I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000023
<GroupDescription></GroupDescription>Group -
The Mission Owner must configure the cloud service offering (CSO)-provided customer logon banner to display the Standard Mandatory DOD Notice and Consent Banner before granting access to users that must log on.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the operating system ensures privacy and se...Rule Medium Severity -
SRG-OS-000096
<GroupDescription></GroupDescription>Group -
The Mission Owner must configure the Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) to prohibit or restrict the use of functions, ports, protocols, and/or services.
<VulnDiscussion>To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...Rule Medium Severity -
SRG-OS-000104
<GroupDescription></GroupDescription>Group -
The cloud service offering (CSO) must be configured to use DOD public key infrastructure (PKI) to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
<VulnDiscussion>To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...Rule Medium Severity -
SRG-OS-000342
<GroupDescription></GroupDescription>Group -
The Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) must perform centralized logging to capture and store log records.
<VulnDiscussion>Protection of log data includes ensuring log data is not accidentally lost or deleted. Backing up audit records to a differen...Rule Medium Severity -
SRG-OS-000368
<GroupDescription></GroupDescription>Group -
For Impact Levels 4 and 5, the Mission Owner must register all cloud-based services, their CSP/CSO, and connection method in the DISA Systems/Network Approval Process (SNAP) database Cloud Module.
<VulnDiscussion>Register all cloud-based systems and applications, including the cloud service provider (CSP)/cloud service offering (CSO) na...Rule Medium Severity -
SRG-OS-000368
<GroupDescription></GroupDescription>Group -
For Impact Level 6, the Mission Owner must process connection approval to the SIPRNet through the DISA classified connection approval process.
<VulnDiscussion>The DOD Mission Owner systems/applications instantiated in these Impact Level 6 CSO enclaves will be assessed and authorized ...Rule Medium Severity -
SRG-OS-000368
<GroupDescription></GroupDescription>Group -
The Mission Owner of the Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) must remove orphaned or unused virtual machine (VM) instances.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some VMs may provide a capabi...Rule Medium Severity -
SRG-OS-000370
<GroupDescription></GroupDescription>Group -
The Infrastructure as a Service (IaaS)/Platform as a Service (PaaS)/Software as a Service (SaaS) must register the service/application with the DOD DMZ/IAP allowlist for internet-facing inbound and outbound traffic.
<VulnDiscussion>Register the service/application with the DOD DMZ/IAP allowlist for both inbound and outbound traffic if traffic will cross t...Rule Medium Severity -
SRG-OS-000404
<GroupDescription></GroupDescription>Group -
For storage service offerings, the Mission Owner must configure or ensure the cloud instance uses encryption to protect all DOD files housed in the cloud instance.
<VulnDiscussion>Mission systems at all Impact Levels must have the capability for DOD data to be encrypted at rest with exclusive DOD control...Rule High Severity -
SRG-OS-000438
<GroupDescription></GroupDescription>Group -
The Mission Owner of the Infrastructure as a Service (IaaS) or Platform as a Service (PaaS) must remove all upgraded or replaced software and firmware components that are no longer required for operation.
<VulnDiscussion>Adversaries may exploit previous versions of software components that are not removed from the information system after updat...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.