group
  • The application server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components.

    &lt;VulnDiscussion&gt;Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, ta...
    Rule Medium Severity
  • SRG-APP-000429

    <GroupDescription></GroupDescription>
    Group
  • The application must implement cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components.

    &lt;VulnDiscussion&gt;Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, ta...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules