Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000514

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection.

    &lt;VulnDiscussion&gt;FIPS 140-2 precludes the use of unvalidated cryptography for the cryptographic protection of sensitive or valuable data withi...
    Rule High Severity
  • SRG-APP-000515

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Low Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to retain the identity of the original source host or device where the event occurred as part of the log record.

    &lt;VulnDiscussion&gt;In this case the information producer is the device based on IP address or some other identifier of the device producing the ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server that aggregates log records from hosts and devices must be configured to use TCP for transmission.

    &lt;VulnDiscussion&gt;If the default UDP protocol is used for communication between the hosts and devices to the Central Log Server, then log recor...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to notify the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.

    &lt;VulnDiscussion&gt;Notification may be configured to be sent by the device, SNMP server, or Central Log Server. The best practice is for these n...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules