Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must only allow the use of DoD PKI established certificate authorities for verification of the establishment of protected sessions.

    &lt;VulnDiscussion&gt;Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...
    Rule Medium Severity
  • SRG-APP-000503

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must generate audit records when successful/unsuccessful logon attempts occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-APP-000610

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. To protect ...
    Rule High Severity
  • SRG-APP-000095

    <GroupDescription></GroupDescription>
    Group
  • The System Administrator (SA) and Information System Security Manager (ISSM) must configure the retention of the log records based on criticality level, event type, and/or retention period, at a minimum.

    &lt;VulnDiscussion&gt;If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment,...
    Rule Low Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application.

    &lt;VulnDiscussion&gt;If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment,...
    Rule Low Severity
  • SRG-APP-000705

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must disable accounts when the accounts are no longer associated to a user.

    &lt;VulnDiscussion&gt;Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality...
    Rule Medium Severity
  • SRG-APP-000745

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must implement the capability to centrally review and analyze audit records from multiple components within the system.

    &lt;VulnDiscussion&gt;Automated mechanisms for centralized reviews and analyses include security information and event management products.&lt;/Vul...
    Rule Medium Severity
  • SRG-APP-000750

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must implement an audit reduction capability that supports on-demand audit review and analysis.

    &lt;VulnDiscussion&gt;Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format t...
    Rule Medium Severity
  • SRG-APP-000755

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must implement an audit reduction capability that supports on-demand reporting requirements.

    &lt;VulnDiscussion&gt;Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format t...
    Rule Medium Severity
  • SRG-APP-000760

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must implement an audit reduction capability that supports after-the-fact investigations of incidents.

    &lt;VulnDiscussion&gt;Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules