Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • The application must have the capability to prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the application. Verifying softwar...
    Rule Medium Severity
  • SRG-APP-000133

    <GroupDescription></GroupDescription>
    Group
  • The applications must limit privileges to change the software resident within software libraries.

    &lt;VulnDiscussion&gt;If the application were to allow any user to make changes to software libraries, then those changes might be implemented with...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • An application vulnerability assessment must be conducted.

    &lt;VulnDiscussion&gt;An application vulnerability assessment is a test conducted in order to identify weaknesses and security vulnerabilities that...
    Rule Medium Severity
  • SRG-APP-000384

    <GroupDescription></GroupDescription>
    Group
  • The application must prevent program execution in accordance with organization-defined policies regarding software program usage and restrictions, and/or rules authorizing the terms and conditions of software program usage.

    &lt;VulnDiscussion&gt;Control of application execution is a mechanism used to prevent execution of unauthorized applications in order to follow the...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • The application must employ a deny-all, permit-by-exception (whitelist) policy to allow the execution of authorized software programs.

    &lt;VulnDiscussion&gt;Utilizing a whitelist provides a configuration management method for allowing the execution of only authorized software. Usin...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • The application must be configured to disable non-essential capabilities.

    &lt;VulnDiscussion&gt;It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objecti...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • The application must be configured to use only functions, ports, and protocols permitted to it in the PPSM CAL.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-APP-000389

    <GroupDescription></GroupDescription>
    Group
  • The application must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.

    &lt;VulnDiscussion&gt;Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When applica...
    Rule Medium Severity
  • SRG-APP-000390

    <GroupDescription></GroupDescription>
    Group
  • The application must require devices to reauthenticate when organization-defined circumstances or situations requiring reauthentication.

    &lt;VulnDiscussion&gt;Without reauthenticating devices, unidentified or unknown devices may be introduced; thereby facilitating malicious activity....
    Rule Medium Severity
  • SRG-APP-000148

    <GroupDescription></GroupDescription>
    Group
  • The application must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule High Severity
  • SRG-APP-000149

    <GroupDescription></GroupDescription>
    Group
  • The application must use multifactor (Alt. Token) authentication for network access to privileged accounts.

    &lt;VulnDiscussion&gt;Multifactor authentication requires using two or more factors to achieve authentication and access. Factors include: (i) som...
    Rule Medium Severity
  • SRG-APP-000391

    <GroupDescription></GroupDescription>
    Group
  • The application must accept Personal Identity Verification (PIV) credentials.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...
    Rule Medium Severity
  • SRG-APP-000392

    <GroupDescription></GroupDescription>
    Group
  • The application must electronically verify Personal Identity Verification (PIV) credentials.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...
    Rule Medium Severity
  • SRG-APP-000150

    <GroupDescription></GroupDescription>
    Group
  • The application must use multifactor (e.g., CAC, Alt. Token) authentication for network access to non-privileged accounts.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to ...
    Rule Medium Severity
  • SRG-APP-000151

    <GroupDescription></GroupDescription>
    Group
  • The application must use multifactor (Alt. Token) authentication for local access to privileged accounts.

    &lt;VulnDiscussion&gt;Multifactor authentication (MFA) requires using two or more factors to achieve authentication and access. Factors include: (...
    Rule Medium Severity
  • SRG-APP-000152

    <GroupDescription></GroupDescription>
    Group
  • The application must use multifactor (e.g., CAC, Alt. Token) authentication for local access to nonprivileged accounts.

    &lt;VulnDiscussion&gt;To assure accountability, prevent unauthenticated access, and prevent misuse of the system, privileged users must utilize mul...
    Rule Medium Severity
  • SRG-APP-000153

    <GroupDescription></GroupDescription>
    Group
  • The application must ensure users are authenticated with an individual authenticator prior to using a group authenticator.

    &lt;VulnDiscussion&gt;To ensure individual accountability and prevent unauthorized access, application users must be individually identified and au...
    Rule Medium Severity
  • SRG-APP-000156

    <GroupDescription></GroupDescription>
    Group
  • The application must implement replay-resistant authentication mechanisms for network access to privileged accounts.

    &lt;VulnDiscussion&gt;A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...
    Rule Medium Severity
  • SRG-APP-000157

    <GroupDescription></GroupDescription>
    Group
  • The application must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.

    &lt;VulnDiscussion&gt;A replay attack is a man-in-the-middle style attack which allows an attacker to repeat or alter a valid data transmission tha...
    Rule Medium Severity
  • SRG-APP-000158

    <GroupDescription></GroupDescription>
    Group
  • The application must utilize mutual authentication when endpoint device non-repudiation protections are required by DoD policy or by the data owner.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Wit...
    Rule Medium Severity
  • SRG-APP-000394

    <GroupDescription></GroupDescription>
    Group
  • The application must authenticate all network connected endpoint devices before establishing any connection.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...
    Rule Medium Severity
  • SRG-APP-000395

    <GroupDescription></GroupDescription>
    Group
  • Service-Oriented Applications handling non-releasable data must authenticate endpoint devices via mutual SSL/TLS.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. One...
    Rule Medium Severity
  • SRG-APP-000163

    <GroupDescription></GroupDescription>
    Group
  • The application must disable device identifiers after 35 days of inactivity unless a cryptographic certificate is used for authentication.

    &lt;VulnDiscussion&gt;Device identifiers are used to identify hardware devices that interact with the application much like a user account is used ...
    Rule Medium Severity
  • SRG-APP-000164

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...
    Rule High Severity
  • SRG-APP-000166

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce password complexity by requiring that at least one uppercase character be used.

    &lt;VulnDiscussion&gt;Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules