Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000368

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to generate reports that support after-the-fact investigations of security incidents.

    &lt;VulnDiscussion&gt;If the report generation capability does not support after-the-fact investigations, it is difficult to establish, correlate, ...
    Rule Low Severity
  • SRG-APP-000369

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to perform audit reduction that does not alter original content or time ordering of log records.

    &lt;VulnDiscussion&gt;If the audit reduction capability alters the content or time ordering of log records, the integrity of the log records is com...
    Rule Low Severity
  • SRG-APP-000370

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to generate reports that do not alter original content or time ordering of log records.

    &lt;VulnDiscussion&gt;If the audit report generation capability alters the original content or time ordering of log records, the integrity of the l...
    Rule Low Severity
  • SRG-APP-000374

    <GroupDescription></GroupDescription>
    Group
  • Upon receipt of the log record from hosts and devices, the Central Log Server must be configured to record time stamps of the time of receipt that can be mapped to Coordinated Universal Time (UTC).

    &lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...
    Rule Low Severity
  • SRG-APP-000375

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to record time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision.

    &lt;VulnDiscussion&gt;Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records....
    Rule Low Severity
  • SRG-APP-000391

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to accept the DoD CAC credential to support identity management and personal authentication.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...
    Rule Medium Severity
  • SRG-APP-000392

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to electronically verify the DoD CAC credential.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...
    Rule Medium Severity
  • SRG-APP-000397

    <GroupDescription></GroupDescription>
    Group
  • For locally created accounts in the application, the Central Log Server must be configured to allow the use of a temporary password for system logons with an immediate change to a permanent password.

    &lt;VulnDiscussion&gt;Without providing this capability, an account may be created without a password. Non-repudiation cannot be guaranteed once an...
    Rule Medium Severity
  • SRG-APP-000439

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to protect the confidentiality and integrity of transmitted information.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...
    Rule High Severity
  • SRG-APP-000514

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection.

    &lt;VulnDiscussion&gt;FIPS 140-2 precludes the use of unvalidated cryptography for the cryptographic protection of sensitive or valuable data withi...
    Rule High Severity
  • SRG-APP-000515

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Low Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to retain the identity of the original source host or device where the event occurred as part of the log record.

    &lt;VulnDiscussion&gt;In this case the information producer is the device based on IP address or some other identifier of the device producing the ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server that aggregates log records from hosts and devices must be configured to use TCP for transmission.

    &lt;VulnDiscussion&gt;If the default UDP protocol is used for communication between the hosts and devices to the Central Log Server, then log recor...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to notify the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.

    &lt;VulnDiscussion&gt;Notification may be configured to be sent by the device, SNMP server, or Central Log Server. The best practice is for these n...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to automatically create trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds).

    &lt;VulnDiscussion&gt;In most Central Log Server products today, log review (threat detection), can be automated by creating correlation content ma...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • For devices and hosts within the scope of coverage, the Central Log Server must be configured to automatically aggregate events that indicate account actions.

    &lt;VulnDiscussion&gt;If the Central Log Server is configured to filter or remove account log records transmitted by devices and hosts within its s...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts.

    &lt;VulnDiscussion&gt;This supports prioritization functions, which is a major reason why centralized management is a requirement in DoD. This incl...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Analysis, viewing, and indexing functions, services, and applications used as part of the Central Log Server must be configured to comply with DoD-trusted path and access requirements.

    &lt;VulnDiscussion&gt;Analysis, viewing, and indexing functions, services, and applications, such as analysis tools and other vendor-provided appli...
    Rule Medium Severity
  • SRG-APP-000026

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must automatically audit account creation.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Medium Severity
  • SRG-APP-000027

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must automatically audit account modification.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Medium Severity
  • SRG-APP-000028

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must automatically audit account disabling actions.

    &lt;VulnDiscussion&gt;When application accounts are disabled, user accessibility is affected. Once an attacker establishes access to an application...
    Rule Medium Severity
  • SRG-APP-000029

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must automatically audit account removal actions.

    &lt;VulnDiscussion&gt;When application accounts are removed, user accessibility is affected. Once an attacker establishes access to an application,...
    Rule Medium Severity
  • SRG-APP-000065

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must enforce the limit of three consecutive invalid logon attempts by a user during a 15 minute time period.

    &lt;VulnDiscussion&gt;By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-APP-000068

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the Central Log Server.

    &lt;VulnDiscussion&gt;Display of the DoD-approved use notification before granting access to the application ensures privacy and security notificat...
    Rule Low Severity
  • SRG-APP-000069

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.

    &lt;VulnDiscussion&gt;The banner must be acknowledged by the user prior to allowing the user access to the application. This provides assurance tha...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules