Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000175

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

    &lt;VulnDiscussion&gt;Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...
    Rule High Severity
  • SRG-APP-000176

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server, when using PKI-based authentication, must enforce authorized access to the corresponding private key.

    &lt;VulnDiscussion&gt;If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...
    Rule High Severity
  • SRG-APP-000177

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must map the authenticated identity to the individual user or group account for PKI-based authentication.

    &lt;VulnDiscussion&gt;Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the indivi...
    Rule Low Severity
  • SRG-APP-000178

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must obfuscate authentication information during the authentication process so that the authentication is not visible.

    &lt;VulnDiscussion&gt;To prevent the compromise of authentication information such as passwords during the authentication process, the feedback fro...
    Rule High Severity
  • SRG-APP-000179

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only).

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. To protect ...
    Rule High Severity
  • SRG-APP-000181

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured to perform audit reduction that supports on-demand reporting requirements.

    &lt;VulnDiscussion&gt;The ability to generate on-demand reports, including after the audit data has been subjected to audit reduction, greatly faci...
    Rule Medium Severity
  • SRG-APP-000292

    <GroupDescription></GroupDescription>
    Group
  • For devices and hosts within its scope of coverage, the Central Log Server must be configured to notify the System Administrator (SA) and Information System Security Officer (ISSO) when account modification events are received.

    &lt;VulnDiscussion&gt;When application accounts are modified, user accessibility is affected. Accounts are used for identifying individual users or...
    Rule Low Severity
  • SRG-APP-000293

    <GroupDescription></GroupDescription>
    Group
  • For devices and hosts within its scope of coverage, the Central Log Server must notify the System Administrator (SA) and Information System Security Officer (ISSO) when events indicating account disabling actions are received.

    &lt;VulnDiscussion&gt;When application accounts are disabled, user accessibility is affected. Accounts are used for identifying individual users or...
    Rule Low Severity
  • SRG-APP-000294

    <GroupDescription></GroupDescription>
    Group
  • For devices and hosts within its scope of coverage, the Central Log Server must notify the System Administrator (SA) and Information System Security Officer (ISSO) when events indicating account removal actions are received.

    &lt;VulnDiscussion&gt;When application accounts are removed, user accessibility is affected. Accounts are used for identifying users or for identif...
    Rule Low Severity
  • SRG-APP-000356

    <GroupDescription></GroupDescription>
    Group
  • The Central Log Server must be configured for centralized management of the events repository for the purposes of configuration, analysis, and reporting.

    &lt;VulnDiscussion&gt;If the application is not configured to centrally manage the content captured in the log records, identification, troubleshoo...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules