Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000125

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to back up the log records repository at least every seven days onto a different system or system component other than the system or component being audited.

    &lt;VulnDiscussion&gt;Protection of log data includes ensuring log data is not accidentally lost or deleted. Backing up log records to a different ...
    Rule Low Severity
  • SRG-APP-000125

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server system backups must be retained for a minimum of 5 years for SAMI (Sources and Methods Information) and a minimum of 7 days for non-SAMI on media capable of guaranteeing file integrity for the minimum applicable information retention period.

    &lt;VulnDiscussion&gt;If backups are not properly processed, protected, and stored on appropriate media, recovery from a system failure or implemen...
    Rule Low Severity
  • SRG-APP-000148

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule High Severity
  • SRG-APP-000149

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must use multifactor authentication for network access to privileged user accounts.

    &lt;VulnDiscussion&gt;Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased. Multifactor...
    Rule Medium Severity
  • SRG-APP-000150

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must use multifactor authentication for network access to non-privileged user accounts.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to ...
    Rule Medium Severity
  • SRG-APP-000151

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must use multifactor authentication for local access using privileged user accounts.

    &lt;VulnDiscussion&gt;To ensure accountability and prevent unauthenticated access, privileged users must utilize multifactor authentication to prev...
    Rule Medium Severity
  • SRG-APP-000154

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to use multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.

    &lt;VulnDiscussion&gt;Using an authentication device, such as a DOD common access card (CAC) or token separate from the information system, ensures...
    Rule Medium Severity
  • SRG-APP-000156

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.

    &lt;VulnDiscussion&gt;A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...
    Rule Medium Severity
  • SRG-APP-000163

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity.

    &lt;VulnDiscussion&gt;Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can p...
    Rule Medium Severity
  • SRG-APP-000164

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules