Application Server Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −1
Comparison against the immediately-prior release (V2R5). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 1
- V-57489 Medium The application server must provide the capability for authorized users to remotely view/hear, in real time, all content related to an established user session.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-AS-000001
- Vuln IDs
-
- V-35070
- Rule IDs
-
- SV-46335r3_rule
Checks: C-43459r4_chk
Review the application server product documentation and configuration to determine if the number of concurrent sessions can be limited to the organization-defined number of sessions for all accounts and/or account types. If a feature to limit the number of concurrent sessions is not available, is not set, or is set to unlimited, this is a finding.
Fix: F-39623r4_fix
Configure the application server to limit the number of concurrent sessions for all accounts and/or account types to the organization-defined number.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-APP-000014-AS-000009
- Vuln IDs
-
- V-35089
- Rule IDs
-
- SV-46376r3_rule
Checks: C-43476r3_chk
Check the application server configuration to ensure all management interfaces use encryption in accordance with the management data. If the application server is not configured to encrypt remote access management sessions in accordance with the categorization of the management data, this is a finding.
Fix: F-39640r3_fix
Configure the application server to use encryption strength in accordance with the categorization of the management data during remote access management sessions.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-APP-000015-AS-000010
- Vuln IDs
-
- V-35090
- Rule IDs
-
- SV-46377r3_rule
Checks: C-43477r4_chk
Review the application server documentation and configuration to ensure the application server is configured to use cryptography to protect the integrity of remote access sessions. If the application server is not configured to implement cryptography mechanisms to protect the integrity of remote access sessions, this is a finding.
Fix: F-39641r4_fix
Configure the application server to implement cryptography mechanisms to protect the integrity of the remote access session.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- SRG-APP-000068-AS-000035
- Vuln IDs
-
- V-35096
- Rule IDs
-
- SV-46383r3_rule
Checks: C-43484r4_chk
Review the application server management interface configuration to verify the application server is configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access. The banner must read: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." If the application server management interface does not display the banner or displays an unapproved banner, this is a finding.
Fix: F-39648r4_fix
Configure the application server management interface so it displays the Standard Mandatory DoD Notice and Consent Banner prior to allowing access. The banner must read: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details."
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- SRG-APP-000069-AS-000036
- Vuln IDs
-
- V-35098
- Rule IDs
-
- SV-46385r3_rule
Checks: C-43486r3_chk
Review application server management interface product documentation and configuration to determine that the logon banner can be displayed until the user takes action to acknowledge the agreement. If the banner screen allows continuation to the application server without user interaction, this is a finding.
Fix: F-39650r3_fix
Configure the application server management interface to retain the logon banner on the screen until the user takes explicit action to logon to the server.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- SRG-APP-000080-AS-000045
- Vuln IDs
-
- V-35135
- Rule IDs
-
- SV-46422r3_rule
Checks: C-43523r2_chk
Review application server product documentation and server configuration to determine if the system does protect against an individual's (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. If the application does not meet this requirement, this is a finding.
Fix: F-39687r2_fix
Configure the application server to protect against an individual's (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000174
- Version
- SRG-APP-000086-AS-000048
- Vuln IDs
-
- V-35139
- Rule IDs
-
- SV-46426r3_rule
Checks: C-43526r2_chk
Review the application server log feature configuration to determine if the application server or an external logging tool in conjunction with the application server does compile log records from multiple components within the server into a system-wide log trail that is time-correlated with an organization-defined level of tolerance for the relationship between time stamps of individual records in the log trail. If the application server does not meet this requirement, this is a finding.
Fix: F-39690r2_fix
Configure the application server or an external logging tool supporting the application server to compile log records from multiple components within the server into a system-wide log trail that is time-correlated with an organization-defined level of tolerance for the relationship between time stamps of individual records in the log trail.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-AS-000050
- Vuln IDs
-
- V-35141
- Rule IDs
-
- SV-46428r3_rule
Checks: C-43528r2_chk
Review the application server documentation and the deployed system configuration to determine if, at a minimum, system startup and shutdown, system access, and system authentication events are logged. If the logs do not include the minimum logable events, this is a finding.
Fix: F-39692r2_fix
Configure the application server to generate log records for system startup and shutdown, system access, and system authentication events.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- SRG-APP-000090-AS-000051
- Vuln IDs
-
- V-35142
- Rule IDs
-
- SV-46429r3_rule
Checks: C-43529r2_chk
Review application server product documentation and configuration to determine if the system only allows the ISSM (or individuals or roles appointed by the ISSM) to change logable events. If the system is not configured to perform this function, this is a finding.
Fix: F-39693r2_fix
Configure the application server to only allow the ISSM (or individuals or roles appointed by the ISSM) to change logable events.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000091-AS-000052
- Vuln IDs
-
- V-35143
- Rule IDs
-
- SV-46430r3_rule
Checks: C-43530r2_chk
Review the application server documentation and the system configuration to determine if the application server generates log records when successful/unsuccessful attempts are made to access privileges. If log records are not generated, this is a finding.
Fix: F-39694r2_fix
Configure the application server to generate log records when privileges are successfully/unsuccessfully accessed.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-AS-000053
- Vuln IDs
-
- V-35148
- Rule IDs
-
- SV-46435r3_rule
Checks: C-43534r2_chk
Review the application server product documentation and server configuration to determine if the application server initiates session logging on application server startup. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-39698r2_fix
Configure the application server to initiate session logging on application server startup.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-AS-000056
- Vuln IDs
-
- V-35159
- Rule IDs
-
- SV-46446r3_rule
Checks: C-43542r2_chk
Review the application server log configuration to determine if the application server produces log records showing what type of event occurred. If the log data does not show the type of event, this is a finding.
Fix: F-39708r2_fix
Configure the application server to include the event type in the log data.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-AS-000059
- Vuln IDs
-
- V-35165
- Rule IDs
-
- SV-46452r3_rule
Checks: C-43547r2_chk
Review the logs on the application server to determine if the date and time are included in the log event data. If the date and time are not included, this is a finding.
Fix: F-39715r2_fix
Configure the application server logging system to log date and time with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-AS-000060
- Vuln IDs
-
- V-35167
- Rule IDs
-
- SV-46454r4_rule
Checks: C-43549r4_chk
Review the configuration settings on the application server to determine if the application server is configured to log information that establishes where within the application server the event occurred. The data in the log file should identify the event, the component, module, filename, host name, servlets, containers, API’s, or other functionality within the application server, as well as, any source and destination information that indicates where an event occurred. If the application server is not configured to log where within the application server the event took place, this is a finding.
Fix: F-39717r2_fix
Configure the application server logging system to log where the event took place.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-AS-000061
- Vuln IDs
-
- V-35170
- Rule IDs
-
- SV-46457r3_rule
Checks: C-43552r3_chk
Review the application server documentation and deployment configuration to determine if the application server is configured to generate sufficient information to resolve the source, e.g., source IP, of the log event. Request a user access the application server and generate logable events, and then review the logs to determine if the source of the event can be established. If the source of the event cannot be determined, this is a finding.
Fix: F-39720r4_fix
Configure the application server to generate the source of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-AS-000062
- Vuln IDs
-
- V-35176
- Rule IDs
-
- SV-46463r3_rule
Checks: C-43557r2_chk
Review application server documentation and the log files on the application server to determine if the logs contain information that establishes the outcome of event data. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-39725r2_fix
Configure the application server logging system to log the event outcome.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-AS-000063
- Vuln IDs
-
- V-35182
- Rule IDs
-
- SV-46469r3_rule
Checks: C-43562r2_chk
Review application server documentation and the log files on the application server to determine if the logs contain information that establishes the identity of the user or process associated with log event data. If the application server does not produce logs that establish the identity of the user or process associated with log event data, this is a finding.
Fix: F-39730r2_fix
Configure the application server logging system to log the identity of the user or process related to the events.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-APP-000108-AS-000067
- Vuln IDs
-
- V-35186
- Rule IDs
-
- SV-46473r3_rule
Checks: C-43566r3_chk
Review application server log configuration. Verify the application server sends alerts to the SA and ISSO in the event of a log processing failure. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-39734r2_fix
Configure the application server log feature to alert the SA and ISSO in the event of a log processing failure.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-AS-000068
- Vuln IDs
-
- V-35190
- Rule IDs
-
- SV-46477r3_rule
Checks: C-43568r4_chk
If the application server is a high availability system, this finding is NA. Review the application server configuration settings to determine if the application server is configured to shut down on a log failure. If the application server is not configured to shut down on a log failure, this is a finding.
Fix: F-39736r3_fix
If the application server is a high availability system, this finding is NA. Configure the application server to shut down on a log failure.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-AS-000070
- Vuln IDs
-
- V-35191
- Rule IDs
-
- SV-46478r3_rule
Checks: C-43569r7_chk
If the system MAC level and availability do not require redundancy, this requirement is NA. Review the system's accreditation documentation to determine system MAC and confidentiality requirements. Review application server configuration settings to determine if the application server is configured to fail over operation to another system when the log subsystem fails to operate. If the system MAC level requires redundancy and the application server is not configured to fail over to another system which can handle application and log functions when a log subsystem failure occurs, this is a finding.
Fix: F-39737r5_fix
If the system MAC level and availability do not require redundancy, this requirement is NA. Configure the application server to fail over to another system which can handle log functions when the logging subsystem fails.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-AS-000076
- Vuln IDs
-
- V-35203
- Rule IDs
-
- SV-46490r3_rule
Checks: C-43575r2_chk
Review the application server configuration files to determine if the internal system clock is used for time stamps. If this is not feasible, an alternative workaround is to take an action that generates an entry in the logs and then immediately query the operating system for the current time. A reasonable match between the two times will suffice as evidence that the system is using the internal clock for timestamps. If the application server does not use the internal system clock to generate time stamps, this is a finding.
Fix: F-39749r2_fix
Configure the application server to use internal system clocks to generate time stamps for log records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-AS-000078
- Vuln IDs
-
- V-35205
- Rule IDs
-
- SV-46492r3_rule
Checks: C-43577r2_chk
Review the configuration settings to determine if the application server log features protect log information from unauthorized access. Review file system settings to verify the application server sets secure file permissions on log files. If the application server does not protect log information from unauthorized read access, this is a finding.
Fix: F-39751r2_fix
Configure the application server to protect log information from unauthorized read access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-AS-000080
- Vuln IDs
-
- V-35212
- Rule IDs
-
- SV-46499r3_rule
Checks: C-43584r2_chk
Review the configuration settings to determine if the application server log features protect log information from unauthorized deletion. Review file system settings to verify the application server sets secure file permissions on log files to prevent unauthorized deletion. If the application server does not protect log information from unauthorized deletion, this is a finding.
Fix: F-39758r2_fix
Configure the application server to protect log information from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-AS-000081
- Vuln IDs
-
- V-35213
- Rule IDs
-
- SV-46500r3_rule
Checks: C-43585r2_chk
Review the application server documentation and server configuration to determine if the application server protects log tools from unauthorized access. Request a system administrator attempt to access log tools while logged into the server in a role that does not have the requisite privileges. If the application server does not protect log tools from unauthorized access, this is a finding.
Fix: F-39759r2_fix
Configure the application server or OS to protect log tools from unauthorized access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-AS-000082
- Vuln IDs
-
- V-35214
- Rule IDs
-
- SV-46501r3_rule
Checks: C-43586r2_chk
Review the application server documentation and server configuration to determine if the application server protects log tools from unauthorized modification. Request a system administrator attempt to modify log tools while logged into the server in a role that does not have the requisite privileges. Locate binary copies of log tool executables that are located on the file system and attempt to modify using unprivileged credentials. If the application server does not protect log tools from unauthorized modification, this is a finding.
Fix: F-39760r2_fix
Configure the application server or the OS to protect log tools from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-AS-000083
- Vuln IDs
-
- V-35215
- Rule IDs
-
- SV-46502r3_rule
Checks: C-43587r2_chk
Review the application server documentation and server configuration to determine if the application server protects log tools from unauthorized deletion. Locate binary copies of log tool executables that are located on the file system and attempt to delete using unprivileged credentials. If the application server does not protect log tools from unauthorized deletion, this is a finding.
Fix: F-39761r2_fix
Configure the application server or the OS to protect log tools from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- SRG-APP-000125-AS-000084
- Vuln IDs
-
- V-35216
- Rule IDs
-
- SV-46503r3_rule
Checks: C-43588r2_chk
Review the application server configuration to determine if the application server backs up log records every seven days onto a different system or media from the system being logged. If the application server does not back up log records every seven days onto a different system or media from the system being logged, this is a finding.
Fix: F-39762r2_fix
Configure the application server to back up log records every seven days onto a different system or media from the system being logged.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001350
- Version
- SRG-APP-000126-AS-000085
- Vuln IDs
-
- V-35217
- Rule IDs
-
- SV-46504r3_rule
Checks: C-43589r2_chk
Review the application server documentation and configuration to determine if the application server can protect log data using cryptographic means. If the application server is not configured to encrypt and sign logs, this is a finding.
Fix: F-39763r2_fix
Configure the application server to encrypt and sign logs.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-AS-000092
- Vuln IDs
-
- V-35224
- Rule IDs
-
- SV-46511r3_rule
Checks: C-43596r2_chk
Check the application server documentation and configuration to determine if the application server provides role-based access that limits the capability to change shared software libraries. Validate file permission settings to ensure library files are secured in relation to OS access. If the application server does not meet this requirement, this is a finding.
Fix: F-39770r2_fix
Configure the application server to limit privileges to change the software resident within software libraries through the use of defined user roles and file permissions.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-AS-000095
- Vuln IDs
-
- V-35234
- Rule IDs
-
- SV-46521r3_rule
Checks: C-43604r2_chk
Review the application server documentation and configuration to determine if the application server can disable non-essential features and capabilities. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-39781r2_fix
Configure the application server to use only essential features and capabilities.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-AS-000101
- Vuln IDs
-
- V-35299
- Rule IDs
-
- SV-46586r3_rule
Checks: C-43668r2_chk
Review application server documentation and configuration settings to determine if the application server is using an enterprise solution to authenticate organizational users and processes running on the users' behalf. If an enterprise solution is not being used, this is a finding.
Fix: F-39845r2_fix
Configure the application server to use an enterprise user management system to uniquely identify and authenticate users and processes acting on behalf of organizational users.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000149-AS-000102
- Vuln IDs
-
- V-35300
- Rule IDs
-
- SV-46587r3_rule
Checks: C-43669r2_chk
Review the application server configuration to ensure the system is authenticating via multifactor authentication for privileged users. If all aspects of application server web management interfaces are not authenticating privileged users via multifactor authentication methods, this is a finding.
Fix: F-39846r2_fix
Configure the application server to authenticate privileged users via multifactor authentication for network access to the management interface.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000767
- Version
- SRG-APP-000151-AS-000103
- Vuln IDs
-
- V-35301
- Rule IDs
-
- SV-46588r3_rule
Checks: C-43670r2_chk
Review the application server configuration to ensure the system is authenticating via multifactor authentication for privileged users. If all aspects of application server command line management interfaces are not authenticating privileged users via multifactor authentication methods, this is a finding.
Fix: F-39847r3_fix
Configure the application server to authenticate privileged users via multifactor authentication for local access to the management interface.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- SRG-APP-000153-AS-000104
- Vuln IDs
-
- V-35302
- Rule IDs
-
- SV-46589r3_rule
Checks: C-43671r2_chk
Review the application server documentation and configuration to determine if the application server individually authenticates users prior to authenticating via a role or group. Review application server logs to verify user accesses requiring authentication can be traced back to an individual account. If the application server does not authenticate users on an individual basis, this is a finding.
Fix: F-39848r2_fix
Configure the application server to authenticate users individually prior to allowing any group-based authentication.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-APP-000156-AS-000106
- Vuln IDs
-
- V-35304
- Rule IDs
-
- SV-46591r3_rule
Checks: C-43673r3_chk
Review application server documentation to ensure the application server provides extensions to the SOAP protocol that provide secure authentication. These protocols include, but are not limited to, WS_Security suite. Review policy and data owner protection requirements in order to identify sensitive data. If secure authentication protocols are not utilized to protect data identified by data owner as requiring protection, this is a finding.
Fix: F-39850r2_fix
Configure the application server to utilize secure authentication when SOAP web services are used to access sensitive data.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- SRG-APP-000158-AS-000108
- Vuln IDs
-
- V-35306
- Rule IDs
-
- SV-46593r3_rule
Checks: C-43675r2_chk
Review application server documentation and configuration to ensure the application server identifies devices before allowing connections. If the application server does not identify a device before connection, this is a finding.
Fix: F-39852r2_fix
Configure the application server to identify devices before allowing connections.
- RMF Control
- IA-4
- Severity
- M
- CCI
- CCI-000795
- Version
- SRG-APP-000163-AS-000111
- Vuln IDs
-
- V-35309
- Rule IDs
-
- SV-46596r3_rule
Checks: C-43678r2_chk
Review the application server documentation and configuration to ensure the application server disables identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. If the application server is not configured to disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity, this is a finding.
Fix: F-39855r2_fix
Configure the application server to disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- SRG-APP-000171-AS-000119
- Vuln IDs
-
- V-35317
- Rule IDs
-
- SV-46604r3_rule
Checks: C-43687r2_chk
Review application server documentation and configuration to determine if the application server enforces the requirement to only store encrypted representations of passwords. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-39863r2_fix
Configure the application server to only store encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-APP-000172-AS-000120
- Vuln IDs
-
- V-35318
- Rule IDs
-
- SV-46605r3_rule
Checks: C-43688r2_chk
Review application server documentation and configuration to determine if the application server enforces the requirement to encrypt passwords when they are transmitted. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-39864r2_fix
Configure the application server to transmit only encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-APP-000172-AS-000121
- Vuln IDs
-
- V-35319
- Rule IDs
-
- SV-46606r3_rule
Checks: C-43689r2_chk
Review application server documentation and configuration to determine if the application server enforces the requirement to encrypt LDAP traffic. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-39865r2_fix
Configure the application server to encrypt LDAP traffic.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000175-AS-000124
- Vuln IDs
-
- V-35322
- Rule IDs
-
- SV-46609r3_rule
Checks: C-43693r4_chk
Review the application server documentation and deployed configuration to determine whether the application server provides PKI functionality that validates certification paths in accordance with RFC 5280. If PKI is not being used, this is NA. If the application server is using PKI, but it does not perform this requirement, this is a finding.
Fix: F-39869r5_fix
Configure the application server to validate certificates in accordance with RFC 5280.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-AS-000125
- Vuln IDs
-
- V-35324
- Rule IDs
-
- SV-46611r3_rule
Checks: C-43694r2_chk
Review application server configuration and documentation to ensure the application server enforces authorized access to the corresponding private key. If the application server is not configured to enforce authorized access to the corresponding private key, this is a finding.
Fix: F-39870r2_fix
Configure the application server to enforce authorized access to the corresponding private key.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-APP-000177-AS-000126
- Vuln IDs
-
- V-35325
- Rule IDs
-
- SV-46612r3_rule
Checks: C-43695r3_chk
Review application server documentation to ensure the application server provides a PKI integration capability that meets DoD PKI infrastructure requirements. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-39872r4_fix
Configure the application server to utilize the DoD Enterprise PKI infrastructure.
- RMF Control
- IA-6
- Severity
- M
- CCI
- CCI-000206
- Version
- SRG-APP-000178-AS-000127
- Vuln IDs
-
- V-35328
- Rule IDs
-
- SV-46615r3_rule
Checks: C-43696r3_chk
Review the application server documentation and configuration to determine if any interfaces which are provided for authentication purposes display the user's password when it is typed into the data entry field. If authentication information is not obfuscated when entered, this is a finding.
Fix: F-39874r2_fix
Configure the application server to obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-APP-000179-AS-000129
- Vuln IDs
-
- V-35329
- Rule IDs
-
- SV-46616r3_rule
Checks: C-43697r2_chk
Review the application server documentation and deployed configuration to determine which version of TLS is being used. If the application server is not using TLS when authenticating users or non-FIPS-approved SSL versions are enabled, this is a finding.
Fix: F-39875r2_fix
Configure the application server to use a FIPS-2 approved TLS version to authenticate users and to disable all non-FIPS-approved SSL versions.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-AS-000146
- Vuln IDs
-
- V-35376
- Rule IDs
-
- SV-46663r3_rule
Checks: C-43739r2_chk
Review the application server documentation and configuration to verify that the application server separates admin functionality from hosted application functionality. If the application server does not separate application server admin functionality from hosted application functionality, this is a finding.
Fix: F-39923r2_fix
Configure the application server so that admin management functionality and hosted applications are separated.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-APP-000219-AS-000147
- Vuln IDs
-
- V-35381
- Rule IDs
-
- SV-46668r3_rule
Checks: C-43742r2_chk
Review the application server configuration and documentation to ensure the application server provides mutual authentication capabilities. If the application server does not provide the ability for applications to utilize mutual authentication, this is a finding.
Fix: F-39927r2_fix
Configure the application server to mutually authenticate during the entire session as required by application design and policy.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-APP-000220-AS-000148
- Vuln IDs
-
- V-35415
- Rule IDs
-
- SV-46702r3_rule
Checks: C-43761r2_chk
Review the application server configuration and organizational policy to determine if the system is configured to terminate administrator sessions upon administrator logout or any other organization- or policy-defined session termination events, such as idle time limit exceeded. If the configuration is not set to terminate administrator sessions per defined events, this is a finding.
Fix: F-39959r2_fix
Configure the application server to terminate administrative sessions upon logout or any other organization- or policy-defined session termination events.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-AS-000151
- Vuln IDs
-
- V-35421
- Rule IDs
-
- SV-46708r3_rule
Checks: C-43772r2_chk
Review the application server configuration to determine if the application server recognizes only system-generated session identifiers. If the application server does not recognize only system-generated session identifiers, this is a finding.
Fix: F-39965r2_fix
Design the application server to recognize only system-generated session identifiers.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-AS-000152
- Vuln IDs
-
- V-35422
- Rule IDs
-
- SV-46709r3_rule
Checks: C-43773r2_chk
Review the application server configuration and documentation to determine if the application server uses a FIPS 140-2 approved random number generator to create unique session identifiers. Have a user log onto the application server to determine if the session IDs generated are random and unique. If the application server does not generate unique session identifiers and does not use a FIPS 140-2 random number generator to create the randomness of the session ID, this is a finding.
Fix: F-39966r2_fix
Configure the application server to generate unique session identifiers and to use a FIPS 140-2 random number generator to generate the randomness of the session identifiers.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-AS-000153
- Vuln IDs
-
- V-35423
- Rule IDs
-
- SV-46710r3_rule
Checks: C-43774r2_chk
Review the application server configuration and documentation to ensure the system is configured to perform complete application deployments. If the application server is not configured to ensure complete application deployments or provides no rollback functionality, this is a finding.
Fix: F-39967r2_fix
Configure the application server to detect errors that occur during application deployment and to prevent deployment if errors are encountered.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-AS-000154
- Vuln IDs
-
- V-35424
- Rule IDs
-
- SV-46711r3_rule
Checks: C-43775r2_chk
This requirement is dependent upon system MAC and confidentiality. If the system MAC and confidentiality levels do not specify redundancy requirements, this requirement is NA. Review the application server configuration and documentation to ensure the application server is configured to provide clustering functionality. If the application server is not configured to provide clustering or some form of failover functionality, this is a finding.
Fix: F-39968r2_fix
This requirement is dependent upon system MAC and confidentiality. If the system MAC and confidentiality levels do not specify redundancy requirements, this requirement is NA. Configure the application server to provide application failover or participate in an application cluster which provides failover.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-AS-000156
- Vuln IDs
-
- V-35426
- Rule IDs
-
- SV-46713r3_rule
Checks: C-43777r2_chk
Review the application server configuration to ensure the system is protecting the confidentiality and integrity of all application server data at rest when stored off-line. If the application server is not configured to protect all application server data at rest when stored off-line, this is a finding.
Fix: F-39970r3_fix
Configure the application server to employ cryptographic mechanisms to ensure confidentiality and integrity of all application server data at rest when stored off-line.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-AS-000165
- Vuln IDs
-
- V-35436
- Rule IDs
-
- SV-46723r3_rule
Checks: C-43790r2_chk
Review the application server configuration to determine if the system checks the validity of information inputs to the management interface, except those specifically identified by the organization. If the management interface data inputs are not validated, this is a finding.
Fix: F-39980r2_fix
Configure the application server to check the validity of data inputs into the management interface except those specifically identified by the organization.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-AS-000169
- Vuln IDs
-
- V-35440
- Rule IDs
-
- SV-46727r3_rule
Checks: C-43794r2_chk
Review system documentation and logs to determine if the application server writes sensitive information such as passwords or private keys into the logs and administrative messages. If the application server writes sensitive or potentially harmful information into the logs and administrative messages, this is a finding.
Fix: F-39984r2_fix
Configure the application server to not write sensitive information into the logs and administrative messages.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- SRG-APP-000267-AS-000170
- Vuln IDs
-
- V-35441
- Rule IDs
-
- SV-46728r3_rule
Checks: C-43795r3_chk
Review the application server configuration and documentation to determine if the application server will restrict access to error messages so only authorized users may view or otherwise access them. If the application server cannot be configured to restrict access to error messages to only authorized users, this is a finding.
Fix: F-39985r2_fix
Configure the application server to restrict access to error messages so only authorized users may view or otherwise access them.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001496
- Version
- SRG-APP-000290-AS-000174
- Vuln IDs
-
- V-35445
- Rule IDs
-
- SV-46732r4_rule
Checks: C-43799r2_chk
Review the application server configuration to determine if the application server log tools have been cryptographically signed to protect the integrity of the tools. If the application server log tools have not been cryptographically signed, this is a finding.
Fix: F-39989r2_fix
Configure the application server log tools to be cryptographically signed to protect the integrity of the tools.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-AS-000024
- Vuln IDs
-
- V-35738
- Rule IDs
-
- SV-47025r3_rule
Checks: C-44081r2_chk
Review application server product documentation and configuration to determine if the system enforces authorization requirements for logical access to the system in accordance with applicable policy. If the application server is not configured to utilize access controls or follow access control policies, this is a finding.
Fix: F-40281r2_fix
Configure the application server to enforce access control policies for logical access to the system in accordance with applicable policy.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-AS-000079
- Vuln IDs
-
- V-35772
- Rule IDs
-
- SV-47059r3_rule
Checks: C-44117r2_chk
Review the configuration settings to determine if the application server log features protect log information from unauthorized modification. Review file system settings to verify the application server sets secure file permissions on log files to prevent unauthorized modification. If the application server does not protect log information from unauthorized modification, this is a finding.
Fix: F-40317r2_fix
Configure the application server to protect log information from unauthorized modification.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- SRG-APP-000343-AS-000030
- Vuln IDs
-
- V-57397
- Rule IDs
-
- SV-71669r2_rule
Checks: C-58071r1_chk
Review application server documentation and log configuration to verify the application server logs privileged activity. If the application server is not configured to log privileged activity, this is a finding.
Fix: F-62435r1_fix
Configure the application server to log privileged activity.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-APP-000340-AS-000185
- Vuln IDs
-
- V-57399
- Rule IDs
-
- SV-71671r2_rule
Checks: C-58073r1_chk
Review application server documentation and configuration to verify that non-privileged users cannot access or execute privileged functions. Have a user logon as a non-privileged user and attempt to execute privileged functions. If the user is capable of executing privileged functions, this is a finding.
Fix: F-62437r1_fix
Configure the application server to deny non-privileged users access to and execution of privileged functions.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-AS-000263
- Vuln IDs
-
- V-57401
- Rule IDs
-
- SV-71673r2_rule
Checks: C-58075r1_chk
Review application server documentation and configuration settings to determine if the application server is configured to close user sessions after defined conditions or trigger events are met. If the application server is not configured or cannot be configured to disconnect users after defined conditions and trigger events are met, this is a finding.
Fix: F-62439r1_fix
Configure the application server to terminate user sessions on defined conditions or trigger events.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-APP-000296-AS-000201
- Vuln IDs
-
- V-57403
- Rule IDs
-
- SV-71675r2_rule
Checks: C-58077r1_chk
Review application server documentation and configuration settings to determine if the application server management interface provides a logout capability. If the application server management interface does not provide a logout capability, this is a finding.
Fix: F-62441r1_fix
Configure the application server management interface to provide a logout capability for the users.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-APP-000297-AS-000188
- Vuln IDs
-
- V-57405
- Rule IDs
-
- SV-71677r2_rule
Checks: C-58079r1_chk
Review application server documentation and configuration settings to determine if the application server management interface displays a logout message. If the application server management interface does not display a logout message, this is a finding.
Fix: F-62443r1_fix
Configure the application server management interface to display an explicit logout message to users.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002263
- Version
- SRG-APP-000313-AS-000003
- Vuln IDs
-
- V-57407
- Rule IDs
-
- SV-71679r2_rule
Checks: C-58081r1_chk
Review the application server documentation to determine if the application associates organization-defined types of security attributes with organization-defined security attribute values to information in process. If the application server does not associate the security attributes to information in process or the feature is not implemented, this is a finding.
Fix: F-62445r1_fix
Configure the application server to associate organization-defined types of security attributes having organization-defined security attribute values with information in process.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002264
- Version
- SRG-APP-000314-AS-000005
- Vuln IDs
-
- V-57409
- Rule IDs
-
- SV-71681r2_rule
Checks: C-58083r1_chk
Review the application server documentation to determine if the application associates organization-defined types of security attributes with organization-defined security attribute values to information in transmission. If the application server does not associate the security attributes to information in transmission or the feature is not implemented, this is a finding.
Fix: F-62447r1_fix
Configure the application server to associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-APP-000016-AS-000013
- Vuln IDs
-
- V-57411
- Rule IDs
-
- SV-71683r2_rule
Checks: C-58085r1_chk
Review the application server product documentation to determine if the application server logs remote administrative sessions. If the application server does not log remote sessions for the admin user, then this is a finding.
Fix: F-62449r1_fix
Configure the application server to log an event for each instance when the administrator accesses the system remotely.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-APP-000315-AS-000094
- Vuln IDs
-
- V-57413
- Rule IDs
-
- SV-71685r2_rule
Checks: C-58087r1_chk
Review organization policy, application server product documentation and configuration to determine if the system enforces the organization's requirements for remote connections. If the system is not configured to enforce these requirements, or the remote connection settings are not in accordance with the requirements, this is a finding.
Fix: F-62451r1_fix
Configure the application server to enforce remote connection settings.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- SRG-APP-000316-AS-000199
- Vuln IDs
-
- V-57415
- Rule IDs
-
- SV-71687r2_rule
Checks: C-58091r1_chk
Review the application server product documentation and server configuration to ensure that there is a capability to immediately disconnect or disable remote access to the management interface. If there is no capability, this is a finding.
Fix: F-62453r1_fix
Configure the application server to have the capability to immediately disconnect or disable remote access to the management interface.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-APP-000101-AS-000072
- Vuln IDs
-
- V-57417
- Rule IDs
-
- SV-71689r2_rule
Checks: C-58093r1_chk
Review the application server documentation and deployment configuration to determine if the application server is configured to generate full-text recording of privileged commands or the individual identities of group users at a minimum. Have a user execute a privileged command and review the log data to validate that the full-text or identity of the individual is being logged. If the application server is not meeting this requirement, this is a finding.
Fix: F-62455r1_fix
Configure the application server to generate the full-text recording of privileged commands or the individual identities of group users, or both.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- SRG-APP-000356-AS-000202
- Vuln IDs
-
- V-57419
- Rule IDs
-
- SV-71691r2_rule
Checks: C-58095r1_chk
Review application server documentation and configuration to determine if the application server is part of a cluster. If the application server is not part of a cluster, this requirement is NA. If the application server is part of a cluster, verify that the log settings are managed and configured from a centralized management server. If the log settings are not centrally managed, this is a finding.
Fix: F-62457r1_fix
Configure the application server to allow centralized management and configuration of the content to be captured in log records.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-AS-000038
- Vuln IDs
-
- V-57421
- Rule IDs
-
- SV-71693r2_rule
Checks: C-58097r1_chk
Review the application server documentation and configuration to determine if the application server creates log storage to buffer log data until offloading to a log data storage facility. If the application server does not allocate storage for log data, this is a finding.
Fix: F-62459r1_fix
Configure the application server to allocate storage for log data before offloading to a log data storage facility.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-AS-000064
- Vuln IDs
-
- V-57423
- Rule IDs
-
- SV-71695r2_rule
Checks: C-58099r1_chk
Verify the log records are being off-loaded to a separate system or transferred from the application server to a storage location other than the application server itself. The system administrator of the device may demonstrate this capability using a log management application, system configuration, or other means. If logs are not being off-loaded, this is a finding.
Fix: F-62461r1_fix
Configure the application server to off-load the logs to a remote log or management server.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000515-AS-000203
- Vuln IDs
-
- V-57425
- Rule IDs
-
- SV-71697r2_rule
Checks: C-58101r1_chk
Verify the log records are being off-loaded, at a minimum of real time for interconnected systems and weekly for standalone systems. If the application server is not meeting these requirements, this is a finding.
Fix: F-62463r1_fix
Configure the application server to off-load interconnected systems in real time and standalone systems weekly.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-AS-000065
- Vuln IDs
-
- V-57427
- Rule IDs
-
- SV-71699r2_rule
Checks: C-58103r1_chk
Review the configuration settings to determine if the application server logging system provides a warning to the SA and ISSO when 75% of allocated log record storage volume is reached. If designated alerts are not sent, or the application server is not configured to use a dedicated logging tool that meets this requirement, this is a finding.
Fix: F-62465r1_fix
Configure the application server to provide an alert to the SA and ISSO when allocated log record storage volume reaches 75% of maximum log record storage capacity.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-APP-000360-AS-000066
- Vuln IDs
-
- V-57429
- Rule IDs
-
- SV-71701r2_rule
Checks: C-58105r1_chk
Review the configuration settings to determine if the application server log system provides a real-time alert to authorized users when log failure events occur requiring real-time alerts. If designated alerts are not sent to authorized users, this is a finding.
Fix: F-62467r1_fix
Configure the application server to provide a real-time alert to authorized users when log failure events occur that require real-time alerts.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-AS-000210
- Vuln IDs
-
- V-57431
- Rule IDs
-
- SV-71703r2_rule
Checks: C-58107r1_chk
Review the application server documentation and configuration files to determine if time stamps for log records can be mapped to UTC or GMT. If the time stamp cannot be mapped to UTC or GMT, this is a finding.
Fix: F-62469r1_fix
Configure the application server to use time stamps for log records that can easily be mapped to UTC or GMT.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-AS-000211
- Vuln IDs
-
- V-57433
- Rule IDs
-
- SV-71705r2_rule
Checks: C-58109r1_chk
Review the application server documentation and configuration files to determine if time stamps for log records meet a granularity of one second. If the time stamp cannot generate to a one-second granularity, this is a finding.
Fix: F-62471r1_fix
Configure the application server to use time stamps for log records that can meet a granularity of one second.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001891
- Version
- SRG-APP-000371-AS-000077
- Vuln IDs
-
- V-57435
- Rule IDs
-
- SV-71707r2_rule
Checks: C-58111r1_chk
Review application server documentation and confirm that the application server compares internal application server clocks at least every 24 hours with an authoritative time source. If the application server does not compare internal application server clocks to an authoritative source or if the frequency is greater than every 24 hours, this is a finding.
Fix: F-62473r1_fix
Configure the application server to compare internal application server clocks at least every 24 hours with an authoritative time source.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-002046
- Version
- SRG-APP-000372-AS-000212
- Vuln IDs
-
- V-57437
- Rule IDs
-
- SV-71709r2_rule
Checks: C-58113r1_chk
Review application server documentation and configuration to determine if the application server is configured to reset internal information clocks when the difference is greater than a defined threshold with an authoritative time source. If the application server cannot synchronize internal application server clocks to the authoritative time source when the time difference is greater than the organization-defined time period, this is a finding.
Fix: F-62475r1_fix
Configure the application server to reset internal information system clocks when the time difference is greater than a defined time period with the authoritative time source.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-AS-000220
- Vuln IDs
-
- V-57439
- Rule IDs
-
- SV-71711r2_rule
Checks: C-58115r1_chk
Review the application server documentation and the system configuration to determine if the application server generates log records when successful/unsuccessful attempts are made to modify privileges. If log records are not generated, this is a finding.
Fix: F-62477r1_fix
Configure the application server to generate log records when privileges are successfully or unsuccessfully modified.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000499-AS-000224
- Vuln IDs
-
- V-57441
- Rule IDs
-
- SV-71713r2_rule
Checks: C-58117r1_chk
Review the application server documentation and the system configuration to determine if the application server generates log records when successful and unsuccessful attempts are made to delete privileges. If log records are not generated, this is a finding.
Fix: F-62479r1_fix
Configure the application server to generate log records when privileges are successfully or unsuccessfully deleted.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-AS-000228
- Vuln IDs
-
- V-57443
- Rule IDs
-
- SV-71715r2_rule
Checks: C-58119r1_chk
Review product documentation and the system configuration to determine if the application server generates log records on successful and unsuccessful logon attempts by users. If logon attempts do not generate log records, this is a finding.
Fix: F-62481r1_fix
Configure the application server to generate log records when successful/unsuccessful logon attempts are made by users.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-AS-000229
- Vuln IDs
-
- V-57445
- Rule IDs
-
- SV-71717r2_rule
Checks: C-58121r1_chk
Review the application server documentation and the system configuration to determine if the application server generates log records for privileged activities. If log records are not generated for privileged activities, this is a finding.
Fix: F-62483r1_fix
Configure the application server to generate log records for privileged activities.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000505-AS-000230
- Vuln IDs
-
- V-57481
- Rule IDs
-
- SV-71757r2_rule
Checks: C-58189r1_chk
Review the application server documentation and the system configuration to determine if the application server generates log records showing starting and ending times for user access to the management interface. If log records are not generated showing starting and ending times of user access to the management interface, this is a finding.
Fix: F-62549r1_fix
Configure the application server to generate log records showing starting and ending times of user access to the management interface.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000506-AS-000231
- Vuln IDs
-
- V-57483
- Rule IDs
-
- SV-71759r2_rule
Checks: C-58191r1_chk
Review the application server documentation and the system configuration to determine if the application server generates log records showing concurrent logons from different workstations to the management interface. If concurrent logons from different workstations are not logged, this is a finding.
Fix: F-62551r1_fix
Configure the application server to generate log records showing concurrent logons from different workstations to the management interface.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000509-AS-000234
- Vuln IDs
-
- V-57485
- Rule IDs
-
- SV-71761r2_rule
Checks: C-58193r1_chk
Review the application server documentation and the system configuration to determine if the application server generates log records when accounts are created, modified, disabled, or terminated. If the application server does not generate log records for account creation, modification, disabling, and termination, this is a finding.
Fix: F-62553r1_fix
Configure the application server to generate log records when accounts are created, modified, disabled, or terminated.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-001914
- Version
- SRG-APP-000353-AS-000235
- Vuln IDs
-
- V-57487
- Rule IDs
-
- SV-71763r2_rule
Checks: C-58195r1_chk
Review the application server configuration to determine if the application server provides the capability for organization-identified individuals or roles to change the logging to be performed on all application components, based on all selectable event criteria within organization-defined time thresholds. If the application server cannot meet this requirement, this is a finding.
Fix: F-62555r1_fix
Configure the application server to provide the capability for organization-identified individuals or roles to change the logging to be performed on all application components, based on all selectable event criteria within organization-defined time thresholds.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-AS-000088
- Vuln IDs
-
- V-57491
- Rule IDs
-
- SV-71767r2_rule
Checks: C-58199r1_chk
Review the application server documentation and configuration to determine if the system employs mechanisms to enforce restrictions on application server configuration changes. Configuration changes include, but are not limited to, automatic code deployments, software library updates, and changes to configuration settings within the application server. If the application server does not enforce access restrictions for configuration changes, this is a finding.
Fix: F-62559r1_fix
Configure the application server to enforce access restrictions associated with changes to the application server configuration to include code deployment, library updates, and changes to application server configuration settings.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- SRG-APP-000381-AS-000089
- Vuln IDs
-
- V-57493
- Rule IDs
-
- SV-71769r2_rule
Checks: C-58201r1_chk
Check the application server documentation and logs to determine if enforcement actions used to restrict access associated with changes to the application server are logged. If these actions are not logged, this is a finding.
Fix: F-62561r1_fix
Configure the application server to log the enforcement actions used to restrict access associated with changes to the application server.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-APP-000131-AS-000002
- Vuln IDs
-
- V-57495
- Rule IDs
-
- SV-71771r2_rule
Checks: C-58203r1_chk
Review system documentation to determine if the application server prevents the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization. If the application server does not meet this requirement, this is a finding.
Fix: F-62563r1_fix
Configure the application server to prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-AS-000093
- Vuln IDs
-
- V-57497
- Rule IDs
-
- SV-71773r2_rule
Checks: C-58205r1_chk
Check the application server documentation and configuration to determine if the application server provides an automated rollback capability to a known good configuration in the event of a failed installation and upgrade. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-62565r1_fix
Configure the application server to automatically rollback to a known good configuration in the event of failed application installations and application server upgrades.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AS-000237
- Vuln IDs
-
- V-57499
- Rule IDs
-
- SV-71775r2_rule
Checks: C-58207r1_chk
Review the application server documentation and configuration to determine if the application server is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If the application server is not configured in accordance with security configuration settings, this is a finding.
Fix: F-62567r1_fix
Configure the application server to be in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-AS-000014
- Vuln IDs
-
- V-57501
- Rule IDs
-
- SV-71777r2_rule
Checks: C-58209r1_chk
Review the application server documentation and deployment configuration to determine which ports and protocols are enabled. Verify that the ports and protocols being used are not prohibited and are necessary for the operation of the application server and the hosted applications. If any of the ports or protocols is prohibited or not necessary for the application server operation, this is a finding.
Fix: F-62569r1_fix
Configure the application server to disable any ports or protocols that are prohibited by the PPSM CAL and vulnerability assessments.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-APP-000391-AS-000239
- Vuln IDs
-
- V-57503
- Rule IDs
-
- SV-71779r2_rule
Checks: C-58211r1_chk
Review application server documentation and configuration to ensure the application server accepts PIV credentials to the management interface. If PIV credentials are not accepted, this is a finding.
Fix: F-62571r1_fix
Configure the application server to accept PIV credentials to access the management interface.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-APP-000392-AS-000240
- Vuln IDs
-
- V-57505
- Rule IDs
-
- SV-71781r2_rule
Checks: C-58213r1_chk
Review application server documentation and configuration to ensure the application server electronically verifies PIV credentials to the management interface. If PIV credentials are not electronically verified, this is a finding.
Fix: F-62573r1_fix
Configure the application server to electronically verify PIV credentials to access the management interface.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-APP-000394-AS-000241
- Vuln IDs
-
- V-57507
- Rule IDs
-
- SV-71783r2_rule
Checks: C-58215r1_chk
Review application server documentation, application data protection requirements, and configuration to ensure the application server provides an SSL mutual authentication capability and the authentication is completed before the connection is fully established. If data protection requirements require mutual authentication and the application server is not configured to meet this requirement, this is a finding.
Fix: F-62575r1_fix
Configure the application server to perform mutual authentication of network-connected endpoint devices before the connection is established.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- SRG-APP-000395-AS-000109
- Vuln IDs
-
- V-57509
- Rule IDs
-
- SV-71785r2_rule
Checks: C-58217r1_chk
If data protection requirements do not mandate the need to establish the identity of the connecting device before the connection is established, this requirement is NA. Review application server documentation and configuration to determine if the application server authenticates all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based. If the application server does not meet this requirement, this is a finding.
Fix: F-62577r1_fix
If data protection requirements do not mandate the need to establish the identity of the connecting device before the connection is established, this requirement is NA. Configure the application server to authenticate all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001991
- Version
- SRG-APP-000401-AS-000243
- Vuln IDs
-
- V-57511
- Rule IDs
-
- SV-71787r2_rule
Checks: C-58219r1_chk
Review application server documentation to ensure the application server provides a PKI integration capability that implements a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-62579r1_fix
Configure the application server to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-APP-000400-AS-000246
- Vuln IDs
-
- V-57513
- Rule IDs
-
- SV-71789r2_rule
Checks: C-58221r1_chk
Review application server documentation to ensure the application server prohibits the use of cached authenticators after an organization-defined timeframe. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-62581r1_fix
Configure the application server to prohibit the use of cached authenticators after an organization-defined timeframe.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002009
- Version
- SRG-APP-000402-AS-000247
- Vuln IDs
-
- V-57515
- Rule IDs
-
- SV-71791r2_rule
Checks: C-58223r1_chk
Review the application server documentation and configuration to determine if the application server accepts PIV credentials from other federal agencies to access the management interface. If the application server does not accept other federal agency PIV credentials to access the management interface, this is a finding.
