I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The application password must not be changeable by users other than the administrator or the user with which the password is associated.
<VulnDiscussion>If the application allows user A to change user B's password, user B can be locked out of the application, and user A is pro...Rule Medium Severity -
SRG-APP-000400
<GroupDescription></GroupDescription>Group -
The application must terminate existing user sessions upon account deletion.
<VulnDiscussion>The application must ensure that a user does not retain any rights that may have been granted or retain access to the applica...Rule Medium Severity -
SRG-APP-000175
<GroupDescription></GroupDescription>Group -
The application, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
<VulnDiscussion>Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...Rule High Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
The application, when using PKI-based authentication, must enforce authorized access to the corresponding private key.
<VulnDiscussion>If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...Rule High Severity -
SRG-APP-000177
<GroupDescription></GroupDescription>Group -
The application must map the authenticated identity to the individual user or group account for PKI-based authentication.
<VulnDiscussion>Without mapping the certificate used to authenticate to a corresponding user account, the ability to determine the identity o...Rule Medium Severity -
SRG-APP-000401
<GroupDescription></GroupDescription>Group -
The application, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
<VulnDiscussion>A local cache of revocation data is also known as a CRL list. This list contains a list of revoked certificates and can be pe...Rule Medium Severity -
SRG-APP-000178
<GroupDescription></GroupDescription>Group -
The application must not display passwords/PINs as clear text.
<VulnDiscussion>To prevent the compromise of authentication information such as passwords during the authentication process, the feedback fro...Rule High Severity -
SRG-APP-000179
<GroupDescription></GroupDescription>Group -
The application must use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
<VulnDiscussion>A cryptographic module is a hardware or software device or component that performs cryptographic operations securely within a...Rule High Severity -
SRG-APP-000180
<GroupDescription></GroupDescription>Group -
The application must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
<VulnDiscussion>Lack of authentication and identification enables non-organizational users to gain access to the application or possibly othe...Rule Medium Severity -
SRG-APP-000402
<GroupDescription></GroupDescription>Group -
The application must accept Personal Identity Verification (PIV) credentials from other federal agencies.
<VulnDiscussion>Access may be denied to authorized users if federal agency PIV credentials are not accepted. Personal Identity Verification ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.