III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000120
<GroupDescription></GroupDescription>Group -
The Central Log Server must protect audit information from unauthorized deletion.
<VulnDiscussion>If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...Rule Medium Severity -
SRG-APP-000121
<GroupDescription></GroupDescription>Group -
The Central Log Server must protect audit tools from unauthorized access.
<VulnDiscussion>Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...Rule Medium Severity -
SRG-APP-000122
<GroupDescription></GroupDescription>Group -
The Central Log Server must protect audit tools from unauthorized modification.
<VulnDiscussion>Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...Rule Medium Severity -
SRG-APP-000123
<GroupDescription></GroupDescription>Group -
The Central Log Server must protect audit tools from unauthorized deletion.
<VulnDiscussion>Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to disable non-essential capabilities.
<VulnDiscussion>It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objecti...Rule Medium Severity -
SRG-APP-000291
<GroupDescription></GroupDescription>Group -
The Central Log Server must notify system administrators and ISSO when accounts are created.
<VulnDiscussion>Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...Rule Low Severity -
SRG-APP-000295
<GroupDescription></GroupDescription>Group -
The Central Log Server must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.
<VulnDiscussion>Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...Rule Medium Severity -
SRG-APP-000296
<GroupDescription></GroupDescription>Group -
The Central Log Server must provide a logout capability for user initiated communication session.
<VulnDiscussion>If a user cannot explicitly end an application session, the session may remain open and be exploited by an attacker; this is ...Rule Medium Severity -
SRG-APP-000297
<GroupDescription></GroupDescription>Group -
The Central Log Server must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
<VulnDiscussion>If a user cannot explicitly end an application session, the session may remain open and be exploited by an attacker; this is ...Rule Low Severity -
SRG-APP-000345
<GroupDescription></GroupDescription>Group -
The Central Log Server must automatically lock the account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
<VulnDiscussion>By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.