Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000374

    <GroupDescription></GroupDescription>
    Group
  • Upon receipt of the log record from hosts and devices, the Central Log Server must be configured to record time stamps of the time of receipt that can be mapped to Coordinated Universal Time (UTC).

    &lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...
    Rule Low Severity
  • SRG-APP-000375

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to record time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision.

    &lt;VulnDiscussion&gt;Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records....
    Rule Low Severity
  • SRG-APP-000391

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to accept the DoD CAC credential to support identity management and personal authentication.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...
    Rule Medium Severity
  • SRG-APP-000392

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to electronically verify the DoD CAC credential.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...
    Rule Medium Severity
  • SRG-APP-000439

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to protect the confidentiality and integrity of transmitted information.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...
    Rule High Severity
  • SRG-APP-000514

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection.

    &lt;VulnDiscussion&gt;FIPS 140-2 precludes the use of unvalidated cryptography for the cryptographic protection of sensitive or valuable data withi...
    Rule High Severity
  • SRG-APP-000515

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Low Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to retain the identity of the original source host or device where the event occurred as part of the log record.

    &lt;VulnDiscussion&gt;In this case the information producer is the device based on IP address or some other identifier of the device producing the ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server that aggregates log records from hosts and devices must be configured to use TCP for transmission.

    &lt;VulnDiscussion&gt;If the default UDP protocol is used for communication between the hosts and devices to the Central Log Server, then log recor...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to notify the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.

    &lt;VulnDiscussion&gt;Notification may be configured to be sent by the device, SNMP server, or Central Log Server. The best practice is for these n...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules