Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000164-DB-000401

    <GroupDescription></GroupDescription>
    Group
  • If MarkLogic Server authentication using passwords is employed, MarkLogic Server must enforce the DOD standards for password complexity and lifetime.

    &lt;VulnDiscussion&gt;OS/enterprise authentication and identification must be used (SRG-APP-000023-DB-000001). Native DBMS authentication may be us...
    Rule Medium Severity
  • SRG-APP-000172-DB-000075

    <GroupDescription></GroupDescription>
    Group
  • If passwords are used for authentication, the MarkLogic Server must transmit only encrypted representations of passwords.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be us...
    Rule High Severity
  • SRG-APP-000175-DB-000067

    <GroupDescription></GroupDescription>
    Group
  • MarkLogic Server, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. A certificate’s certification path is the path from th...
    Rule Medium Severity
  • SRG-APP-000176-DB-000068

    <GroupDescription></GroupDescription>
    Group
  • MarkLogic Server must enforce authorized access to all PKI private keys stored/utilized by the DBMS.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. PKI certificate-based authentication is performed by re...
    Rule High Severity
  • SRG-APP-000179-DB-000114

    <GroupDescription></GroupDescription>
    Group
  • MarkLogic Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations and protect classified information in accordance with the requirements of the data owner.

    &lt;VulnDiscussion&gt;Use of weak or not validated cryptographic algorithms undermines the purposes of using encryption and digital signatures to p...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules