Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000412

    <GroupDescription></GroupDescription>
    Group
  • Mainframe Products must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.

    &lt;VulnDiscussion&gt;Privileged access contains control and configuration information which is particularly sensitive, so additional protections a...
    Rule Medium Severity
  • SRG-APP-000413

    <GroupDescription></GroupDescription>
    Group
  • Mainframe Products must verify remote disconnection at the termination of nonlocal maintenance and diagnostic sessions.

    &lt;VulnDiscussion&gt;If the remote connection is not closed and verified as closed, the session may remain open and be exploited by an attacker; t...
    Rule Medium Severity
  • SRG-APP-000414

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must implement privileged access authorization to all information systems and infrastructure components for selected vulnerability scanning activities as defined in the site security plan.

    &lt;VulnDiscussion&gt;In certain situations, the nature of the vulnerability scanning may be more intrusive, or the information system component th...
    Rule Medium Severity
  • SRG-APP-000428

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must implement cryptographic mechanisms to prevent unauthorized modification of all information not cleared for public release at rest on system components outside of organization facilities.

    &lt;VulnDiscussion&gt;Applications handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized ...
    Rule High Severity
  • SRG-APP-000429

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must implement cryptographic mechanisms to prevent unauthorized disclosure of all information not cleared for public release at rest on system components outside of organization facilities.

    &lt;VulnDiscussion&gt;Applications handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized ...
    Rule High Severity
  • SRG-APP-000431

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must maintain a separate execution domain for each executing process.

    &lt;VulnDiscussion&gt;Applications can maintain separate execution domains for each executing process by assigning each process a separate address ...
    Rule Medium Severity
  • SRG-APP-000447

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.

    &lt;VulnDiscussion&gt;A common vulnerability of applications is unpredictable behavior when invalid inputs are received. This requirement guards ag...
    Rule Medium Severity
  • SRG-APP-000450

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must implement security safeguards to protect its memory from unauthorized code execution.

    &lt;VulnDiscussion&gt;Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...
    Rule Medium Severity
  • SRG-APP-000454

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must remove all upgraded/replaced software components that are no longer required for operation after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of software components that are not removed from the information system after updates have been installed m...
    Rule Medium Severity
  • SRG-APP-000456

    <GroupDescription></GroupDescription>
    Group
  • The Mainframe Product must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVMs, CTOs, DTMs, and STIGs).

    &lt;VulnDiscussion&gt;Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules