Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000023

    Group
  • AAA Services must be configured to provide automated account management functions.

    Enterprise environments make account management challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other error. A comprehensive acc...
    Rule Medium Severity
  • SRG-APP-000024

    Group
  • AAA Services must be configured to automatically remove temporary user accounts after 72 hours.

    When temporary user accounts remain active after no longer needed or for an excessive period, these accounts may be used to gain unauthorized access. To mitigate this risk, automated termination of...
    Rule Medium Severity
  • SRG-APP-000024

    Group
  • AAA Services must be configured to automatically remove authorizations for temporary user accounts after 72 hours.

    When temporary user accounts remain active after no longer needed or for an excessive period, these accounts may be used to gain unauthorized access. To mitigate this risk, automated termination of...
    Rule Medium Severity
  • SRG-APP-000025

    Group
  • AAA Services must be configured to automatically disable accounts after a 35-day period of account inactivity.

    Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an application. Owners of inactive accounts will not notice if unauthorized access to...
    Rule Medium Severity
  • SRG-APP-000026

    Group
  • AAA Services must be configured to automatically audit account creation.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply create ...
    Rule Medium Severity
  • SRG-APP-000027

    Group
  • AAA Services must be configured to automatically audit account modification.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply modify ...
    Rule Medium Severity
  • SRG-APP-000028

    Group
  • AAA Services must be configured to automatically audit account disabling actions.

    When application accounts are disabled, user accessibility is affected. Once an attacker establishes access to an application, the attacker often attempts to disable authorized accounts to disrupt ...
    Rule Medium Severity
  • SRG-APP-000029

    Group
  • AAA Services must be configured to automatically audit account removal actions.

    When application accounts are removed, user accessibility is affected. Once an attacker establishes access to an application, the attacker often attempts to remove authorized accounts to disrupt se...
    Rule Medium Severity
  • SRG-APP-000065

    Group
  • AAA Services must be configured to automatically lock user accounts after three consecutive invalid logon attempts within a 15-minute time period.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the a...
    Rule Medium Severity
  • SRG-APP-000089

    Group
  • AAA Services must be configured to audit each authentication and authorization transaction.

    Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident, or identify those responsible for one. Audit r...
    Rule Medium Severity
  • SRG-APP-000095

    Group
  • AAA Services configuration audit records must identify what type of events occurred.

    Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events relating to an incident, or identify those responsible for one. Audit r...
    Rule Medium Severity
  • SRG-APP-000096

    Group
  • AAA Services configuration audit records must identify when (date and time) the events occurred.

    Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to an incident. In order to compile an accurate risk assessment, and provid...
    Rule Medium Severity
  • SRG-APP-000097

    Group
  • AAA Services configuration audit records must identify where the events occurred.

    Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events relating to an incident. In order to compile an accurate risk assessment, and provi...
    Rule Medium Severity
  • SRG-APP-000098

    Group
  • AAA Services configuration audit records must identify the source of the events.

    Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In addition to logging where events occur with...
    Rule Medium Severity
  • SRG-APP-000099

    Group
  • AAA Services configuration audit records must identify the outcome of the events.

    Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if changes were made to the security state of the sy...
    Rule Medium Severity
  • SRG-APP-000100

    Group
  • AAA Services configuration audit records must identify any individual user or process associated with the event.

    Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility...
    Rule Medium Severity
  • SRG-APP-000108

    Group
  • AAA Services must be configured to alert the SA and ISSO when any audit processing failure occurs.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...
    Rule Medium Severity
  • SRG-APP-000116

    Group
  • AAA Services must be configured to use internal system clocks to generate time stamps for audit records.

    Without an internal clock used as the reference for the time stored on each event to provide a trusted common reference for the time, forensic analysis would be impeded. Determining the correct tim...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • AAA Services must be configured to disable non-essential modules.

    It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and...
    Rule Medium Severity
  • SRG-APP-000142

    Group
  • AAA Services must be configured to use secure protocols when connecting to directory services.

    Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false information into sessions. Application communication sessions are protect...
    Rule High Severity
  • SRG-APP-000142

    Group
  • AAA Services must be configured to use protocols that encrypt credentials when authenticating clients, as defined in the PPSM CAL and vulnerability assessments.

    Authentication protection of the client credentials (specifically the password or shared secret) prevents unauthorized access to resources. The RADIUS protocol encrypts the password field in the ac...
    Rule High Severity
  • SRG-APP-000142

    Group
  • AAA Services must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable...
    Rule Medium Severity
  • SRG-APP-000148

    Group
  • AAA Services must be configured to uniquely identify and authenticate organizational users.

    To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational use...
    Rule High Severity
  • SRG-APP-000149

    Group
  • AAA Services must be configured to require multifactor authentication using Personal Identity Verification (PIV) credentials for authenticating privileged user accounts.

    Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased. Multifactor authentication requires using two or more factors to achieve authentica...
    Rule Medium Severity
  • SRG-APP-000150

    Group
  • AAA Services must be configured to require multifactor authentication using Common Access Card (CAC) Personal Identity Verification (PIV) credentials for authenticating non-privileged user accounts.

    To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. Multifactor aut...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules