Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000820

    <GroupDescription></GroupDescription>
    Group
  • The web server must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.

    &lt;VulnDiscussion&gt;The purpose of requiring a device separate from the system to which the user is attempting to gain access for one of the fact...
    Rule Medium Severity
  • SRG-APP-000825

    <GroupDescription></GroupDescription>
    Group
  • The web server must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.

    &lt;VulnDiscussion&gt;The purpose of requiring a device that is separate from the system to which the user is attempting to gain access for one of ...
    Rule Medium Severity
  • SRG-APP-000830

    <GroupDescription></GroupDescription>
    Group
  • The web server must, for password-based authentication, maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity
  • SRG-APP-000835

    <GroupDescription></GroupDescription>
    Group
  • The web server must, for password-based authentication, update the list of passwords on an organization-defined frequency.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity
  • SRG-APP-000840

    <GroupDescription></GroupDescription>
    Group
  • The web server must, for password-based authentication, update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity
  • SRG-APP-000845

    <GroupDescription></GroupDescription>
    Group
  • The web server must, for password-based authentication, verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity
  • SRG-APP-000850

    <GroupDescription></GroupDescription>
    Group
  • The web server must, for password-based authentication, store passwords using an approved salted key derivation function, preferably using a keyed hash.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity
  • SRG-APP-000855

    <GroupDescription></GroupDescription>
    Group
  • The web server must, for password-based authentication, require immediate selection of a new password upon account recovery.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity
  • SRG-APP-000860

    <GroupDescription></GroupDescription>
    Group
  • The web server must, for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity
  • SRG-APP-000865

    <GroupDescription></GroupDescription>
    Group
  • The web server must, for password-based authentication, employ automated tools to assist the user in selecting strong password authenticators.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity
  • SRG-APP-000870

    <GroupDescription></GroupDescription>
    Group
  • The web server must, for password-based authentication, enforce organization-defined composition and complexity rules.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity
  • SRG-APP-000875

    <GroupDescription></GroupDescription>
    Group
  • The web server must, for public key-based authentication, implement a local cache of revocation data to support path discovery and validation.

    &lt;VulnDiscussion&gt;Public key cryptography is a valid authentication mechanism for individuals, machines, and devices. For PKI solutions, status...
    Rule Medium Severity
  • SRG-APP-000880

    <GroupDescription></GroupDescription>
    Group
  • The web server must protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.

    &lt;VulnDiscussion&gt;Nonlocal maintenance and diagnostic activities are conducted by individuals who communicate through either an external or int...
    Rule Medium Severity
  • SRG-APP-000910

    <GroupDescription></GroupDescription>
    Group
  • The web server must include only approved trust anchors in trust stores or certificate stores managed by the organization.

    &lt;VulnDiscussion&gt;Public key infrastructure (PKI) certificates are certificates with visibility external to organizational systems and certific...
    Rule Medium Severity
  • SRG-APP-000915

    <GroupDescription></GroupDescription>
    Group
  • The web server must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.

    &lt;VulnDiscussion&gt;A Trusted Platform Module (TPM) is an example of a hardware-protected data store that can be used to protect cryptographic ke...
    Rule Medium Severity
  • SRG-APP-000920

    <GroupDescription></GroupDescription>
    Group
  • The web server must synchronize system clocks within and between systems or system components.

    &lt;VulnDiscussion&gt;Time synchronization of system clocks is essential for the correct execution of many system services, including identificatio...
    Rule Medium Severity
  • SRG-APP-000925

    <GroupDescription></GroupDescription>
    Group
  • The web server must compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source.

    &lt;VulnDiscussion&gt;Synchronization of internal system clocks with an authoritative source provides uniformity of time stamps for systems with mu...
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • The web server must restrict a consistent inbound source IP for the entire management session.

    &lt;VulnDiscussion&gt;Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • The web server must restrict a consistent inbound source IP for the entire user session.

    &lt;VulnDiscussion&gt;Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...
    Rule Info Severity
  • SRG-APP-000439

    <GroupDescription></GroupDescription>
    Group
  • The web server must use HTTP/2, at a minimum.

    &lt;VulnDiscussion&gt;HTTP/2, like HTTPS, enhances security compared to HTTP/1.x by minimizing the risk of header-based attacks (e.g., header injec...
    Rule Medium Severity
  • SRG-APP-000439

    <GroupDescription></GroupDescription>
    Group
  • The web server must disable HTTP/1.x downgrading.

    &lt;VulnDiscussion&gt;HTTP/2 is backward compatible with HTTP/1.x, so it is possible to configure the architecture to implement a front-end server ...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The web server must interpret and normalize ambiguous HTTP requests or terminate the TCP connection.

    &lt;VulnDiscussion&gt;Request smuggling attacks involve placing both the Content-Length header and the Transfer-Encoding header into a single HTTP/...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The web server must terminate the connection if server-level exceptions are triggered when handling requests to prevent HTTP request smuggling attacks.

    &lt;VulnDiscussion&gt;The web server defines a set of exceptions for every HTTP status code. Each exception class has a status code according to RF...
    Rule Medium Severity
  • SRG-APP-000439

    <GroupDescription></GroupDescription>
    Group
  • The web server must only use forward proxies that route HTTP/2 requests upstream.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules