III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000427-AS-000264
Group -
JBoss must be configured to use DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD systems or by organizations with insufficient secur...Rule Medium Severity -
SRG-APP-000435-AS-000069
Group -
The JBoss server, when hosting mission critical applications, must be in a high-availability (HA) cluster.
A MAC I system is a system that handles data vital to the organization's operational readiness or effectiveness of deployed or contingency forces. A MAC I system must maintain the highest level of...Rule Medium Severity -
SRG-APP-000439-AS-000155
Group -
JBoss must be configured to use an approved TLS version.
Preventing the disclosure of transmitted information requires that the application server take measures to employ some form of cryptographic mechanism in order to protect the information during tra...Rule Medium Severity -
SRG-APP-000440-AS-000167
Group -
JBoss must be configured to use an approved cryptographic algorithm in conjunction with TLS.
Preventing the disclosure or modification of transmitted information requires that application servers take measures to employ approved cryptography in order to protect the information during trans...Rule Medium Severity -
SRG-APP-000456-AS-000266
Group -
Production JBoss servers must be supported by the vendor.
The JBoss product is available as Open Source; however, the Red Hat vendor provides updates, patches and support for the JBoss product. It is imperative that patches and updates be applied to JBos...Rule High Severity -
SRG-APP-000456-AS-000266
Group -
The JRE installed on the JBoss server must be kept up to date.
The JBoss product is available as Open Source; however, the Red Hat vendor provides updates, patches and support for the JBoss product. It is imperative that patches and updates be applied to JBos...Rule High Severity -
SRG-APP-000495-AS-000220
Group -
JBoss must be configured to generate log records when successful/unsuccessful attempts to modify privileges occur.
Changing privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful/unsuccessful changes are made, the event needs to be logged. By logging the event,...Rule Medium Severity -
SRG-APP-000499-AS-000224
Group -
JBoss must be configured to generate log records when successful/unsuccessful attempts to delete privileges occur.
Deleting privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful and unsuccessful privilege deletions are made, the events need to be logged. By lo...Rule Medium Severity -
SRG-APP-000503-AS-000228
Group -
JBoss must be configured to generate log records when successful/unsuccessful logon attempts occur.
Logging the access to the application server allows the system administrators to monitor user accounts. By logging successful/unsuccessful logons, the system administrator can determine if an acco...Rule Medium Severity -
SRG-APP-000504-AS-000229
Group -
JBoss must be configured to generate log records for privileged activities.
Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an inci...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.