Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000226

    <GroupDescription></GroupDescription>
    Group
  • In the event of a system failure, the UEM server must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.

    &lt;VulnDiscussion&gt;Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must check the validity of all data inputs.

    &lt;VulnDiscussion&gt;Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application ...
    Rule Medium Severity
  • SRG-APP-000266

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    &lt;VulnDiscussion&gt;Any application providing too much information in error messages risks compromising the data and security of the application ...
    Rule Medium Severity
  • SRG-APP-000267

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must reveal error messages only to the Information System Security Manager (ISSM) and Information System Security Officer (ISSO).

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-APP-000275

    <GroupDescription></GroupDescription>
    Group
  • The application must notify the Information System Security Manager (ISSM) and Information System Security Officer (ISSO) of failed security verification tests.

    &lt;VulnDiscussion&gt;If personnel are not notified of failed security verification tests, they will not be able to take corrective action and the ...
    Rule Medium Severity
  • SRG-APP-000291

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are created.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...
    Rule Medium Severity
  • SRG-APP-000292

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are modified.

    &lt;VulnDiscussion&gt;When application accounts are modified, user accessibility is affected. Accounts are utilized for identifying individual user...
    Rule Medium Severity
  • SRG-APP-000293

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must notify system administrators (SAs) and the information system security officer (ISSO) for account disabling actions.

    &lt;VulnDiscussion&gt;When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual user...
    Rule Medium Severity
  • SRG-APP-000294

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must notify system administrators (SAs) and the information system security officer (ISSO) for account removal actions.

    &lt;VulnDiscussion&gt;When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for ide...
    Rule Medium Severity
  • SRG-APP-000295

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must automatically terminate a user session after an organization-defined period of user inactivity.

    &lt;VulnDiscussion&gt;Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules