Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516

    Group
  • SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds.

    It is critical when a system is at risk of failing to process audit logs as required; actions are automatically taken to mitigate the failure or risk of failure. One method used to thwart the audi...
    Rule Medium Severity
  • SRG-APP-000112

    Group
  • SharePoint must prevent the execution of prohibited mobile code.

    Decisions regarding the utilization of mobile code within organizational information systems need to include evaluations that help determine the potential for the code to cause damage to the system...
    Rule High Severity
  • SRG-APP-000156

    Group
  • SharePoint must use replay-resistant authentication mechanisms for network access to privileged accounts.

    An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Techniques used to addres...
    Rule Medium Severity
  • SRG-APP-000180

    Group
  • SharePoint must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    Non-organizational users include all information system users other than organizational users, which include organizational employees or individuals the organization deems to have equivalent status...
    Rule Medium Severity
  • SRG-APP-000179

    Group
  • SharePoint must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.

    Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. Different versions of the Windows Server OS and versions of SharePoint wi...
    Rule High Severity
  • SRG-APP-000514

    Group
  • SharePoint must employ NSA-approved cryptography to protect classified information.

    Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. Different versions of the Windows Server OS and versions of SharePoint wi...
    Rule High Severity
  • SRG-APP-000555

    Group
  • SharePoint must employ FIPS-validated cryptography to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals.

    Certain encryption types are no longer considered secure. This setting configures a minimum encryption type for SharePoint. Different versions of the Windows Server OS and versions of SharePoint wi...
    Rule High Severity
  • SRG-APP-000219

    Group
  • SharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication.

    This control focuses on communications protection at the session, versus packet level. At the application layer, session IDs are tokens generated by web applications to uniquely identify an applic...
    Rule High Severity
  • SRG-APP-000220

    Group
  • SharePoint must terminate user sessions upon user logoff, and when idle time limit is exceeded.

    This requirement focuses on communications protection at the application session, versus network packet level. Session IDs are tokens generated by web applications to uniquely identify an applicat...
    Rule High Severity
  • SRG-APP-000441

    Group
  • SharePoint must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission. When transmitting data, applications need to leverage transmission protection mechanisms such as TLS, SSL VPNs, or IPSec.

    Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptographic mechanism in order to protect the information during transmission....
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules