Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

    &lt;VulnDiscussion&gt;To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...
    Rule High Severity
  • SRG-APP-000080

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to protect the data sent from hosts and devices from being altered in a way that may prevent the attribution of an action to an individual (or process acting on behalf of an individual).

    &lt;VulnDiscussion&gt;Without non-repudiation, it is impossible to positively attribute an action to an individual (or process acting on behalf of ...
    Rule Medium Severity
  • SRG-APP-000086

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to aggregate log records from organization-defined devices and hosts within its scope of coverage.

    &lt;VulnDiscussion&gt;If the application is not configured to collate records based on the time when the events occurred, the ability to perform fo...
    Rule Low Severity
  • SRG-APP-000086

    <GroupDescription></GroupDescription>
    Group
  • Time stamps recorded on the log records in the Central Log Server must be configured to synchronize to within one second of the host server or, if NTP is configured directly in the log server, the NTP time source must be the same as the host and devices within its scope of coverage.

    &lt;VulnDiscussion&gt;If the application is not configured to collate records based on the time when the events occurred, the ability to perform fo...
    Rule Low Severity
  • SRG-APP-000086

    <GroupDescription></GroupDescription>
    Group
  • Where multiple log servers are installed in the enclave, each log server must be configured to aggregate log records to a central aggregation server or other consolidated events repository.

    &lt;VulnDiscussion&gt;Log servers (e.g., syslog servers) are often used on network segments to consolidate from the devices and hosts on that netwo...
    Rule Medium Severity
  • SRG-APP-000089

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to retain the DoD-defined attributes of the log records sent by the devices and hosts.

    &lt;VulnDiscussion&gt;Log records can be generated from various components within the application (e.g., process, module). Certain specific applica...
    Rule Medium Severity
  • SRG-APP-000090

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained.

    &lt;VulnDiscussion&gt;Without restricting which roles and individuals can select which events are audited, unauthorized personnel may be able to pr...
    Rule Low Severity
  • SRG-APP-000111

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals.

    &lt;VulnDiscussion&gt;Successful incident response and auditing relies on timely, accurate system information and analysis to allow the organizatio...
    Rule Low Severity
  • SRG-APP-000115

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to perform on-demand filtering of the log records for events of interest based on organization-defined criteria.

    &lt;VulnDiscussion&gt;The ability to specify the event criteria that are of interest provides the persons reviewing the logs with the ability to qu...
    Rule Low Severity
  • SRG-APP-000116

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to use internal system clocks to generate time stamps for log records.

    &lt;VulnDiscussion&gt;Without an internal clock used as the reference for the time stored on each event to provide a trusted common reference for t...
    Rule Low Severity
  • SRG-APP-000125

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to back up the log records repository at least every seven days onto a different system or system component other than the system or component being audited.

    &lt;VulnDiscussion&gt;Protection of log data includes ensuring log data is not accidentally lost or deleted. Backing up log records to a different ...
    Rule Low Severity
  • SRG-APP-000125

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server system backups must be retained for a minimum of 5 years for SAMI (Sources and Methods Information) and a minimum of 7 days for non-SAMI on media capable of guaranteeing file integrity for the minimum applicable information retention period.

    &lt;VulnDiscussion&gt;If backups are not properly processed, protected, and stored on appropriate media, recovery from a system failure or implemen...
    Rule Low Severity
  • SRG-APP-000148

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule High Severity
  • SRG-APP-000149

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must use multifactor authentication for network access to privileged user accounts.

    &lt;VulnDiscussion&gt;Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased. Multifactor...
    Rule Medium Severity
  • SRG-APP-000150

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must use multifactor authentication for network access to non-privileged user accounts.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to ...
    Rule Medium Severity
  • SRG-APP-000151

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must use multifactor authentication for local access using privileged user accounts.

    &lt;VulnDiscussion&gt;To ensure accountability and prevent unauthenticated access, privileged users must utilize multifactor authentication to prev...
    Rule Medium Severity
  • SRG-APP-000154

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to use multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.

    &lt;VulnDiscussion&gt;Using an authentication device, such as a DOD common access card (CAC) or token separate from the information system, ensures...
    Rule Medium Severity
  • SRG-APP-000156

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.

    &lt;VulnDiscussion&gt;A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...
    Rule Medium Severity
  • SRG-APP-000163

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity.

    &lt;VulnDiscussion&gt;Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can p...
    Rule Medium Severity
  • SRG-APP-000164

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...
    Rule Medium Severity
  • SRG-APP-000166

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to enforce password complexity by requiring that at least one uppercase character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Low Severity
  • SRG-APP-000167

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to enforce password complexity by requiring that at least one lowercase character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Low Severity
  • SRG-APP-000168

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to enforce password complexity by requiring that at least one numeric character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Low Severity
  • SRG-APP-000169

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to enforce password complexity by requiring that at least one special character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Low Severity
  • SRG-APP-000170

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to require the change of at least eight of the total number of characters when passwords are changed.

    &lt;VulnDiscussion&gt;If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of pass...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules