Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000442

    <GroupDescription></GroupDescription>
    Group
  • The application must maintain the confidentiality and integrity of information during reception.

    &lt;VulnDiscussion&gt;Data is subject to manipulation and other integrity related attacks whenever that data is transferred across a network. To pr...
    Rule Medium Severity
  • SRG-APP-000441

    <GroupDescription></GroupDescription>
    Group
  • The application must not disclose unnecessary information to users.

    &lt;VulnDiscussion&gt;Applications should not disclose information not required for the transaction. (e.g., a web application should not divulge th...
    Rule Medium Severity
  • SRG-APP-000441

    <GroupDescription></GroupDescription>
    Group
  • The application must not store sensitive information in hidden fields.

    &lt;VulnDiscussion&gt;Hidden fields allow developers to process application data without having to display it on the screen. Using hidden fields t...
    Rule High Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must protect from Cross-Site Scripting (XSS) vulnerabilities.

    &lt;VulnDiscussion&gt;XSS attacks are essentially code injection attacks against the various language interpreters contained within the browser. XS...
    Rule High Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must protect from Cross-Site Request Forgery (CSRF) vulnerabilities.

    &lt;VulnDiscussion&gt;Cross-Site Request Forgery (CSRF) is an attack where a website user is forced to execute an unwanted action on a website that...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must protect from command injection.

    &lt;VulnDiscussion&gt;A command injection attack is an attack on a vulnerable application where improperly validated input is passed to a command s...
    Rule High Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must protect from canonical representation vulnerabilities.

    &lt;VulnDiscussion&gt;Canonical representation vulnerabilities can occur when a data conversion process does not convert the data to its simplest f...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must validate all input.

    &lt;VulnDiscussion&gt;Checking the valid syntax and semantics of information system inputs (e.g., character set, length, numerical range, and accep...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must not be vulnerable to SQL Injection.

    &lt;VulnDiscussion&gt;SQL Injection is a code injection attack against database applications. Malicious SQL statements are inserted into an applica...
    Rule High Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The application must not be vulnerable to XML-oriented attacks.

    &lt;VulnDiscussion&gt;Extensible Markup Language (XML) is widely employed in web technology and applications like web services (SOAP, REST, and WSD...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules