Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000456

    <GroupDescription></GroupDescription>
    Group
  • The web server must install security-relevant software updates within the configured time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    &lt;VulnDiscussion&gt;Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products t...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • All accounts installed with the web server software and tools must have passwords assigned and default passwords changed.

    &lt;VulnDiscussion&gt;During installation of the web server software, accounts are created for the web server to operate properly. The accounts ins...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The web server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Configuring the web server to implement organization-wide security implementation guides and security checklists guarantees c...
    Rule Medium Severity
  • SRG-APP-000416

    <GroupDescription></GroupDescription>
    Group
  • The web server must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting data that must be compartmentalized.

    &lt;VulnDiscussion&gt;Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested e...
    Rule Medium Severity
  • SRG-APP-000700

    <GroupDescription></GroupDescription>
    Group
  • The web server must disable accounts when the accounts have expired.

    &lt;VulnDiscussion&gt;Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality...
    Rule Medium Severity
  • SRG-APP-000705

    <GroupDescription></GroupDescription>
    Group
  • The web server must disable accounts when the accounts are no longer associated to a user.

    &lt;VulnDiscussion&gt;Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality...
    Rule Medium Severity
  • SRG-APP-000745

    <GroupDescription></GroupDescription>
    Group
  • The web server must implement the capability to centrally review and analyze audit records from multiple components within the system.

    &lt;VulnDiscussion&gt;Automated mechanisms for centralized reviews and analyses include security information and event management products.&lt;/Vul...
    Rule Medium Severity
  • SRG-APP-000795

    <GroupDescription></GroupDescription>
    Group
  • The web server must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.

    &lt;VulnDiscussion&gt;Audit information includes all information needed to successfully audit system activity, such as audit records, audit log set...
    Rule Medium Severity
  • SRG-APP-000805

    <GroupDescription></GroupDescription>
    Group
  • The web server must automatically generate audit records of the enforcement actions.

    &lt;VulnDiscussion&gt;Organizations log system accesses associated with applying configuration changes to ensure that configuration change control ...
    Rule Medium Severity
  • SRG-APP-000815

    <GroupDescription></GroupDescription>
    Group
  • The web server must require users to be individually authenticated before granting access to the shared accounts or resources.

    &lt;VulnDiscussion&gt;Individual authentication prior to shared group authentication mitigates the risk of using group accounts or authenticators.&...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules