II - Mission Support Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000033-DB-000084
<GroupDescription></GroupDescription>Group -
All installation-delivered IDMS Database-Administrator-level programs must be properly secured.
<VulnDiscussion>DBA-level programs that are not secured may allow unauthorized users to use them to access and manipulate various resources w...Rule Medium Severity -
SRG-APP-000033-DB-000084
<GroupDescription></GroupDescription>Group -
All installation-delivered IDMS DC-Administrator-level programs must be properly secured.
<VulnDiscussion>DC Administrator-level programs that are not secured may allow unauthorized users to use them to access and manipulate variou...Rule Medium Severity -
SRG-APP-000080-DB-000063
<GroupDescription></GroupDescription>Group -
IDMS must protect against the use of default userids.
<VulnDiscussion>Default sign-ons can be used by individuals to perform adverse actions anonymously.</VulnDiscussion><FalsePositives&...Rule Low Severity -
SRG-APP-000080-DB-000063
<GroupDescription></GroupDescription>Group -
IDMS must protect against the use of external request exits that change the userid to a shared id when actions are performed that may be audited.
<VulnDiscussion>Non-repudiation of actions taken is required in order to maintain data integrity. Examples of particular actions taken by ind...Rule Low Severity -
SRG-APP-000080-DB-000063
<GroupDescription></GroupDescription>Group -
IDMS must protect against the use of numbered exits that change the userid to a shared id.
<VulnDiscussion>Non-repudiation of actions taken is required to maintain data integrity. Examples of particular actions taken by individuals ...Rule Low Severity -
SRG-APP-000080-DB-000063
<GroupDescription></GroupDescription>Group -
IDMS must protect against the use of web-based applications that use generic IDs.
<VulnDiscussion>Web-based applications that allow a generic ID can be a door into IDMS allowing unauthorized changes whose authors may not be...Rule Low Severity -
SRG-APP-000080-DB-000063
<GroupDescription></GroupDescription>Group -
IDMS must protect against the use web services that do not require a sign on when actions are performed that may be audited.
<VulnDiscussion>IDMS web services provide a way for web-based applications to access an IDMS database. If not secured, the Web services inter...Rule Low Severity -
SRG-APP-000089-DB-000064
<GroupDescription></GroupDescription>Group -
IDMS must use the ESM to generate auditable records for resources when DoD-defined auditable events occur.
<VulnDiscussion>Audit records provide a tool to help research events within IDMS. IDMS does not produce audit records, but when using externa...Rule High Severity -
SRG-APP-000089-DB-000064
<GroupDescription></GroupDescription>Group -
IDMS must use the ESM to generate auditable records for commands and utilities when DoD-defined auditable events occur.
<VulnDiscussion>Audit records provide a tool to help research events within IDMS. IDMS itself does not produce audit records but, when extern...Rule High Severity -
SRG-APP-000133-DB-000200
<GroupDescription></GroupDescription>Group -
Database objects in an IDMS environment must be secured to prevent privileged actions from being performed by unauthorized users.
<VulnDiscussion>If database objects like areas, schemas, and run units are not secured, they may be changed or deleted by unauthorized users....Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.