Application Server Security Requirements Guide

The Application Server Security Requirements Guide (SRG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the NIST 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]

Details

Version / Release: V2R2

Published: 2015-08-28

Updated At: 2018-09-23 02:03:13

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter


Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-46335r3_rule SRG-APP-000001-AS-000001 CCI-000054 MEDIUM The application server must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types. Application management includes the ability to control the number of sessions that utilize an application by all accounts and/or account types. Limiting the number of allowed sessions is helpful in limiting risks related to Denial of Service attacks. App
    SV-46376r3_rule SRG-APP-000014-AS-000009 CCI-000068 MEDIUM The application server must use encryption strength in accordance with the categorization of the management data during remote access management sessions. Remote management access is accomplished by leveraging common communication protocols and establishing a remote connection to the application server via a network for the purposes of managing the application server. If cryptography is not used, then the s
    SV-46377r3_rule SRG-APP-000015-AS-000010 CCI-001453 MEDIUM The application server must implement cryptography mechanisms to protect the integrity of the remote access session. Encryption is critical for protection of remote access sessions. If encryption is not being used for integrity, malicious users may gain the ability to modify the application server configuration. The use of cryptography for ensuring integrity of remote a
    SV-46383r3_rule SRG-APP-000068-AS-000035 CCI-000048 MEDIUM The application server management interface must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. Application servers are required to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system management interface, providing privacy and security notices consistent with applicable federal laws, Executive Orders, d
    SV-46385r3_rule SRG-APP-000069-AS-000036 CCI-000050 MEDIUM The application server management interface must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. To establish acceptance of system usage policy, a click-through banner at the application server management interface logon is required. The banner shall prevent further activity on the application server unless and until the user executes a positive acti
    SV-46422r3_rule SRG-APP-000080-AS-000045 CCI-000166 MEDIUM The application server must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. Non-repudiation of actions taken is required in order to maintain application integrity. Examples of particular actions taken by individuals include creating information, sending a message, approving information (e.g., indicating concurrence or signing a
    SV-46426r3_rule SRG-APP-000086-AS-000048 CCI-000174 MEDIUM For application servers providing log record aggregation, the application server must compile log records from organization-defined information system components into a system-wide log trail that is time-correlated with an organization-defined level of tolerance for the relationship between time stamps of individual records in the log trail. Log generation and log records can be generated from various components within the application server. The list of logged events is the set of events for which logs are to be generated. This set of events is typically a subset of the list of all events fo
    SV-46428r3_rule SRG-APP-000089-AS-000050 CCI-000169 MEDIUM The application server must generate log records for access and authentication events. Log records can be generated from various components within the application server. From an application server perspective, certain specific application server functionalities may be logged as well. The application server must allow the definition of wh
    SV-46429r3_rule SRG-APP-000090-AS-000051 CCI-000171 MEDIUM The application server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which logable events are to be logged. Log records can be generated from various components within the application server, (e.g., httpd, beans, etc.) From an application perspective, certain specific application functionalities may be logged, as well. The list of logged events is the set of e
    SV-46430r3_rule SRG-APP-000091-AS-000052 CCI-000172 MEDIUM The application server must generate log records when successful/unsuccessful attempts to access subject privileges occur. Accessing a subject's privileges can be used to elevate a lower-privileged subject's privileges temporarily in order to cause harm to the application server or to gain privileges to operate temporarily for a designed purpose. When these actions take plac
    SV-46435r3_rule SRG-APP-000092-AS-000053 CCI-001464 MEDIUM The application server must initiate session logging upon startup. Session logging activities are developed, integrated, and used in consultation with legal counsel in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations.
    SV-46437r3_rule SRG-APP-000093-AS-000054 CCI-001462 MEDIUM The application server must provide the capability for authorized users to capture, record, and log all content related to a user session. The application server must be capable of enabling a setting for troubleshooting or debugging purposes which will log all user session information specified by an authorized user.
    SV-46446r3_rule SRG-APP-000095-AS-000056 CCI-000130 MEDIUM The application server must produce log records containing information to establish what type of events occurred. Information system logging capability is critical for accurate forensic analysis. Without being able to establish what type of event occurred, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify t
    SV-46452r3_rule SRG-APP-000096-AS-000059 CCI-000131 MEDIUM The application server must produce log records containing sufficient information to establish when (date and time) the events occurred. Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining the correct order of the events that occurred is important d
    SV-46454r3_rule SRG-APP-000097-AS-000060 CCI-000132 MEDIUM The application server must produce log records containing sufficient information to establish where the events occurred. Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining the correct location or process within the application serv
    SV-46457r3_rule SRG-APP-000098-AS-000061 CCI-000133 MEDIUM The application server must produce log records containing sufficient information to establish the sources of the events. Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining the correct source, e.g., source IP, of the events is import
    SV-46463r3_rule SRG-APP-000099-AS-000062 CCI-000134 MEDIUM The application server must produce log records that contain sufficient information to establish the outcome of events. Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited to, time stamps, source and destination IP addresses, user/p
    SV-46469r3_rule SRG-APP-000100-AS-000063 CCI-001487 MEDIUM The application server must generate log records containing information that establishes the identity of any individual or process associated with the event. Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes: time stamps, source and destination addresses, user/process identifiers, event
    SV-46473r3_rule SRG-APP-000108-AS-000067 CCI-000139 MEDIUM The application server must alert the SA and ISSO, at a minimum, in the event of a log processing failure. Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a security incident. When log processing fails, the events during the failure can be lost. To minimize the timeframe of the log failu
    SV-46477r3_rule SRG-APP-000109-AS-000068 CCI-000140 MEDIUM The application server must shut down by default upon log failure (unless availability is an overriding concern). It is critical that, when a system is at risk of failing to process logs, it detects and takes action to mitigate the failure. Log processing failures include software/hardware errors, failures in the log capturing mechanisms, and log storage capacity bei
    SV-46478r3_rule SRG-APP-000109-AS-000070 CCI-000140 MEDIUM The application server must be configured to fail over to another system in the event of log subsystem failure. This requirement is dependent upon system MAC and availability. If the system MAC and availability do not specify redundancy requirements, this requirement is NA. It is critical that, when a system is at risk of failing to process logs as required, it d
    SV-46490r3_rule SRG-APP-000116-AS-000076 CCI-000159 MEDIUM The application server must use internal system clocks to generate time stamps for log records. Without the use of an approved and synchronized time source configured on the systems, events cannot be accurately correlated and analyzed to determine what is transpiring within the application server. If an event has been triggered on the network, and
    SV-46492r3_rule SRG-APP-000118-AS-000078 CCI-000162 MEDIUM The application server must protect log information from any type of unauthorized read access. If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In addition, access to log records provides information an atta
    SV-46499r3_rule SRG-APP-000120-AS-000080 CCI-000164 MEDIUM The application server must protect log information from unauthorized deletion. If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. Application servers contain admin interfaces that allow readi
    SV-46500r3_rule SRG-APP-000121-AS-000081 CCI-001493 MEDIUM The application server must protect log tools from unauthorized access. Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon the log format and application, system and application log tools may provide the only means to manipulate and manage application
    SV-46501r3_rule SRG-APP-000122-AS-000082 CCI-001494 MEDIUM The application server must protect log tools from unauthorized modification. Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon the log format and application, system and application log tools may provide the only means to manipulate and manage application
    SV-46502r3_rule SRG-APP-000123-AS-000083 CCI-001495 MEDIUM The application server must protect log tools from unauthorized deletion. Protecting log data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon the log format and application, system and application log tools may provide the only means to manipulate and manage application
    SV-46503r3_rule SRG-APP-000125-AS-000084 CCI-001348 MEDIUM The application server must back up log records at least every seven days onto a different system or system component than the system or component being logged. Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up log records to a different system or onto separate media from the system the application server is actually running on helps to assure that in the event of a
    SV-46504r3_rule SRG-APP-000126-AS-000085 CCI-001350 MEDIUM The application server must use cryptographic mechanisms to protect the integrity of log information. Protection of log records is of critical importance. Encrypting log records provides a level of protection that does not rely on host-based protections that can be accidentally misconfigured, such as file system permissions. Cryptographic mechanisms are t
    SV-46511r3_rule SRG-APP-000133-AS-000092 CCI-001499 MEDIUM The application server must limit privileges to change the software resident within software libraries. Application servers have the ability to specify that the hosted applications utilize shared libraries. The application server must have a capability to divide roles based upon duties wherein one project user (such as a developer) cannot modify the shared
    SV-46521r3_rule SRG-APP-000141-AS-000095 CCI-000381 MEDIUM The application server must adhere to the principles of least functionality by providing only essential capabilities. Application servers provide a myriad of differing processes, features and functionalities. Some of these processes may be deemed to be unnecessary or too unsecure to run on a production DoD system. Application servers must provide the capability to disabl
    SV-46586r3_rule SRG-APP-000148-AS-000101 CCI-000764 MEDIUM The application server must use an enterprise user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users). To assure accountability and prevent unauthorized access, application server users must be uniquely identified and authenticated. This is typically accomplished via the use of a user store which is either local (OS-based) or centralized (LDAP) in nature.
    SV-46587r3_rule SRG-APP-000149-AS-000102 CCI-000765 MEDIUM The application server must use multifactor authentication for network access to privileged accounts. Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the application server. If one factor is compromised or broken, the attacker still has at least one more barrier to breach before succes
    SV-46588r3_rule SRG-APP-000151-AS-000103 CCI-000767 MEDIUM The application server must use multifactor authentication for local access to privileged accounts. Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the application server. If one factor is compromised or broken, the attacker still has at least one more barrier to breach before succes
    SV-46589r3_rule SRG-APP-000153-AS-000104 CCI-000770 MEDIUM The application server must authenticate users individually prior to using a group authenticator. To assure individual accountability and prevent unauthorized access, application server users (and any processes acting on behalf of application server users) must be individually identified and authenticated. A group authenticator is a generic account
    SV-46591r3_rule SRG-APP-000156-AS-000106 CCI-001941 MEDIUM The application server must provide security extensions to extend the SOAP protocol and provide secure authentication when accessing sensitive data. Application servers may provide a web services capability that could be leveraged to allow remote access to sensitive application data. A web service, which is a repeatable process used to make data available to remote clients, should not be confused with
    SV-46593r3_rule SRG-APP-000158-AS-000108 CCI-000778 MEDIUM The application server must uniquely identify all network-connected endpoint devices before establishing any connection. Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. For distributed application servers and components, the decisions regarding the validation of identification claims may be made by se
    SV-46596r3_rule SRG-APP-000163-AS-000111 CCI-000795 MEDIUM The application server must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can potentially obtain and maintain undetected access to the application. Owners of inactive accounts will not notice if unauthorized a
    SV-46604r3_rule SRG-APP-000171-AS-000119 CCI-000196 MEDIUM The application server must store only encrypted representations of passwords. Applications must enforce password encryption when storing passwords. Passwords need to be protected at all times and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read and easily compromis
    SV-46605r3_rule SRG-APP-000172-AS-000120 CCI-000197 MEDIUM The application server must transmit only encrypted representations of passwords. Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised. Application servers have
    SV-46606r3_rule SRG-APP-000172-AS-000121 CCI-000197 MEDIUM The application server must utilize encryption when using LDAP for authentication. Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. Application servers have the capability to utilize LDAP directories for authentication. If LDAP connections are not protecte
    SV-46609r3_rule SRG-APP-000175-AS-000124 CCI-000185 MEDIUM The application server must perform RFC 5280-compliant certification path validation. A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make an informed decision regarding acceptance of an end enti
    SV-46611r3_rule SRG-APP-000176-AS-000125 CCI-000186 MEDIUM Only authenticated system administrators or the designated PKI Sponsor for the application server must have access to the web servers private key. The cornerstone of the PKI is the private key used to encrypt or digitally sign information. If the private key is stolen, this will lead to the compromise of the authentication and non-repudiation gained through PKI because the attacker can use the pri
    SV-46612r3_rule SRG-APP-000177-AS-000126 CCI-000187 MEDIUM The application server must map the authenticated identity to the individual user or group account for PKI-based authentication. The cornerstone of PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information, but the key can be mapped to a user. Without mapping the certificate used
    SV-46615r3_rule SRG-APP-000178-AS-000127 CCI-000206 MEDIUM The application server must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals. To prevent the compromise of authentication information during the authentication process, the application server authentication screens must obfuscate input so an unauthorized user cannot view a password, PIN, or any other authenticator value as it is be
    SV-46616r3_rule SRG-APP-000179-AS-000129 CCI-000803 MEDIUM The application server must utilize FIPS 140-2 approved encryption modules when authenticating users and processes. Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon to provide confidentiality or integrity, and DoD data may be compromised due to weak algorithms. The u
    SV-46663r3_rule SRG-APP-000211-AS-000146 CCI-001082 MEDIUM The application server must separate hosted application functionality from application server management functionality. The application server consists of the management interface and hosted applications. By separating the management interface from hosted applications, the user must authenticate as a privileged user to the management interface before being presented with
    SV-46668r3_rule SRG-APP-000219-AS-000147 CCI-001184 MEDIUM The application server must ensure authentication of both client and server during the entire session. This control focuses on communications protection at the session, versus packet level. At the application layer, session IDs are tokens generated by web applications to uniquely identify an application user's session. Web applications utilize session tok
    SV-46702r3_rule SRG-APP-000220-AS-000148 CCI-001185 MEDIUM The application server must invalidate session identifiers upon user logout or other session termination. If communications sessions remain open for extended periods of time even when unused, there is the potential for an adversary to hijack the session and use it to gain access to the device or networks to which it is attached. Terminating sessions after a l
    SV-46708r3_rule SRG-APP-000223-AS-000151 CCI-001664 MEDIUM The application server must recognize only system-generated session identifiers. This requirement focuses on communications protection at the application session, versus network packet level. The intent of this control is to establish grounds for confidence at each end of a communications session in the ongoing identity of the other p
    SV-46709r3_rule SRG-APP-000224-AS-000152 CCI-001188 MEDIUM The application server must generate a unique session identifier using a FIPS 140-2 approved random number generator. The application server will use session IDs to communicate between modules or applications within the application server and between the application server and users. The session ID allows the application to track the communications along with credential
    SV-46710r3_rule SRG-APP-000225-AS-000153 CCI-001190 MEDIUM The application server must be configured to perform complete application deployments. Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information system or a component of the system. When an application is deployed to the application server, if the deploy
    SV-46711r3_rule SRG-APP-000225-AS-000154 CCI-001190 MEDIUM The application server must provide a clustering capability. This requirement is dependent upon system MAC and confidentiality. If the system MAC and confidentiality levels do not specify redundancy requirements, this requirement is NA. Failure to a known secure state helps prevent a loss of confidentiality, integ
    SV-46713r3_rule SRG-APP-000231-AS-000156 CCI-001199 MEDIUM The application server must employ cryptographic mechanisms to ensure confidentiality and integrity of all information at rest when stored off-line. This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers user information and system information. Information at rest refers to the state of information when it is located on a secondary
    SV-46723r3_rule SRG-APP-000251-AS-000165 CCI-001310 MEDIUM The application server must check the validity of all data inputs to the management interface, except those specifically identified by the organization. Invalid user input occurs when a user inserts data or characters into an applications data entry field and the application is unprepared to process that data. This results in unanticipated application behavior potentially leading to an application or info
    SV-46727r3_rule SRG-APP-000266-AS-000169 CCI-001312 MEDIUM The application server must only generate error messages that provide information necessary for corrective actions without revealing sensitive or potentially harmful information in error logs and administrative messages. Any application providing too much information in error logs and in administrative messages to the screen risks compromising the data and security of the application and system. The structure and content of error messages needs to be carefully considered
    SV-46728r3_rule SRG-APP-000267-AS-000170 CCI-001314 MEDIUM The application server must restrict error messages only to authorized users. If the application provides too much information in error logs and administrative messages to the screen, this could lead to compromise. The structure and content of error messages need to be carefully considered by the organization and development team.
    SV-46732r4_rule SRG-APP-000290-AS-000174 CCI-001496 MEDIUM The application server must use cryptographic mechanisms to protect the integrity of log tools. Protecting the integrity of the tools used for logging purposes is a critical step in ensuring the integrity of log data. Log data includes all information (e.g., log records, log settings, and log reports) needed to successfully log information system ac
    SV-47025r3_rule SRG-APP-000033-AS-000024 CCI-000213 MEDIUM The application server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement mechanisms (e.g., access control lists, access control ma
    SV-47059r3_rule SRG-APP-000119-AS-000079 CCI-000163 MEDIUM The application server must protect log information from unauthorized modification. If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In addition, access to log records provides information an atta
    SV-71669r2_rule SRG-APP-000343-AS-000030 CCI-002234 MEDIUM The application server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged. In order to be able to provide a forensic history of activity, the application server must ensure users who are granted a privileged role or those who utilize a separate distinct account when accessing privileged functions or data have their actions logge
    SV-71671r2_rule SRG-APP-000340-AS-000185 CCI-002235 MEDIUM The application server must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Restricting non-privileged users also prevents an attacker, who ha
    SV-71673r2_rule SRG-APP-000295-AS-000263 CCI-002361 MEDIUM The application server must automatically terminate a user session after organization-defined conditions or trigger events requiring a session disconnect. An attacker can take advantage of user sessions that are left open, thus bypassing the user authentication process. To thwart the vulnerability of open and unused user sessions, the application server must be configured to close the sessions when a confi
    SV-71675r2_rule SRG-APP-000296-AS-000201 CCI-002363 MEDIUM The application server management interface must provide a logout capability for user-initiated communication session. If a user cannot explicitly end an application server management interface session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. The attacker will then have access to the application server managem
    SV-71677r2_rule SRG-APP-000297-AS-000188 CCI-002364 MEDIUM The application server management interface must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions. Providing a logout capability to the user allows the user to explicitly close a session and free those resources used during the session. If a user cannot explicitly end an application session, the session may remain open and be exploited by an attacker;
    SV-71679r2_rule SRG-APP-000313-AS-000003 CCI-002263 MEDIUM The application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in process. The application server provides a framework for applications to communicate between each other to form an overall well-designed application to perform a task. As the information traverses the application server and the components, the security attributes
    SV-71681r2_rule SRG-APP-000314-AS-000005 CCI-002264 MEDIUM The application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission. The application server provides a framework for applications to communicate between each other to form an overall well-designed application to perform a task. As the information is transmitted, the security attributes must be maintained. Without the ass
    SV-71683r2_rule SRG-APP-000016-AS-000013 CCI-000067 MEDIUM The application server must ensure remote sessions for accessing security functions and security-relevant information are logged. Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident. Remote access by administrators requires that the admin activity be logged. A
    SV-71685r2_rule SRG-APP-000315-AS-000094 CCI-002314 MEDIUM The application server must control remote access methods. Application servers provide remote access capability and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requirements. Automated monitoring and control of remote access ses
    SV-71687r2_rule SRG-APP-000316-AS-000199 CCI-002322 MEDIUM The application server must provide the capability to immediately disconnect or disable remote access to the management interface. Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking progress would not be immediately stopped. The application server must have the capability to immediately disconnect current users remotely acces
    SV-71689r2_rule SRG-APP-000101-AS-000072 CCI-000135 MEDIUM The application server must generate log records containing the full-text recording of privileged commands or the individual identities of group account users. Privileged commands are commands that change the configuration or data of the application server. Since this type of command changes the application server configuration and could possibly change the security posture of the application server, these comm
    SV-71691r2_rule SRG-APP-000356-AS-000202 CCI-001844 MEDIUM The application server must provide centralized management and configuration of the content to be captured in log records generated by all application components. A clustered application server is made up of several servers working together to provide the user a failover and increased computing capability. To facilitate uniform logging in the event of an incident and later forensic investigation, the record format
    SV-71693r2_rule SRG-APP-000357-AS-000038 CCI-001849 MEDIUM The application server must allocate log record storage capacity in accordance with organization-defined log record storage requirements. The proper management of log records not only dictates proper archiving processes and procedures be established, it also requires allocating enough storage space to maintain the logs online for a defined period of time. If adequate online log storage cap
    SV-71695r2_rule SRG-APP-000358-AS-000064 CCI-001851 MEDIUM The application server must off-load log records onto a different system or media from the system being logged. Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited to, time stamps, source and destination IP addresses, user/p
    SV-71697r2_rule SRG-APP-000515-AS-000203 CCI-001851 MEDIUM The application server must, at a minimum, transfer the logs of interconnected systems in real time, and transfer the logs of standalone systems weekly. Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Protecting log data is important during a forensic investigation to ensure investigators can track and understand what may have occurred. Off-loading sh
    SV-71699r2_rule SRG-APP-000359-AS-000065 CCI-001855 MEDIUM The application server must provide an immediate warning to the SA and ISSO, at a minimum, when allocated log record storage volume reaches 75% of maximum log record storage capacity. It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures include software/hardware errors, failures in the log capturing mechanisms, and log storage capacity being rea
    SV-71701r2_rule SRG-APP-000360-AS-000066 CCI-001858 MEDIUM The application server must provide an immediate real-time alert to authorized users of all log failure events requiring real-time alerts. It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures include software/hardware errors, failures in the log capturing mechanisms, and log storage capacity being rea
    SV-71703r2_rule SRG-APP-000374-AS-000210 CCI-001890 MEDIUM The application server must record time stamps for log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Time is commonly expressed in Coordinated Universal Time (UTC
    SV-71705r2_rule SRG-APP-000375-AS-000211 CCI-001889 MEDIUM The application server must record time stamps for log records that meet a granularity of one second for a minimum degree of precision. To investigate an incident, the log records should be easily put into chronological order. Without sufficient granularity of time stamps, the chronological order cannot be determined. Time stamps generated by the application server include date and time
    SV-71707r2_rule SRG-APP-000371-AS-000077 CCI-001891 MEDIUM The application server must compare internal application server clocks at least every 24 hours with an authoritative time source. Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating system events. Synchronization of system clocks is needed in order to correctly correlate the timing of event
    SV-71709r2_rule SRG-APP-000372-AS-000212 CCI-002046 MEDIUM The application server must synchronize internal application server clocks to an authoritative time source when the time difference is greater than the organization-defined time period. Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating system events. Synchronization of internal application server clocks is needed in order to correctly correlat
    SV-71711r2_rule SRG-APP-000495-AS-000220 CCI-000172 MEDIUM The application server must generate log records when successful/unsuccessful attempts to modify privileges occur. Changing privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful/unsuccessful changes are made, the event needs to be logged. By logging the event, the modification or attempted modification can be investi
    SV-71713r2_rule SRG-APP-000499-AS-000224 CCI-000172 MEDIUM The application server must generate log records when successful/unsuccessful attempts to delete privileges occur. Deleting privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful and unsuccessful privilege deletions are made, the events need to be logged. By logging the event, the modification or attempted modificatio
    SV-71715r2_rule SRG-APP-000503-AS-000228 CCI-000172 MEDIUM The application server must generate log records when successful/unsuccessful logon attempts occur. Logging the access to the application server allows the system administrators to monitor user accounts. By logging successful/unsuccessful logons, the system administrator can determine if an account is compromised (e.g., frequent logons) or is in the pr
    SV-71717r2_rule SRG-APP-000504-AS-000229 CCI-000172 MEDIUM The application server must generate log records for privileged activities. Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Privileged ac
    SV-71757r2_rule SRG-APP-000505-AS-000230 CCI-000172 MEDIUM The application must generate log records showing starting and ending times for user access to the application server management interface. Determining when a user has accessed the management interface is important to determine the timeline of events when a security incident occurs. Generating these events, especially if the management interface is accessed via a stateless protocol like HTTP
    SV-71759r2_rule SRG-APP-000506-AS-000231 CCI-000172 MEDIUM The application server must generate log records when concurrent logons from different workstations occur to the application server management interface. Being able to work on a system through multiple views into the application allows a user to work more efficiently and more accurately. Before environments with windowing capabilities or multiple desktops, a user would log onto the application from differ
    SV-71761r2_rule SRG-APP-000509-AS-000234 CCI-000172 MEDIUM The application server must generate log records for all account creations, modifications, disabling, and termination events. The maintenance of user accounts is a key activity within the system to determine access and privileges. Through changes to accounts, an attacker can create an account for persistent access, modify an account to elevate privileges or terminate/disable an
    SV-71763r2_rule SRG-APP-000353-AS-000235 CCI-001914 MEDIUM The application server must provide the capability for organization-identified individuals or roles to change the logging to be performed on all application components, based on all selectable event criteria within organization-defined time thresholds. Log records can be generated from various components within the application server. The list of logged events is the set of events for which logs are to be generated. This set of events is typically a subset of the list of all events for which the system
    SV-71765r2_rule SRG-APP-000355-AS-000055 CCI-001920 MEDIUM The application server must provide the capability for authorized users to remotely view/hear, in real time, all content related to an established user session. Without the capability to remotely view/hear all content related to a user session, investigations into suspicious user activity would be hampered. Real-time monitoring allows authorized personnel to take action before additional damage is done. The abili
    SV-71767r2_rule SRG-APP-000380-AS-000088 CCI-001813 MEDIUM The application server must enforce access restrictions associated with changes to application server configuration. When dealing with access restrictions pertaining to change control, it should be noted that any changes to the software, and/or application server configuration can potentially have significant effects on the overall security of the system. Access restri
    SV-71769r2_rule SRG-APP-000381-AS-000089 CCI-001814 MEDIUM The application server must log the enforcement actions used to restrict access associated with changes to the application server. Without logging the enforcement of access restrictions against changes to the application server configuration, it will be difficult to identify attempted attacks, and a log trail will not be available for forensic investigation for after-the-fact actions
    SV-71771r2_rule SRG-APP-000131-AS-000002 CCI-001749 MEDIUM The application server must prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization. Changes to any software components can have significant effects on the overall security of the application. Verifying software components have been digitally signed using a certificate that is recognized and approved by the organization ensures the softwa
    SV-71773r2_rule SRG-APP-000133-AS-000093 CCI-001499 MEDIUM The application server must be capable of reverting to the last known good configuration in the event of failed installations and upgrades. Any changes to the components of the application server can have significant effects on the overall security of the system. In order to ensure a prompt response to failed application installations and application server upgrades, the application server m
    SV-71775r2_rule SRG-APP-000516-AS-000237 CCI-000366 MEDIUM The application server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. Configuring the application to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive security p
    SV-71777r2_rule SRG-APP-000142-AS-000014 CCI-000382 MEDIUM The application server must prohibit or restrict the use of nonsecure ports, protocols, modules, and/or services as defined in the PPSM CAL and vulnerability assessments. Some networking protocols may not meet organizational security requirements to protect data and components. Application servers natively host a number of various features, such as management interfaces, httpd servers and message queues. These features al
    SV-71779r2_rule SRG-APP-000391-AS-000239 CCI-001953 MEDIUM The application server must accept Personal Identity Verification (PIV) credentials to access the management interface. The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. PIV credentials are only used in an unclassified environment. DoD has mandated the use of the CAC to support identity management and personal authenticat
    SV-71781r2_rule SRG-APP-000392-AS-000240 CCI-001954 MEDIUM The application server must electronically verify Personal Identity Verification (PIV) credentials for access to the management interface. The use of Personal Identity Verification (PIV) credentials facilitates standardization and reduces the risk of unauthorized access. PIV credentials are only used in an unclassified environment. DoD has mandated the use of the CAC to support identity ma
    SV-71783r2_rule SRG-APP-000394-AS-000241 CCI-001958 MEDIUM The application server must authenticate all network-connected endpoint devices before establishing any connection. Device authentication requires unique identification and authentication that may be defined by type, by specific device, or by a combination of type and device. Device authentication is accomplished via the use of certificates and protocols such as SSL m
    SV-71785r2_rule SRG-APP-000395-AS-000109 CCI-001967 MEDIUM The application server must authenticate all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based. Device authentication requires unique identification and authentication that may be defined by type, by specific device, or by a combination of type and device. Bidirectional authentication provides stronger safeguards to validate the identity of other d
    SV-71787r2_rule SRG-APP-000401-AS-000243 CCI-001991 MEDIUM The application server, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information. Application servers must provide the capability to utilize and meet r
    SV-71789r2_rule SRG-APP-000400-AS-000246 CCI-002007 MEDIUM The application server must prohibit the use of cached authenticators after an organization-defined time period. When the application server is using PKI authentication, a local revocation cache must be stored for instances when the revocation cannot be authenticated through the network, but if cached authentication information is out of date, the validity of the au
    SV-71791r2_rule SRG-APP-000402-AS-000247 CCI-002009 MEDIUM The application server must accept Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface. Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requireme
    SV-71793r2_rule SRG-APP-000403-AS-000248 CCI-002010 MEDIUM The application server must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface. Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requireme
    SV-71795r2_rule SRG-APP-000404-AS-000249 CCI-002011 MEDIUM The application server must accept FICAM-approved third-party credentials. Access may be denied to legitimate users if FICAM-approved third-party credentials are not accepted. This requirement typically applies to organizational information systems that are accessible to non-federal government agencies and other partners. This
    SV-71797r2_rule SRG-APP-000405-AS-000250 CCI-002014 MEDIUM The application server must conform to FICAM-issued profiles. Without conforming to FICAM-issued profiles, the information system may not be interoperable with FICAM-authentication protocols, such as SAML 2.0 and OpenID 2.0. This requirement addresses open identity management standards.
    SV-71799r2_rule SRG-APP-000389-AS-000253 CCI-002038 MEDIUM The application server must require users to re-authenticate when organization-defined circumstances or situations require re-authentication. Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When applications provide the capability to change security roles or escalate the functional capability of the application, it is critical th
    SV-71801r2_rule SRG-APP-000390-AS-000254 CCI-002039 MEDIUM The application server must require devices to re-authenticate when organization-defined circumstances or situations require re-authentication. Without re-authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. In addition to the re-authentication requirements associated with session locks, organizations may require re-authentication of
    SV-71803r2_rule SRG-APP-000181-AS-000255 CCI-001876 MEDIUM The application server must provide a log reduction capability that supports on-demand reporting requirements. The ability to generate on-demand reports, including after the log data has been subjected to log reduction, greatly facilitates the organization's ability to generate incident reports as needed to better handle larger-scale or more complex security incid
    SV-71805r2_rule SRG-APP-000435-AS-000163 CCI-002385 MEDIUM The application server must protect against or limit the effects of all types of Denial of Service (DoS) attacks by employing organization-defined security safeguards. DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. To reduce the possibility or effect of a DoS, the application server
    SV-71807r2_rule SRG-APP-000435-AS-000069 CCI-002385 MEDIUM The application server, when a MAC I system, must be in a high-availability (HA) cluster. A MAC I system is a system that handles data vital to the organization's operational readiness or effectiveness of deployed or contingency forces. A MAC I system must maintain the highest level of integrity and availability. By HA clustering the applica
    SV-71809r2_rule SRG-APP-000439-AS-000155 CCI-002418 MEDIUM The application server must protect the confidentiality and integrity of transmitted information through the use of an approved TLS version. Preventing the disclosure of transmitted information requires that the application server take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through the use of Tr
