I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000190
<GroupDescription></GroupDescription>Group -
The application must terminate all network connections associated with a communications session at the end of the session.
<VulnDiscussion>Networked applications routinely open connections to and from other systems as part of their design and function. When conne...Rule Medium Severity -
SRG-APP-000514
<GroupDescription></GroupDescription>Group -
The application must utilize FIPS-validated cryptographic modules when signing application components.
<VulnDiscussion>Applications that distribute components of the application must sign the components to provide an identity assurance to consu...Rule Medium Severity -
SRG-APP-000514
<GroupDescription></GroupDescription>Group -
The application must utilize FIPS-validated cryptographic modules when generating cryptographic hashes.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...Rule Medium Severity -
SRG-APP-000514
<GroupDescription></GroupDescription>Group -
The application must utilize FIPS-validated cryptographic modules when protecting unclassified information that requires cryptographic protection.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...Rule Medium Severity -
SRG-APP-000514
<GroupDescription></GroupDescription>Group -
Applications making SAML assertions must use FIPS-approved random numbers in the generation of SessionIndex in the SAML element AuthnStatement.
<VulnDiscussion>A predictable SessionIndex could lead to an attacker computing a future SessionIndex, thereby, possibly compromising the appl...Rule Medium Severity -
SRG-APP-000211
<GroupDescription></GroupDescription>Group -
The application user interface must be either physically or logically separated from data storage and management interfaces.
<VulnDiscussion>Application management functionality includes functions necessary for administration and requires privileged user access. All...Rule Medium Severity -
SRG-APP-000219
<GroupDescription></GroupDescription>Group -
The application must set the HTTPOnly flag on session cookies.
<VulnDiscussion>HTTPOnly is a flag included in a Set-Cookie HTTP response header. If the HTTPOnly flag is included in the HTTP response heade...Rule Medium Severity -
SRG-APP-000219
<GroupDescription></GroupDescription>Group -
The application must set the secure flag on session cookies.
<VulnDiscussion>Many web development frameworks such as PHP, .NET, ASP as well as application servers include their own mechanisms for sessio...Rule Medium Severity -
SRG-APP-000219
<GroupDescription></GroupDescription>Group -
The application must not expose session IDs.
<VulnDiscussion>Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...Rule High Severity -
SRG-APP-000220
<GroupDescription></GroupDescription>Group -
The application must destroy the session ID value and/or cookie on logoff or browser close.
<VulnDiscussion>Many web development frameworks such as PHP, .NET, and ASP include their own mechanisms for session management. Whenever poss...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.