I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000001
Group -
The application server must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.
Application management includes the ability to control the number of sessions that utilize an application by all accounts and/or account types. Limiting the number of allowed sessions is helpful in...Rule Medium Severity -
SRG-APP-000014
Group -
The application server must use encryption strength in accordance with the categorization of the management data during remote access management sessions.
Remote management access is accomplished by leveraging common communication protocols and establishing a remote connection to the application server via a network for the purposes of managing the a...Rule Medium Severity -
SRG-APP-000015
Group -
The application server must implement cryptography mechanisms to protect the integrity of the remote access session.
Encryption is critical for protection of remote access sessions. If encryption is not being used for integrity, malicious users may gain the ability to modify the application server configuration. ...Rule Medium Severity -
SRG-APP-000016
Group -
The application server must ensure remote sessions for accessing security functions and security-relevant information are logged.
Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident. Remote access by adm...Rule Medium Severity -
SRG-APP-000033
Group -
The application server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement...Rule Medium Severity -
SRG-APP-000068
Group -
The application server management interface must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
Application servers are required to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system management interface, providing privacy and security notices co...Rule Medium Severity -
SRG-APP-000069
Group -
The application server management interface must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
To establish acceptance of system usage policy, a click-through banner at the application server management interface logon is required. The banner shall prevent further activity on the application...Rule Medium Severity -
SRG-APP-000080
Group -
The application server must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
Non-repudiation of actions taken is required in order to maintain application integrity. Examples of particular actions taken by individuals include creating information, sending a message, approvi...Rule Medium Severity -
SRG-APP-000086
Group -
For application servers providing log record aggregation, the application server must compile log records from organization-defined information system components into a system-wide log trail that is time-correlated with an organization-defined level of tolerance for the relationship between time stamps of individual records in the log trail.
Log generation and log records can be generated from various components within the application server. The list of logged events is the set of events for which logs are to be generated. This set of...Rule Medium Severity -
SRG-APP-000089
Group -
The application server must generate log records for access and authentication events.
Log records can be generated from various components within the application server. From an application server perspective, certain specific application server functionalities may be logged as wel...Rule Medium Severity -
SRG-APP-000090
Group -
The application server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which logable events are to be logged.
Log records can be generated from various components within the application server, (e.g., httpd, beans, etc.) From an application perspective, certain specific application functionalities may be l...Rule Medium Severity -
SRG-APP-000091
Group -
The application server must generate log records when successful/unsuccessful attempts to access subject privileges occur.
Accessing a subject's privileges can be used to elevate a lower-privileged subject's privileges temporarily in order to cause harm to the application server or to gain privileges to operate tempora...Rule Medium Severity -
SRG-APP-000092
Group -
The application server must initiate session logging upon startup.
Session logging activities are developed, integrated, and used in consultation with legal counsel in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations.Rule Medium Severity -
SRG-APP-000095
Group -
The application server must produce log records containing information to establish what type of events occurred.
Information system logging capability is critical for accurate forensic analysis. Without being able to establish what type of event occurred, it would be difficult to establish, correlate, and in...Rule Medium Severity -
SRG-APP-000096
Group -
The application server must produce log records containing sufficient information to establish when (date and time) the events occurred.
Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining th...Rule Medium Severity -
SRG-APP-000097
Group -
The application server must produce log records containing sufficient information to establish where the events occurred.
Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining the...Rule Medium Severity -
SRG-APP-000098
Group -
The application server must produce log records containing sufficient information to establish the sources of the events.
Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining th...Rule Medium Severity -
SRG-APP-000099
Group -
The application server must produce log records that contain sufficient information to establish the outcome of events.
Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited to...Rule Medium Severity -
SRG-APP-000100
Group -
The application server must generate log records containing information that establishes the identity of any individual or process associated with the event.
Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes: time stamps, source a...Rule Medium Severity -
SRG-APP-000101
Group -
The application server must generate log records containing the full-text recording of privileged commands or the individual identities of group account users.
Privileged commands are commands that change the configuration or data of the application server. Since this type of command changes the application server configuration and could possibly change ...Rule Medium Severity -
SRG-APP-000108
Group -
The application server must alert the SA and ISSO, at a minimum, in the event of a log processing failure.
Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a security incident. When log processing fails, the events during the failur...Rule Medium Severity -
SRG-APP-000116
Group -
The application server must use internal system clocks to generate time stamps for log records.
Without the use of an approved and synchronized time source configured on the systems, events cannot be accurately correlated and analyzed to determine what is transpiring within the application se...Rule Medium Severity -
SRG-APP-000118
Group -
The application server must protect log information from any type of unauthorized read access.
If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In ad...Rule Medium Severity -
SRG-APP-000119
Group -
The application server must protect log information from unauthorized modification.
If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In ad...Rule Medium Severity -
SRG-APP-000120
Group -
The application server must protect log information from unauthorized deletion.
If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. App...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.