Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000179

    <GroupDescription></GroupDescription>
    Group
  • The application server must utilize FIPS 140-2 approved encryption modules when authenticating users and processes.

    &lt;VulnDiscussion&gt;Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified...
    Rule High Severity
  • SRG-APP-000181

    <GroupDescription></GroupDescription>
    Group
  • The application server must provide a log reduction capability that supports on-demand reporting requirements.

    &lt;VulnDiscussion&gt;The ability to generate on-demand reports, including after the log data has been subjected to log reduction, greatly facilita...
    Rule Medium Severity
  • SRG-APP-000206

    <GroupDescription></GroupDescription>
    Group
  • The application server must identify prohibited mobile code.

    &lt;VulnDiscussion&gt;Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded an...
    Rule Medium Severity
  • SRG-APP-000211

    <GroupDescription></GroupDescription>
    Group
  • The application server must separate hosted application functionality from application server management functionality.

    &lt;VulnDiscussion&gt;The application server consists of the management interface and hosted applications. By separating the management interface ...
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • The application server must be configured to mutually authenticate connecting proxies, application servers or gateways.

    &lt;VulnDiscussion&gt;Application architecture may sometimes require a configuration where an application server is placed behind a web proxy, an a...
    Rule Medium Severity
  • SRG-APP-000220

    <GroupDescription></GroupDescription>
    Group
  • The application server must invalidate session identifiers upon user logout or other session termination.

    &lt;VulnDiscussion&gt;If communications sessions remain open for extended periods of time even when unused, there is the potential for an adversary...
    Rule Medium Severity
  • SRG-APP-000223

    <GroupDescription></GroupDescription>
    Group
  • The application server must generate a unique session identifier for each session.

    &lt;VulnDiscussion&gt;Unique session IDs are the opposite of sequentially generated session IDs, which can be easily guessed by an attacker. Unique...
    Rule Medium Severity
  • SRG-APP-000223

    <GroupDescription></GroupDescription>
    Group
  • The application server must recognize only system-generated session identifiers.

    &lt;VulnDiscussion&gt;This requirement focuses on communications protection at the application session, versus network packet level. The intent of ...
    Rule Medium Severity
  • SRG-APP-000224

    <GroupDescription></GroupDescription>
    Group
  • The application server must generate a unique session identifier using a FIPS 140-2 approved random number generator.

    &lt;VulnDiscussion&gt;The application server will use session IDs to communicate between modules or applications within the application server and ...
    Rule High Severity
  • SRG-APP-000225

    <GroupDescription></GroupDescription>
    Group
  • The application server must be configured to perform complete application deployments.

    &lt;VulnDiscussion&gt;Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure...
    Rule Medium Severity
  • SRG-APP-000225

    <GroupDescription></GroupDescription>
    Group
  • The application server must provide a clustering capability.

    &lt;VulnDiscussion&gt;This requirement is dependent upon system MAC and confidentiality. If the system MAC and confidentiality levels do not specif...
    Rule Medium Severity
  • SRG-APP-000225

    <GroupDescription></GroupDescription>
    Group
  • The application server must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.

    &lt;VulnDiscussion&gt;Fail-secure is a condition achieved by the application server in order to ensure that in the event of an operational failure,...
    Rule Medium Severity
  • SRG-APP-000231

    <GroupDescription></GroupDescription>
    Group
  • The application server must protect the confidentiality and integrity of all information at rest.

    &lt;VulnDiscussion&gt;When data is written to digital media such as hard drives, mobile computers, external/removable hard drives, personal digital...
    Rule Medium Severity
  • SRG-APP-000231

    <GroupDescription></GroupDescription>
    Group
  • The application server must employ cryptographic mechanisms to ensure confidentiality and integrity of all information at rest when stored off-line.

    &lt;VulnDiscussion&gt;This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application server must check the validity of all data inputs to the management interface, except those specifically identified by the organization.

    &lt;VulnDiscussion&gt;Invalid user input occurs when a user inserts data or characters into an applications data entry field and the application is...
    Rule Medium Severity
  • SRG-APP-000266

    <GroupDescription></GroupDescription>
    Group
  • The application server must identify potentially security-relevant error conditions.

    &lt;VulnDiscussion&gt;The structure and content of error messages need to be carefully considered by the organization and development team. Any ap...
    Rule Medium Severity
  • SRG-APP-000266

    <GroupDescription></GroupDescription>
    Group
  • The application server must only generate error messages that provide information necessary for corrective actions without revealing sensitive or potentially harmful information in error logs and administrative messages.

    &lt;VulnDiscussion&gt;Any application providing too much information in error logs and in administrative messages to the screen risks compromising ...
    Rule Medium Severity
  • SRG-APP-000267

    <GroupDescription></GroupDescription>
    Group
  • The application server must restrict error messages only to authorized users.

    &lt;VulnDiscussion&gt;If the application provides too much information in error logs and administrative messages to the screen, this could lead to ...
    Rule Medium Severity
  • SRG-APP-000290

    <GroupDescription></GroupDescription>
    Group
  • The application server must use cryptographic mechanisms to protect the integrity of log tools.

    &lt;VulnDiscussion&gt;Protecting the integrity of the tools used for logging purposes is a critical step in ensuring the integrity of log data. Log...
    Rule Medium Severity
  • SRG-APP-000295

    <GroupDescription></GroupDescription>
    Group
  • The application server must automatically terminate a user session after organization-defined conditions or trigger events requiring a session disconnect.

    &lt;VulnDiscussion&gt;An attacker can take advantage of user sessions that are left open, thus bypassing the user authentication process. To thwar...
    Rule Medium Severity
  • SRG-APP-000296

    <GroupDescription></GroupDescription>
    Group
  • The application server management interface must provide a logout capability for user-initiated communication session.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end an application server management interface session, the session may remain open and be exploi...
    Rule Medium Severity
  • SRG-APP-000297

    <GroupDescription></GroupDescription>
    Group
  • The application server management interface must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.

    &lt;VulnDiscussion&gt;Providing a logout capability to the user allows the user to explicitly close a session and free those resources used during ...
    Rule Medium Severity
  • SRG-APP-000313

    <GroupDescription></GroupDescription>
    Group
  • The application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in process.

    &lt;VulnDiscussion&gt;The application server provides a framework for applications to communicate between each other to form an overall well-design...
    Rule Medium Severity
  • SRG-APP-000314

    <GroupDescription></GroupDescription>
    Group
  • The application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission.

    &lt;VulnDiscussion&gt;The application server provides a framework for applications to communicate between each other to form an overall well-design...
    Rule Medium Severity
  • SRG-APP-000315

    <GroupDescription></GroupDescription>
    Group
  • The application server must control remote access methods.

    &lt;VulnDiscussion&gt;Application servers provide remote access capability and must be able to enforce remote access policy requirements or work in...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules