III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000015-AS-000010
<GroupDescription></GroupDescription>Group -
HTTPS must be enabled for JBoss web interfaces.
<VulnDiscussion>Encryption is critical for protection of web-based traffic. If encryption is not being used to protect the application server...Rule Medium Severity -
SRG-APP-000033-AS-000024
<GroupDescription></GroupDescription>Group -
Java permissions must be set for hosted applications.
<VulnDiscussion>The Java Security Manager is a java class that manages the external boundary of the Java Virtual Machine (JVM) sandbox, contr...Rule High Severity -
SRG-APP-000033-AS-000024
<GroupDescription></GroupDescription>Group -
The Java Security Manager must be enabled for the JBoss application server.
<VulnDiscussion>The Java Security Manager is a java class that manages the external boundary of the Java Virtual Machine (JVM) sandbox, contr...Rule High Severity -
SRG-APP-000033-AS-000024
<GroupDescription></GroupDescription>Group -
The JBoss server must be configured with Role Based Access Controls.
<VulnDiscussion>By default, the JBoss server is not configured to utilize role based access controls (RBAC). RBAC provides the capability to...Rule High Severity -
SRG-APP-000033-AS-000024
<GroupDescription></GroupDescription>Group -
Users in JBoss Management Security Realms must be in the appropriate role.
<VulnDiscussion>Security realms are a series of mappings between users and passwords and users and roles. There are 2 JBoss security realms ...Rule Medium Severity -
SRG-APP-000033-AS-000024
<GroupDescription></GroupDescription>Group -
Silent Authentication must be removed from the Default Application Security Realm.
<VulnDiscussion>Silent Authentication is a configuration setting that allows local OS users access to the JBoss server and a wide range of op...Rule High Severity -
SRG-APP-000033-AS-000024
<GroupDescription></GroupDescription>Group -
Silent Authentication must be removed from the Default Management Security Realm.
<VulnDiscussion>Silent Authentication is a configuration setting that allows local OS users access to the JBoss server and a wide range of op...Rule High Severity -
SRG-APP-000033-AS-000024
<GroupDescription></GroupDescription>Group -
JBoss management interfaces must be secured.
<VulnDiscussion>JBoss utilizes the concept of security realms to secure the management interfaces used for JBoss server administration. If t...Rule High Severity -
SRG-APP-000089-AS-000050
<GroupDescription></GroupDescription>Group -
The JBoss server must generate log records for access and authentication events to the management interface.
<VulnDiscussion>Log records can be generated from various components within the JBoss application server. The minimum list of logged events ...Rule Medium Severity -
SRG-APP-000090-AS-000051
<GroupDescription></GroupDescription>Group -
JBoss must be configured to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which loggable events are to be logged.
<VulnDiscussion>The JBoss server must be configured to select which personnel are assigned the role of selecting which loggable events are to...Rule Medium Severity -
SRG-APP-000092-AS-000053
<GroupDescription></GroupDescription>Group -
JBoss must be configured to initiate session logging upon startup.
<VulnDiscussion>Session logging activities are developed, integrated, and used in consultation with legal counsel in accordance with applicab...Rule Medium Severity -
SRG-APP-000095-AS-000056
<GroupDescription></GroupDescription>Group -
JBoss must be configured to log the IP address of the remote system connecting to the JBoss system/cluster.
<VulnDiscussion>Information system logging capability is critical for accurate forensic analysis. Without being able to establish what type ...Rule Medium Severity -
SRG-APP-000095-AS-000056
<GroupDescription></GroupDescription>Group -
JBoss must be configured to produce log records containing information to establish what type of events occurred.
<VulnDiscussion>Information system logging capability is critical for accurate forensic analysis. Without being able to establish what type ...Rule Medium Severity -
SRG-APP-000096-AS-000059
<GroupDescription></GroupDescription>Group -
JBoss Log Formatter must be configured to produce log records that establish the date and time the events occurred.
<VulnDiscussion>Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate informatio...Rule Medium Severity -
SRG-APP-000097-AS-000060
<GroupDescription></GroupDescription>Group -
JBoss must be configured to produce log records that establish which hosted application triggered the events.
<VulnDiscussion>Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate informatio...Rule Medium Severity -
SRG-APP-000098-AS-000061
<GroupDescription></GroupDescription>Group -
JBoss must be configured to record the IP address and port information used by management interface network traffic.
<VulnDiscussion>Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate informatio...Rule Medium Severity -
SRG-APP-000099-AS-000062
<GroupDescription></GroupDescription>Group -
The application server must produce log records that contain sufficient information to establish the outcome of events.
<VulnDiscussion>Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to...Rule Medium Severity -
SRG-APP-000100-AS-000063
<GroupDescription></GroupDescription>Group -
JBoss ROOT logger must be configured to utilize the appropriate logging level.
<VulnDiscussion>Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to...Rule Medium Severity -
SRG-APP-000118-AS-000078
<GroupDescription></GroupDescription>Group -
File permissions must be configured to protect log information from any type of unauthorized read access.
<VulnDiscussion>If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially mali...Rule Medium Severity -
SRG-APP-000119-AS-000079
<GroupDescription></GroupDescription>Group -
File permissions must be configured to protect log information from unauthorized modification.
<VulnDiscussion>If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially mali...Rule Medium Severity -
SRG-APP-000120-AS-000080
<GroupDescription></GroupDescription>Group -
File permissions must be configured to protect log information from unauthorized deletion.
<VulnDiscussion>If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially mali...Rule Medium Severity -
SRG-APP-000125-AS-000084
<GroupDescription></GroupDescription>Group -
JBoss log records must be off-loaded onto a different system or system component a minimum of every seven days.
<VulnDiscussion>JBoss logs by default are written to the local file system. A centralized logging solution like syslog should be used whenev...Rule Medium Severity -
SRG-APP-000133-AS-000092
<GroupDescription></GroupDescription>Group -
mgmt-users.properties file permissions must be set to allow access to authorized users only.
<VulnDiscussion>The mgmt-users.properties file contains the password hashes of all users who are in a management role and must be protected. ...Rule Medium Severity -
SRG-APP-000141-AS-000095
<GroupDescription></GroupDescription>Group -
JBoss process owner interactive access must be restricted.
<VulnDiscussion>JBoss does not require admin rights to operate and should be run as a regular user. In addition, if the user account was to ...Rule High Severity -
SRG-APP-000141-AS-000095
<GroupDescription></GroupDescription>Group -
Google Analytics must be disabled in EAP Console.
<VulnDiscussion>The Google Analytics feature aims to help Red Hat EAP team understand how customers are using the console and which parts of ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.