Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000515

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Low Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to retain the identity of the original source host or device where the event occurred as part of the log record.

    &lt;VulnDiscussion&gt;In this case the information producer is the device based on IP address or some other identifier of the device producing the ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server that aggregates log records from hosts and devices must be configured to use TCP for transmission.

    &lt;VulnDiscussion&gt;If the default UDP protocol is used for communication between the hosts and devices to the Central Log Server, then log recor...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to notify the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.

    &lt;VulnDiscussion&gt;Notification may be configured to be sent by the device, SNMP server, or Central Log Server. The best practice is for these n...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to automatically create trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds).

    &lt;VulnDiscussion&gt;In most Central Log Server products today, log review (threat detection), can be automated by creating correlation content ma...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • For devices and hosts within the scope of coverage, the Central Log Server must be configured to automatically aggregate events that indicate account actions.

    &lt;VulnDiscussion&gt;If the Central Log Server is configured to filter or remove account log records transmitted by devices and hosts within its s...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts.

    &lt;VulnDiscussion&gt;This supports prioritization functions, which is a major reason why centralized management is a requirement in DoD. This incl...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Analysis, viewing, and indexing functions, services, and applications used as part of the Central Log Server must be configured to comply with DoD-trusted path and access requirements.

    &lt;VulnDiscussion&gt;Analysis, viewing, and indexing functions, services, and applications, such as analysis tools and other vendor-provided appli...
    Rule Medium Severity
  • SRG-APP-000026

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must automatically audit account creation.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Medium Severity
  • SRG-APP-000027

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must automatically audit account modification.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules