I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000293
<GroupDescription></GroupDescription>Group -
The container platform must notify system administrators and ISSO for account disabling actions.
<VulnDiscussion>When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual user...Rule Medium Severity -
SRG-APP-000294
<GroupDescription></GroupDescription>Group -
The container platform must notify system administrators and ISSO for account removal actions.
<VulnDiscussion>When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for ide...Rule Medium Severity -
SRG-APP-000297
<GroupDescription></GroupDescription>Group -
Access to the container platform must display an explicit logout message to user indicating the reliable termination of authenticated communication sessions.
<VulnDiscussion>Access to the container platform will occur through web and terminal sessions. Any web interfaces must conform to application...Rule Low Severity -
SRG-APP-000317
<GroupDescription></GroupDescription>Group -
The container platform must terminate shared/group account credentials when members leave the group.
<VulnDiscussion>If shared/group account credentials are not terminated when individuals leave the group, the user that left the group can sti...Rule Medium Severity -
SRG-APP-000319
<GroupDescription></GroupDescription>Group -
The container platform must automatically audit account-enabling actions.
<VulnDiscussion>Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...Rule Medium Severity -
SRG-APP-000320
<GroupDescription></GroupDescription>Group -
The container platform must notify the system administrator (SA) and information system security officer (ISSO) of account enabling actions.
<VulnDiscussion>Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...Rule Medium Severity -
SRG-APP-000340
<GroupDescription></GroupDescription>Group -
The container platform must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
<VulnDiscussion>Controlling what users can perform privileged functions prevents unauthorized users from performing tasks that may expose dat...Rule Medium Severity -
SRG-APP-000342
<GroupDescription></GroupDescription>Group -
Container images instantiated by the container platform must execute using least privileges.
<VulnDiscussion>Containers running within the container platform must execute as non-privileged. When a container can execute as a privileged...Rule Medium Severity -
SRG-APP-000343
<GroupDescription></GroupDescription>Group -
The container platform must audit the execution of privileged functions.
<VulnDiscussion>Privileged functions within the container platform can be component specific or can envelope the entire container platform. B...Rule Medium Severity -
SRG-APP-000345
<GroupDescription></GroupDescription>Group -
The container platform must automatically lock an account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
<VulnDiscussion>By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.