II - Mission Support Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000291
<GroupDescription></GroupDescription>Group -
The application must notify system administrators (SAs) and information system security officers (ISSOs) when accounts are created.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...Rule Low Severity -
SRG-APP-000292
<GroupDescription></GroupDescription>Group -
The application must notify system administrators (SAs) and information system security officers (ISSOs) when accounts are modified.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...Rule Low Severity -
SRG-APP-000293
<GroupDescription></GroupDescription>Group -
The application must notify system administrators (SAs) and information system security officers (ISSOs) of account disabling actions.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...Rule Low Severity -
SRG-APP-000294
<GroupDescription></GroupDescription>Group -
The application must notify system administrators (SAs) and information system security officers (ISSOs) of account removal actions.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...Rule Low Severity -
SRG-APP-000319
<GroupDescription></GroupDescription>Group -
The application must automatically audit account enabling actions.
<VulnDiscussion>When application accounts are enabled, user accessibility is affected. Accounts are utilized for identifying individual appli...Rule Medium Severity -
SRG-APP-000320
<GroupDescription></GroupDescription>Group -
The application must notify system administrators (SAs) and information system security officers (ISSOs) of account enabling actions.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...Rule Low Severity -
SRG-APP-000323
<GroupDescription></GroupDescription>Group -
Application data protection requirements must be identified and documented.
<VulnDiscussion>Failure to protect organizational information from data mining may result in a compromise of information. In order to assign ...Rule Medium Severity -
SRG-APP-000324
<GroupDescription></GroupDescription>Group -
The application must utilize organization-defined data mining detection techniques for organization-defined data storage objects to adequately detect data mining attempts.
<VulnDiscussion>Failure to protect organizational information from data mining may result in a compromise of information. Data mining occurs...Rule Medium Severity -
SRG-APP-000033
<GroupDescription></GroupDescription>Group -
The application must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule High Severity -
SRG-APP-000328
<GroupDescription></GroupDescription>Group -
The application must enforce organization-defined discretionary access control policies over defined subjects and objects.
<VulnDiscussion>Discretionary Access Control allows users to determine who is allowed to access their data. To mitigate the risk of unauthori...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.