Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • A Trellix Application Control written policy must be documented to outline the organization-specific variables for application whitelisting.

    &lt;VulnDiscussion&gt;Enabling application whitelisting without adequate design and organization-specific requirements will either result in an imp...
    Rule Medium Severity
  • SRG-APP-000165

    <GroupDescription></GroupDescription>
    Group
  • The use of a Solidcore 8.x local Command Line Interface (CLI) Access Password must be documented in the organizations written policy.

    &lt;VulnDiscussion&gt;The Solidcore client can be configured locally at the CLI, but only when accessed with the required password. Since the Trel...
    Rule Medium Severity
  • SRG-APP-000169

    <GroupDescription></GroupDescription>
    Group
  • The Solidcore client Command Line Interface (CLI) Access password complexity requirements must be documented in the organizations written policy.

    &lt;VulnDiscussion&gt;The Solidcore client can be configured locally at the CLI, but only when accessed with the required password. The misuse of ...
    Rule Medium Severity
  • SRG-APP-000172

    <GroupDescription></GroupDescription>
    Group
  • The Solidcore client Command Line Interface (CLI) Access Password protection process must be documented in the organizations written policy.

    &lt;VulnDiscussion&gt;The Solidcore client can be configured locally at the CLI, but only when accessed with the required password. Since the Trel...
    Rule Medium Severity
  • SRG-APP-000174

    <GroupDescription></GroupDescription>
    Group
  • The requirement for scheduled Solidcore client Command Line Interface (CLI) Access Password changes must be documented in the organizations written policy.

    &lt;VulnDiscussion&gt;The Solidcore client can be configured locally at the CLI, but only when accessed with the required password. The misuse of ...
    Rule Medium Severity
  • SRG-APP-000397

    <GroupDescription></GroupDescription>
    Group
  • The process by which the Solidcore client Command Line Interface (CLI) Access Password is made available to administrators when needed must be documented in the organizations written policy.

    &lt;VulnDiscussion&gt;The Solidcore client can be configured locally at the CLI, but only when accessed with the required password. Since the Trel...
    Rule Medium Severity
  • SRG-APP-000276

    <GroupDescription></GroupDescription>
    Group
  • The Trellix Application Control Options Advanced Threat Defense (ATD) settings, if being used, must be confined to the organizations enclave.

    &lt;VulnDiscussion&gt;Data will be leaving the endpoint to be analyzed by the ATD. Because data could feasibly be intercepted en route, risk of out...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • The configuration of features under Trellix Application Control Options policies Enforce feature control must be documented in the organizations written policy.

    &lt;VulnDiscussion&gt;By default, the Trellix Application Control prevents installation of ActiveX controls on endpoints, enforces memory protectio...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • The organizations written policy must include a process for how whitelisted applications are deemed to be allowed.

    &lt;VulnDiscussion&gt;Enabling application whitelisting without adequate design and organization-specific requirements will either result in an imp...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • The organizations written policy must include procedures for how often the whitelist of allowed applications is reviewed.

    &lt;VulnDiscussion&gt;Enabling application whitelisting without adequate design and organization-specific requirements will either result in an imp...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • The Solidcore client must be enabled.

    &lt;VulnDiscussion&gt;The Application Control whitelisting must be enabled on all workstation endpoints. To enable Application Control, the Solidco...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • The Solidcore client Command Line Interface (CLI) must be in lockdown mode.

    &lt;VulnDiscussion&gt;By default, when an endpoint's Solidcore installation is managed by the ePO server, the CLI will automatically be in lockdown...
    Rule High Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • The Solidcore client Command Line Interface (CLI) Access Password must be changed from the default.

    &lt;VulnDiscussion&gt;The Solidcore client can be configured locally at the CLI, but only when accessed with the required password. Since the Trel...
    Rule High Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • The organization-specific Rules policy must only include executable and dll files that are associated with applications as allowed by the organizations written policy.

    &lt;VulnDiscussion&gt;To ensure Solidcore clients are only configured to STIG and organization-specific settings, organization-specific ePO policie...
    Rule Medium Severity
  • SRG-APP-000276

    <GroupDescription></GroupDescription>
    Group
  • The Trellix Application Control Options Reputation setting must be configured to use the Trellix Global Threat Intelligence (Trellix GTI) option.

    &lt;VulnDiscussion&gt;If a Threat Intelligence Exchange (TIE) server is being used in the organization, reputation for files and certificates is fe...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • The Trellix Application Control Options Reputation-Based Execution settings, if enabled, must be configured to allow Most Likely Trusted or Known Trusted only.

    &lt;VulnDiscussion&gt;When a file is executed on an endpoint, the Application Control performs multiple checks to determine whether to allow or ban...
    Rule Medium Severity
  • SRG-APP-000276

    <GroupDescription></GroupDescription>
    Group
  • The Trellix Application Control Options Advanced Threat Defense (ATD) settings must not be enabled unless an internal ATD is maintained by the organization.

    &lt;VulnDiscussion&gt;This option will automatically send files with a specific file reputation to ATD for further analysis. This option is not sel...
    Rule Medium Severity
  • SRG-APP-000276

    <GroupDescription></GroupDescription>
    Group
  • The Trellix Application Control Options Advanced Threat Defense (ATD) settings, if being used, must be configured to send all binaries with a reputation of Might be Trusted and below for analysis.

    &lt;VulnDiscussion&gt;When the file reputation of "Might be Trusted" is configured for being forwarded to ATD, all files with the reputation of "Mi...
    Rule Medium Severity
  • SRG-APP-000276

    <GroupDescription></GroupDescription>
    Group
  • The Trellix Application Control Options Advanced Threat Defense (ATD) settings, if being used, must be configured to only send binaries with a size of 5MB or less.

    &lt;VulnDiscussion&gt;Since binaries can be large, the file size must be limited to avoid congestion on the network and degradation on the endpoint...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • Organization-specific Trellix Applications Control Options policies must be created and applied to all endpoints.

    &lt;VulnDiscussion&gt;To ensure Solidcore clients are only configured to STIG and organization-specific settings, organization-specific ePO policie...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • The Trellix Application Control Options policy must be configured to disable Self-Approval.

    &lt;VulnDiscussion&gt;The Trellix Application Control Self-Approval feature allows the user to take an action when a user tries to run a new or unk...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • The Trellix Application Control Options policy End User Notification, if configured by organization, must have all default variables replaced with the organization-specific data.

    &lt;VulnDiscussion&gt;The "User Message" option will show a dialog box when an event is detected and display the organization-specified text in the...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • The Trellix Application Control Options policies Enforce feature control memory protection must be enabled.

    &lt;VulnDiscussion&gt;By default, the Trellix Application Control prevents installation of ActiveX controls on endpoints, enforces memory protectio...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • Enabled features under Trellix Application Control Options policies Enforce feature control must not be configured unless documented in written policy and approved by ISSO/ISSM.

    &lt;VulnDiscussion&gt;By default, the Trellix Application Control prevents installation of ActiveX controls on endpoints, enforces memory protectio...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • The Trellix Application Control Options Inventory option must be configured to hide OS Files.

    &lt;VulnDiscussion&gt;By default, the Windows operating system files are excluded from the inventory. By selecting this option, the overwhelming th...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules