Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000141-DB-000093

    <GroupDescription></GroupDescription>
    Group
  • Access to external executables must be disabled or restricted.

    &lt;VulnDiscussion&gt;Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...
    Rule Medium Severity
  • SRG-APP-000142-DB-000094

    <GroupDescription></GroupDescription>
    Group
  • MariaDB must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity
  • SRG-APP-000148-DB-000103

    <GroupDescription></GroupDescription>
    Group
  • MariaDB must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-APP-000164-DB-000401

    <GroupDescription></GroupDescription>
    Group
  • If MariaDB authentication, using passwords, is employed, then MariaDB must enforce the DOD standards for password complexity.

    &lt;VulnDiscussion&gt;OS/enterprise authentication and identification must be used (SRG-APP-000023-DB-000001). Native MariaDB authentication may be...
    Rule High Severity
  • SRG-APP-000164-DB-000401

    <GroupDescription></GroupDescription>
    Group
  • If MariaDB authentication using passwords is employed, MariaDB must enforce the DOD standards for password lifetime.

    &lt;VulnDiscussion&gt;OS/enterprise authentication and identification must be used (SRG-APP-000023-DB-000001). Native MariaDB authentication may be...
    Rule Medium Severity
  • SRG-APP-000171-DB-000074

    <GroupDescription></GroupDescription>
    Group
  • If passwords are used for authentication, MariaDB must store only hashed, salted representations of passwords.

    &lt;VulnDiscussion&gt;The DOD standard for authentication is DOD-approved PKI certificates. Authentication based on User ID and Password may be us...
    Rule High Severity
  • SRG-APP-000172-DB-000075

    <GroupDescription></GroupDescription>
    Group
  • If passwords are used for authentication, MariaDB must transmit only encrypted representations of passwords.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be us...
    Rule High Severity
  • SRG-APP-000175-DB-000067

    <GroupDescription></GroupDescription>
    Group
  • MariaDB, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. A certificate's certification path is the path from th...
    Rule Medium Severity
  • SRG-APP-000176-DB-000068

    <GroupDescription></GroupDescription>
    Group
  • MariaDB must enforce authorized access to all PKI private keys stored/used by the DBMS.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. PKI certificate-based authentication is performed by re...
    Rule High Severity
  • SRG-APP-000177-DB-000069

    <GroupDescription></GroupDescription>
    Group
  • MariaDB must map PKI ID to an associated user account.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Once a PKI is validated, it is mapped to the DBMS user ...
    Rule Medium Severity
  • SRG-APP-000178-DB-000083

    <GroupDescription></GroupDescription>
    Group
  • MariaDB must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Normally, with PKI authentication, the interaction wit...
    Rule High Severity
  • SRG-APP-000179-DB-000114

    <GroupDescription></GroupDescription>
    Group
  • MariaDB must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.

    &lt;VulnDiscussion&gt;Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures ...
    Rule High Severity
  • SRG-APP-000180-DB-000115

    <GroupDescription></GroupDescription>
    Group
  • The MariaDB must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users).

    &lt;VulnDiscussion&gt;Nonorganizational users include all information system users other than organizational users, which include organizational em...
    Rule Medium Severity
  • SRG-APP-000211-DB-000122

    <GroupDescription></GroupDescription>
    Group
  • MariaDB must separate user functionality (including user interface services) from database management functionality.

    &lt;VulnDiscussion&gt;Information system management functionality includes functions necessary to administer databases, network components, worksta...
    Rule Medium Severity
  • SRG-APP-000220-DB-000149

    <GroupDescription></GroupDescription>
    Group
  • MariaDB must invalidate session identifiers upon user logout or other session termination.

    &lt;VulnDiscussion&gt;Captured sessions can be reused in replay attacks. This requirement limits the ability of adversaries to capture and continue...
    Rule Medium Severity
  • SRG-APP-000224-DB-000384

    <GroupDescription></GroupDescription>
    Group
  • MariaDB must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.

    &lt;VulnDiscussion&gt;Unique session IDs help to reduce predictability of said identifiers. Unique session IDs address man-in-the-middle attacks, i...
    Rule Medium Severity
  • SRG-APP-000225-DB-000153

    <GroupDescription></GroupDescription>
    Group
  • MariaDB must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.

    &lt;VulnDiscussion&gt;Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. ...
    Rule Medium Severity
  • SRG-APP-000226-DB-000147

    <GroupDescription></GroupDescription>
    Group
  • In the event of a system failure, MariaDB must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.

    &lt;VulnDiscussion&gt;Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. F...
    Rule Medium Severity
  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • MariaDB must protect the confidentiality and integrity of all information at rest.

    &lt;VulnDiscussion&gt;This control is intended to address the confidentiality and integrity of information at rest in nonmobile devices and covers ...
    Rule High Severity
  • SRG-APP-000243-DB-000128

    <GroupDescription></GroupDescription>
    Group
  • Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.

    &lt;VulnDiscussion&gt;Applications, including MariaDB, must prevent unauthorized and unintended information transfer via shared system resources. ...
    Rule Medium Severity
  • SRG-APP-000243-DB-000373

    <GroupDescription></GroupDescription>
    Group
  • MariaDB must prevent unauthorized and unintended information transfer via shared system resources.

    &lt;VulnDiscussion&gt;The purpose of this control is to prevent information, including encrypted representations of information, produced by the ac...
    Rule Medium Severity
  • SRG-APP-000243-DB-000374

    <GroupDescription></GroupDescription>
    Group
  • Access to database files must be limited to relevant processes and to authorized, administrative users.

    &lt;VulnDiscussion&gt;Applications, including MariaDB, must prevent unauthorized and unintended information transfer via shared system resources. P...
    Rule Medium Severity
  • SRG-APP-000251-DB-000160

    <GroupDescription></GroupDescription>
    Group
  • MariaDB must check the validity of all data inputs except those specifically identified by the organization.

    &lt;VulnDiscussion&gt;Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application ...
    Rule Medium Severity
  • SRG-APP-000251-DB-000391

    <GroupDescription></GroupDescription>
    Group
  • MariaDB and associated applications must reserve the use of dynamic code execution for situations that require it.

    &lt;VulnDiscussion&gt;With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection...
    Rule Medium Severity
  • SRG-APP-000251-DB-000392

    <GroupDescription></GroupDescription>
    Group
  • MariaDB and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.

    &lt;VulnDiscussion&gt;With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules