Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000120-AS-000080

    Group
  • File permissions must be configured to protect log information from unauthorized deletion.

    If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. When...
    Rule Medium Severity
  • SRG-APP-000125-AS-000084

    Group
  • JBoss log records must be off-loaded onto a different system or system component a minimum of every seven days.

    JBoss logs by default are written to the local file system. A centralized logging solution like syslog should be used whenever possible; however, any log data stored to the file system needs to be...
    Rule Medium Severity
  • SRG-APP-000133-AS-000092

    Group
  • mgmt-users.properties file permissions must be set to allow access to authorized users only.

    The mgmt-users.properties file contains the password hashes of all users who are in a management role and must be protected. Application servers have the ability to specify that the hosted applica...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • JBoss process owner interactive access must be restricted.

    JBoss does not require admin rights to operate and should be run as a regular user. In addition, if the user account was to be compromised and the account was allowed interactive logon rights, thi...
    Rule High Severity
  • SRG-APP-000141-AS-000095

    Group
  • Google Analytics must be disabled in EAP Console.

    The Google Analytics feature aims to help Red Hat EAP team understand how customers are using the console and which parts of the console matter the most to the customers. This information will, in ...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • JBoss process owner execution permissions must be limited.

    JBoss EAP application server can be run as the OS admin, which is not advised. Running the application server with admin privileges increases the attack surface by granting the application server ...
    Rule High Severity
  • SRG-APP-000141-AS-000095

    Group
  • JBoss QuickStarts must be removed.

    JBoss QuickStarts are demo applications that can be deployed quickly. Demo applications are not written with security in mind and often open new attack vectors. QuickStarts must be removed.
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • Remote access to JMX subsystem must be disabled.

    The JMX subsystem allows you to trigger JDK and application management operations remotely. In a managed domain configuration, the JMX subsystem is removed by default. For a standalone configurati...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • Welcome Web Application must be disabled.

    The Welcome to JBoss web page provides a redirect to the JBoss admin console, which, by default, runs on TCP 9990 as well as redirects to the Online User Guide and Online User Groups hosted at loca...
    Rule Low Severity
  • SRG-APP-000141-AS-000095

    Group
  • Any unapproved applications must be removed.

    Extraneous services and applications running on an application server expands the attack surface and increases risk to the application server. Securing any server involves identifying and removing ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules