Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000760

    Group
  • The Central Log Server must implement an audit reduction capability that supports after-the-fact investigations of incidents.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • SRG-APP-000765

    Group
  • The Central Log Server must implement a report generation capability that supports on-demand audit review and analysis.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • SRG-APP-000770

    Group
  • The Central Log Server must implement a report generation capability that supports on-demand reporting requirements.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • SRG-APP-000775

    Group
  • The Central Log Server must implement a report generation capability that supports after-the-fact investigations of incidents.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • SRG-APP-000780

    Group
  • The Central Log Server must implement an audit reduction capability that does not alter original content or time ordering of audit records.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • SRG-APP-000785

    Group
  • The Central Log Server must implement a report generation capability that does not alter original content or time ordering of audit records.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • SRG-APP-000790

    Group
  • The Central Log Server must implement the capability to process, sort, and search audit records for events of interest based on organization-defined audit fields within audit records.

    Events of interest can be identified by the content of audit records, including system resources involved, information objects accessed, identities of individuals, event types, event locations, eve...
    Rule Medium Severity
  • SRG-APP-000795

    Group
  • The Central Log Server must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.

    Audit information includes all information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and personally identifiable information. Audit log...
    Rule Medium Severity
  • SRG-APP-000800

    Group
  • The Central Log Server must implement the capability for organization-defined individuals or roles to change the auditing to be performed on organization-defined system components based on organization-defined selectable event criteria within organization-defined time thresholds.

    Permitting authorized individuals to make changes to system logging enables organizations to extend or limit logging as necessary to meet organizational requirements. Logging that is limited to con...
    Rule Medium Severity
  • SRG-APP-000805

    Group
  • The Central Log Server must automatically generate audit records of the enforcement actions.

    Organizations log system accesses associated with applying configuration changes to ensure that configuration change control is implemented and to support after-the-fact actions should organization...
    Rule Medium Severity
  • SRG-APP-000810

    Group
  • The Central Log Server must prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.

    Software and firmware components prevented from installation unless signed with recognized and approved certificates include software and firmware version updates, patches, service packs, device dr...
    Rule Medium Severity
  • SRG-APP-000815

    Group
  • The Central Log Server must require users to be individually authenticated before granting access to the shared accounts or resources.

    Individual authentication prior to shared group authentication mitigates the risk of using group accounts or authenticators.
    Rule Medium Severity
  • SRG-APP-000825

    Group
  • The Central Log Server must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.

    The purpose of requiring a device that is separate from the system to which the user is attempting to gain access for one of the factors during multifactor authentication is to reduce the likelihoo...
    Rule Medium Severity
  • SRG-APP-000830

    Group
  • The Central Log Server must for password-based authentication, maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • SRG-APP-000835

    Group
  • The Central Log Server must for password-based authentication, update the list of passwords on an organization-defined frequency.

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • SRG-APP-000840

    Group
  • The Central Log Server must for password-based authentication, update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • SRG-APP-000845

    Group
  • The Central Log Server must for password-based authentication, verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • SRG-APP-000855

    Group
  • The Central Log Server must for password-based authentication, require immediate selection of a new password upon account recovery.

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • SRG-APP-000860

    Group
  • The Central Log Server must for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • SRG-APP-000865

    Group
  • The Central Log Server must for password-based authentication, employ automated tools to assist the user in selecting strong password authenticators.

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • SRG-APP-000875

    Group
  • The Central Log Server must for public key-based authentication, implement a local cache of revocation data to support path discovery and validation.

    Public key cryptography is a valid authentication mechanism for individuals, machines, and devices. For PKI solutions, status information for certification paths includes certificate revocation lis...
    Rule Medium Severity
  • SRG-APP-000910

    Group
  • The Central Log Server must include only approved trust anchors in trust stores or certificate stores managed by the organization.

    Public key infrastructure (PKI) certificates are certificates with visibility external to organizational systems and certificates related to the internal operations of systems, such as application-...
    Rule Medium Severity
  • SRG-APP-000915

    Group
  • The Central Log Server must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.

    A Trusted Platform Module (TPM) is an example of a hardware-protected data store that can be used to protect cryptographic keys.
    Rule Medium Severity
  • SRG-APP-000920

    Group
  • The Central Log Server must synchronize system clocks within and between systems or system components.

    Time synchronization of system clocks is essential for the correct execution of many system services, including identification and authentication processes that involve certificates and time-of-day...
    Rule Medium Severity
  • SRG-APP-000925

    Group
  • The Central Log Server must compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source.

    Synchronization of internal system clocks with an authoritative source provides uniformity of time stamps for systems with multiple system clocks and systems connected over a network.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules