Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000153-AS-000104

    Group
  • Automation Controller must be configured to authenticate users individually, prior to using a group authenticator.

    Default superuser accounts, such as "root", are considered group authenticators. In the case of Automation Controller this is the "admin" account.
    Rule Medium Severity
  • SRG-APP-000172-AS-000121

    Group
  • Automation Controller must utilize encryption when using LDAP for authentication.

    To avoid access with malicious intent, passwords will need to be protected at all times. This includes transmission where passwords must be encrypted for security.
    Rule Medium Severity
  • SRG-APP-000290-AS-000174

    Group
  • Automation Controller must use cryptographic mechanisms to protect the integrity of log tools.

    Protecting the integrity of the tools used for logging purposes is a critical step in ensuring the integrity of log data. Log data includes all information (e.g., log records, log settings, and log...
    Rule Medium Severity
  • SRG-APP-000371-AS-000077

    Group
  • Automation Controller must compare internal application server clocks at least every 24 hours with an authoritative time source.

    When conducting forensic analysis and investigating system events, it is critical that timestamps accurately reflect the time of application events. If timestamps are not deemed to be accurate, the...
    Rule Medium Severity
  • SRG-APP-000427-AS-000264

    Group
  • Automation Controller must only allow the use of DOD PKI-established certificate authorities for verification of the establishment of protected sessions.

    An untrusted source may leave the system vulnerable to issues such as unauthorized access, reduced data integrity, loss of confidentiality, etc. Satisfies: SRG-APP-000427-AS-000264, SRG-APP-000514...
    Rule Medium Severity
  • SRG-APP-000456-AS-000266

    Group
  • Automation Controller must install security-relevant software updates within the time period directed by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs).

    Security relevant software updates must be installed within the timeframes directed by an authoritative source in order to maintain the integrity and confidentiality of the system and its organizat...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules