Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000108

    <GroupDescription></GroupDescription>
    Group
  • The application server must alert the SA and ISSO, at a minimum, in the event of a log processing failure.

    &lt;VulnDiscussion&gt;Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a sec...
    Rule Medium Severity
  • SRG-APP-000109

    <GroupDescription></GroupDescription>
    Group
  • The application server must shut down by default upon log failure (unless availability is an overriding concern).

    &lt;VulnDiscussion&gt;It is critical that, when a system is at risk of failing to process logs, it detects and takes action to mitigate the failure...
    Rule Medium Severity
  • SRG-APP-000109

    <GroupDescription></GroupDescription>
    Group
  • The application server must be configured to fail over to another system in the event of log subsystem failure.

    &lt;VulnDiscussion&gt;This requirement is dependent upon system MAC and availability. If the system MAC and availability do not specify redundancy...
    Rule Medium Severity
  • SRG-APP-000116

    <GroupDescription></GroupDescription>
    Group
  • The application server must use internal system clocks to generate time stamps for log records.

    &lt;VulnDiscussion&gt;Without the use of an approved and synchronized time source configured on the systems, events cannot be accurately correlated...
    Rule Medium Severity
  • SRG-APP-000118

    <GroupDescription></GroupDescription>
    Group
  • The application server must protect log information from any type of unauthorized read access.

    &lt;VulnDiscussion&gt;If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially mali...
    Rule Medium Severity
  • SRG-APP-000119

    <GroupDescription></GroupDescription>
    Group
  • The application server must protect log information from unauthorized modification.

    &lt;VulnDiscussion&gt;If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially mali...
    Rule Medium Severity
  • SRG-APP-000120

    <GroupDescription></GroupDescription>
    Group
  • The application server must protect log information from unauthorized deletion.

    &lt;VulnDiscussion&gt;If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially mali...
    Rule Medium Severity
  • SRG-APP-000121

    <GroupDescription></GroupDescription>
    Group
  • The application server must protect log tools from unauthorized access.

    &lt;VulnDiscussion&gt;Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon...
    Rule Medium Severity
  • SRG-APP-000122

    <GroupDescription></GroupDescription>
    Group
  • The application server must protect log tools from unauthorized modification.

    &lt;VulnDiscussion&gt;Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon...
    Rule Medium Severity
  • SRG-APP-000123

    <GroupDescription></GroupDescription>
    Group
  • The application server must protect log tools from unauthorized deletion.

    &lt;VulnDiscussion&gt;Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules