I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000504
<GroupDescription></GroupDescription>Group -
The application must generate audit records for privileged activities or other system-level access.
<VulnDiscussion>Privileged activities include the tasks or actions taken by users in an administrative role (admin, backup operator, manager,...Rule Medium Severity -
SRG-APP-000505
<GroupDescription></GroupDescription>Group -
The application must generate audit records showing starting and ending time for user access to the system.
<VulnDiscussion>Knowing when a user’s application session began and when it ended is critical information that aids in forensic analysis.<...Rule Medium Severity -
SRG-APP-000507
<GroupDescription></GroupDescription>Group -
The application must generate audit records when successful/unsuccessful accesses to objects occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000508
<GroupDescription></GroupDescription>Group -
The application must generate audit records for all direct access to the information system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000509
<GroupDescription></GroupDescription>Group -
The application must generate audit records for all account creations, modifications, disabling, and termination events.
<VulnDiscussion>When application user accounts are created, modified, disabled or terminated the event must be logged. Centralized managemen...Rule Medium Severity -
SRG-APP-000092
<GroupDescription></GroupDescription>Group -
The application must initiate session auditing upon startup.
<VulnDiscussion>If the application does not begin logging upon startup, important log events could be missed.</VulnDiscussion><False...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
The application must log application shutdown events.
<VulnDiscussion>Forensics is a large part of security incident response. Applications must provide a record of their actions so application ...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
The application must log destination IP addresses.
<VulnDiscussion>The IP addresses of the systems that the application connects to are an important aspect of identifying application network r...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
The application must log user actions involving access to data.
<VulnDiscussion>When users access application data, there is risk of data compromise or seepage if the account used to access is compromised ...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
The application must log user actions involving changes to data.
<VulnDiscussion>When users change/modify application data, there is risk of data compromise if the account used to access is compromised or a...Rule Medium Severity -
SRG-APP-000096
<GroupDescription></GroupDescription>Group -
The application must produce audit records containing information to establish when (date and time) the events occurred.
<VulnDiscussion>Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to a...Rule Medium Severity -
SRG-APP-000097
<GroupDescription></GroupDescription>Group -
The application must produce audit records containing enough information to establish which component, feature or function of the application triggered the audit event.
<VulnDiscussion>It is impossible to establish, correlate, and investigate the events relating to an incident if the details regarding the sou...Rule Medium Severity -
SRG-APP-000098
<GroupDescription></GroupDescription>Group -
When using centralized logging; the application must include a unique identifier in order to distinguish itself from other application logs.
<VulnDiscussion>Without establishing the source, it is impossible to establish, correlate, and investigate the events leading up to an outage...Rule Medium Severity -
SRG-APP-000099
<GroupDescription></GroupDescription>Group -
The application must produce audit records that contain information to establish the outcome of the events.
<VulnDiscussion>Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attac...Rule Medium Severity -
SRG-APP-000100
<GroupDescription></GroupDescription>Group -
The application must generate audit records containing information that establishes the identity of any individual or process associated with the event.
<VulnDiscussion>Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associ...Rule Medium Severity -
SRG-APP-000101
<GroupDescription></GroupDescription>Group -
The application must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
<VulnDiscussion>Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. Or...Rule Medium Severity -
SRG-APP-000101
<GroupDescription></GroupDescription>Group -
The application must implement transaction recovery logs when transaction based.
<VulnDiscussion>Without required logging and access control, security issues related to data changes will not be identified. This could lead ...Rule Medium Severity -
SRG-APP-000356
<GroupDescription></GroupDescription>Group -
The application must provide centralized management and configuration of the content to be captured in audit records generated by all application components.
<VulnDiscussion>Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...Rule Medium Severity -
SRG-APP-000358
<GroupDescription></GroupDescription>Group -
The application must off-load audit records onto a different system or media than the system being audited.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. In addition, attackers ...Rule Medium Severity -
SRG-APP-000515
<GroupDescription></GroupDescription>Group -
The application must be configured to write application logs to a centralized log repository.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. In addition, attackers ...Rule Medium Severity -
SRG-APP-000359
<GroupDescription></GroupDescription>Group -
The application must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
<VulnDiscussion>If security personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for ...Rule Medium Severity -
SRG-APP-000360
<GroupDescription></GroupDescription>Group -
Applications categorized as having a moderate or high impact must provide an immediate real-time alert to the SA and ISSO (at a minimum) for all audit failure events.
<VulnDiscussion>Applications that are categorized as having a high or moderate impact on the organization must provide immediate alerts when ...Rule Medium Severity -
SRG-APP-000108
<GroupDescription></GroupDescription>Group -
The application must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-APP-000109
<GroupDescription></GroupDescription>Group -
The application must shut down by default upon audit failure (unless availability is an overriding concern).
<VulnDiscussion>It is critical that when the application is at risk of failing to process audit logs as required, it take action to mitigate ...Rule Medium Severity -
SRG-APP-000111
<GroupDescription></GroupDescription>Group -
The application must provide the capability to centrally review and analyze audit records from multiple components within the system.
<VulnDiscussion>Successful incident response and auditing relies on timely, accurate system information and analysis in order to allow the or...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.