Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000152

    <GroupDescription></GroupDescription>
    Group
  • The application must use multifactor (e.g., CAC, Alt. Token) authentication for local access to nonprivileged accounts.

    &lt;VulnDiscussion&gt;To assure accountability, prevent unauthenticated access, and prevent misuse of the system, privileged users must utilize mul...
    Rule Medium Severity
  • SRG-APP-000153

    <GroupDescription></GroupDescription>
    Group
  • The application must ensure users are authenticated with an individual authenticator prior to using a group authenticator.

    &lt;VulnDiscussion&gt;To ensure individual accountability and prevent unauthorized access, application users must be individually identified and au...
    Rule Medium Severity
  • SRG-APP-000156

    <GroupDescription></GroupDescription>
    Group
  • The application must implement replay-resistant authentication mechanisms for network access to privileged accounts.

    &lt;VulnDiscussion&gt;A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...
    Rule Medium Severity
  • SRG-APP-000157

    <GroupDescription></GroupDescription>
    Group
  • The application must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.

    &lt;VulnDiscussion&gt;A replay attack is a man-in-the-middle style attack which allows an attacker to repeat or alter a valid data transmission tha...
    Rule Medium Severity
  • SRG-APP-000158

    <GroupDescription></GroupDescription>
    Group
  • The application must utilize mutual authentication when endpoint device non-repudiation protections are required by DoD policy or by the data owner.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Wit...
    Rule Medium Severity
  • SRG-APP-000394

    <GroupDescription></GroupDescription>
    Group
  • The application must authenticate all network connected endpoint devices before establishing any connection.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...
    Rule Medium Severity
  • SRG-APP-000395

    <GroupDescription></GroupDescription>
    Group
  • Service-Oriented Applications handling non-releasable data must authenticate endpoint devices via mutual SSL/TLS.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. One...
    Rule Medium Severity
  • SRG-APP-000163

    <GroupDescription></GroupDescription>
    Group
  • The application must disable device identifiers after 35 days of inactivity unless a cryptographic certificate is used for authentication.

    &lt;VulnDiscussion&gt;Device identifiers are used to identify hardware devices that interact with the application much like a user account is used ...
    Rule Medium Severity
  • SRG-APP-000164

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...
    Rule High Severity
  • SRG-APP-000166

    <GroupDescription></GroupDescription>
    Group
  • The application must enforce password complexity by requiring that at least one uppercase character be used.

    &lt;VulnDiscussion&gt;Use of passwords for application authentication is intended only for limited situations and should not be used as a replaceme...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules