II - Mission Support Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000427-AS-000264
<GroupDescription></GroupDescription>Group -
JBoss must be configured to use DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
<VulnDiscussion>Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...Rule Medium Severity -
SRG-APP-000435-AS-000069
<GroupDescription></GroupDescription>Group -
The JBoss server, when hosting mission critical applications, must be in a high-availability (HA) cluster.
<VulnDiscussion>A MAC I system is a system that handles data vital to the organization's operational readiness or effectiveness of deployed o...Rule Medium Severity -
SRG-APP-000439-AS-000155
<GroupDescription></GroupDescription>Group -
JBoss must be configured to use an approved TLS version.
<VulnDiscussion>Preventing the disclosure of transmitted information requires that the application server take measures to employ some form o...Rule Medium Severity -
SRG-APP-000440-AS-000167
<GroupDescription></GroupDescription>Group -
JBoss must be configured to use an approved cryptographic algorithm in conjunction with TLS.
<VulnDiscussion>Preventing the disclosure or modification of transmitted information requires that application servers take measures to emplo...Rule Medium Severity -
SRG-APP-000456-AS-000266
<GroupDescription></GroupDescription>Group -
Production JBoss servers must be supported by the vendor.
<VulnDiscussion>The JBoss product is available as Open Source; however, the Red Hat vendor provides updates, patches and support for the JBos...Rule High Severity -
SRG-APP-000456-AS-000266
<GroupDescription></GroupDescription>Group -
The JRE installed on the JBoss server must be kept up to date.
<VulnDiscussion>The JBoss product is available as Open Source; however, the Red Hat vendor provides updates, patches and support for the JBos...Rule High Severity -
SRG-APP-000495-AS-000220
<GroupDescription></GroupDescription>Group -
JBoss must be configured to generate log records when successful/unsuccessful attempts to modify privileges occur.
<VulnDiscussion>Changing privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful/unsuccessfu...Rule Medium Severity -
SRG-APP-000499-AS-000224
<GroupDescription></GroupDescription>Group -
JBoss must be configured to generate log records when successful/unsuccessful attempts to delete privileges occur.
<VulnDiscussion>Deleting privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful and unsucce...Rule Medium Severity -
SRG-APP-000503-AS-000228
<GroupDescription></GroupDescription>Group -
JBoss must be configured to generate log records when successful/unsuccessful logon attempts occur.
<VulnDiscussion>Logging the access to the application server allows the system administrators to monitor user accounts. By logging successfu...Rule Medium Severity -
SRG-APP-000504-AS-000229
<GroupDescription></GroupDescription>Group -
JBoss must be configured to generate log records for privileged activities.
<VulnDiscussion>Without generating log records that are specific to the security and mission needs of the organization, it would be difficult...Rule Medium Severity -
SRG-APP-000505-AS-000230
<GroupDescription></GroupDescription>Group -
JBoss must be configured to generate log records that show starting and ending times for access to the application server management interface.
<VulnDiscussion>Determining when a user has accessed the management interface is important to determine the timeline of events when a securit...Rule Medium Severity -
SRG-APP-000506-AS-000231
<GroupDescription></GroupDescription>Group -
JBoss must be configured to generate log records when concurrent logons from different workstations occur to the application server management interface.
<VulnDiscussion>Concurrent logons from different systems could possibly indicate a compromised account. When concurrent logons are made from...Rule Medium Severity -
SRG-APP-000509-AS-000234
<GroupDescription></GroupDescription>Group -
JBoss must be configured to generate log records for all account creations, modifications, disabling, and termination events.
<VulnDiscussion>The maintenance of user accounts is a key activity within the system to determine access and privileges. Through changes to ...Rule Medium Severity -
SRG-APP-000514-AS-000137
<GroupDescription></GroupDescription>Group -
The JBoss server must be configured to use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates.
<VulnDiscussion>Class 3 PKI certificates are used for servers and software signing rather than for identifying individuals. Class 4 certifica...Rule Medium Severity -
SRG-APP-000515-AS-000203
<GroupDescription></GroupDescription>Group -
JBoss servers must be configured to roll over and transfer logs on a minimum weekly basis.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Protecting log data is ...Rule Medium Severity -
SRG-APP-000516-AS-000237
<GroupDescription></GroupDescription>Group -
The JBoss server must be configured to bind the management interfaces to only management networks.
<VulnDiscussion>JBoss provides multiple interfaces for accessing the system. By default, these are called "public" and "management". Allowi...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.