    SV-71811r2_rule SRG-APP-000440-AS-000167 CCI-002421 MEDIUM The application server must employ approved cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission. Preventing the disclosure or modification of transmitted information requires that application servers take measures to employ approved cryptography in order to protect the information during transmission over the network. This is usually achieved through
    SV-71813r2_rule SRG-APP-000441-AS-000258 CCI-002420 MEDIUM The application server must maintain the confidentiality and integrity of information during preparation for transmission. Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures
    SV-71815r2_rule SRG-APP-000442-AS-000259 CCI-002422 MEDIUM The application server must maintain the confidentiality and integrity of information during reception. Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications
    SV-71817r2_rule SRG-APP-000416-AS-000140 CCI-002450 MEDIUM The application server must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. NSA has developed Type 1 algorithms for prote
    SV-71819r2_rule SRG-APP-000514-AS-000136 CCI-002450 MEDIUM Application servers must use NIST-approved or NSA-approved key management technology and processes. An asymmetric encryption key must be protected during transmission. The public portion of an asymmetric key pair can be freely distributed without fear of compromise, and the private portion of the key must be protected. The application server will provid
    SV-71821r2_rule SRG-APP-000514-AS-000137 CCI-002450 MEDIUM The application server must use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates. Class 3 PKI certificates are used for servers and software signing rather than for identifying individuals. Class 4 certificates are used for business-to-business transactions. Utilizing unapproved certificates not issued or approved by DoD or CNS creates
    SV-71823r2_rule SRG-APP-000206-AS-000145 CCI-001166 MEDIUM The application server must identify prohibited mobile code. Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded and executed on a local system without explicit installation or execution by the recipient. Mobile code technologies include: Java,
    SV-71825r2_rule SRG-APP-000223-AS-000150 CCI-001664 MEDIUM The application server must generate a unique session identifier for each session. Unique session IDs are the opposite of sequentially generated session IDs, which can be easily guessed by an attacker. Unique session identifiers help to reduce predictability of session identifiers. Unique session IDs address man-in-the-middle attacks, i
    SV-71827r2_rule SRG-APP-000427-AS-000264 CCI-002470 MEDIUM The application server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions. Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD systems or by organizations with insufficient security controls. If the CA used for verifying the certificate
    SV-71829r2_rule SRG-APP-000225-AS-000166 CCI-001190 MEDIUM The application server must fail to a secure state if system initialization fails, shutdown fails, or aborts fail. Fail-secure is a condition achieved by the application server in order to ensure that in the event of an operational failure, the system does not enter into an unsecure state where intended security properties no longer hold. Preserving information syste
    SV-71831r2_rule SRG-APP-000231-AS-000133 CCI-001199 MEDIUM The application server must protect the confidentiality and integrity of all information at rest. When data is written to digital media such as hard drives, mobile computers, external/removable hard drives, personal digital assistants, flash/thumb drives, etc., there is risk of data loss and data compromise. Fewer protection measures are needed for m
    SV-71833r2_rule SRG-APP-000428-AS-000265 CCI-002475 MEDIUM The application server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components. Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an application server. Alternative physical protection measures include protected distribution systems. In orde
    SV-71835r2_rule SRG-APP-000429-AS-000157 CCI-002476 MEDIUM The application must implement cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components. Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an application server. Alternative physical protection measures include protected distribution systems. In orde
    SV-71837r2_rule SRG-APP-000456-AS-000266 CCI-002605 MEDIUM The application server must install security-relevant software updates within the time period directed by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs). Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to
    SV-71839r2_rule SRG-APP-000454-AS-000268 CCI-002617 MEDIUM The application server must remove organization-defined software components after updated versions have been installed. Installation of patches and updates is performed when there are errors or security vulnerabilities in the current release of the software. When previous versions of software components are not removed from the application server after updates have been i
    SV-71841r2_rule SRG-APP-000447-AS-000273 CCI-002754 MEDIUM The application server must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. Invalid user input occurs when a user inserts data or characters into an applications data entry field and the application is unprepared to process that data. This results in unanticipated application behavior potentially leading to an application or info
    SV-71843r2_rule SRG-APP-000266-AS-000168 CCI-001312 MEDIUM The application server must identify potentially security-relevant error conditions. The structure and content of error messages need to be carefully considered by the organization and development team. Any application providing too much information in error logs and in administrative messages to the screen risks compromising the data an
    SV-75833r1_rule SRG-APP-000439-AS-000274 CCI-002418 MEDIUM The application server must remove all export ciphers to protect the confidentiality and integrity of transmitted information. During the initial setup of a Transport Layer Security (TLS) connection to the application server, the client sends a list of supported cipher suites in order of preference. The application server will reply with the cipher suite it will use for communic