Fix: F-62583r1_fix
Configure the application server to accept PIV credentials from other federal agencies to access the management interface.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002010
- Version
- SRG-APP-000403-AS-000248
- Vuln IDs
-
- V-57517
- Rule IDs
-
- SV-71793r3_rule
Checks: C-58225r3_chk
The CAC is the standard DoD authentication token;the PIV is the standard authentication token used by federal/civilian agencies. If access to the application server is limited to DoD personnel accessing the system via CAC; and PIV access is not warranted or allowed as per the system security plan, the PIV requirement is NA. Review the application server documentation and configuration to determine if the application server electronically verifies PIV credentials from other federal agencies to access the management interface. If the application server does not electronically verify other federal agency PIV credentials to access the management interface, this is a finding.
Fix: F-62585r1_fix
Configure the unclassified application server to electronically verify PIV credentials from other federal agencies before granting access to the management interface.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002011
- Version
- SRG-APP-000404-AS-000249
- Vuln IDs
-
- V-57519
- Rule IDs
-
- SV-71795r2_rule
Checks: C-58227r1_chk
Review the application server documentation and configuration to determine if the application server accepts FICAM-approved third-party credentials. If the application server does not accept FICAM-approved third-party credentials, this is a finding.
Fix: F-62587r1_fix
Configure the application server to accept FICAM-approved third-party credentials.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002014
- Version
- SRG-APP-000405-AS-000250
- Vuln IDs
-
- V-57521
- Rule IDs
-
- SV-71797r2_rule
Checks: C-58229r1_chk
Review the application server documentation and configuration to determine if the application server conforms to FICAM-issued profiles. If the application server does not conform to FICAM-issued profiles, this is a finding.
Fix: F-62589r1_fix
Configure the application server to conform to FICAM-issued profiles.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- SRG-APP-000389-AS-000253
- Vuln IDs
-
- V-57523
- Rule IDs
-
- SV-71799r2_rule
Checks: C-58231r1_chk
Review the application server documentation and configuration to determine if the application server requires a user to re-authenticate when organization-defined circumstances or situations are met. If the application server does not require a user to re-authenticate when organization-defined circumstances or situations are met, this is a finding.
Fix: F-62591r1_fix
Configure the application server to require a user to re-authenticate when organization-defined circumstances or situations are met.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002039
- Version
- SRG-APP-000390-AS-000254
- Vuln IDs
-
- V-57525
- Rule IDs
-
- SV-71801r2_rule
Checks: C-58233r1_chk
Review the application server documentation and configuration to determine if the application server requires devices to re-authenticate when organization-defined circumstances or situations require re-authentication. If the application server does not require a device to re-authenticate, this is a finding.
Fix: F-62593r1_fix
Configure the application server to require devices to re-authenticate when organization-defined circumstances or situations require re-authentication.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001876
- Version
- SRG-APP-000181-AS-000255
- Vuln IDs
-
- V-57527
- Rule IDs
-
- SV-71803r3_rule
Checks: C-58235r2_chk
Review application server product documentation and server configuration to determine if the application server is configured to provide log reduction with on-demand reporting. If the application server is not configured to provide log reduction with on-demand reporting, or is not configured to send its logs to a centralized log system, this is a finding.
Fix: F-62595r2_fix
Configure the application server to provide and utilize log reduction with on-demand reporting or configure the application server to send its logs to a centralized log log system that provides log reduction and on-demand reporting functions.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-AS-000163
- Vuln IDs
-
- V-57529
- Rule IDs
-
- SV-71805r2_rule
Checks: C-58237r1_chk
Review application server documentation and configuration to determine if the application server can protect against or limit the effects of all types of Denial of Service (DoS) attacks by employing defined security safeguards. If the application server cannot be configured to protect against or limit the effects of all types of DoS, this is a finding.
Fix: F-62597r1_fix
Configure the application server to protect against or limit the effects of all types of Denial of Service (DoS) attacks by employing defined security safeguards.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-AS-000069
- Vuln IDs
-
- V-57531
- Rule IDs
-
- SV-71807r2_rule
Checks: C-58239r1_chk
If the application server is not a MAC I system, this requirement is NA. Review the application server documentation and configuration to determine if the application server is part of an HA cluster. If the application server is not part of an HA cluster, this is a finding.
Fix: F-62599r1_fix
If the application server is not a MAC I system, this requirement is NA. Configure the application server to be part of an HA cluster.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-AS-000155
- Vuln IDs
-
- V-57533
- Rule IDs
-
- SV-71809r2_rule
Checks: C-58241r1_chk
Review the application server documentation and deployed configuration to determine which version of TLS is being used. If the application server is not using TLS to maintain the confidentiality and integrity of transmitted information or non-FIPS-approved SSL versions are enabled, this is a finding.
Fix: F-62601r1_fix
Configure the application server to use a FIPS-2 approved TLS version to maintain the confidentiality and integrity of transmitted information and to disable all non-FIPS-approved SSL versions.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002421
- Version
- SRG-APP-000440-AS-000167
- Vuln IDs
-
- V-57535
- Rule IDs
-
- SV-71811r2_rule
Checks: C-58243r1_chk
Review application server documentation and configuration to determine if the application server employs approved cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission. If the application server does not employ approved cryptographic mechanisms, this is a finding.
Fix: F-62603r1_fix
Configure the application server to use AES 128 or AES 256 encryption for data in transit.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- SRG-APP-000441-AS-000258
- Vuln IDs
-
- V-57537
- Rule IDs
-
- SV-71813r2_rule
Checks: C-58245r1_chk
Review the application server documentation and deployed configuration to determine if the application server maintains the confidentiality and integrity of information during preparation before transmission. If the confidentiality and integrity is not maintained, this is a finding.
Fix: F-62605r1_fix
Configure the application server to maintain the confidentiality and integrity of information during preparation for transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- SRG-APP-000442-AS-000259
- Vuln IDs
-
- V-57539
- Rule IDs
-
- SV-71815r2_rule
Checks: C-58247r1_chk
Review application server configuration to determine if the server is using a transmission method that maintains the confidentiality and integrity of information during reception. If a transmission method is not being used that maintains the confidentiality and integrity of the data during reception, this is a finding.
Fix: F-62607r1_fix
Configure the application server to utilize a transmission method that maintains the confidentiality and integrity of information during reception.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000416-AS-000140
- Vuln IDs
-
- V-57541
- Rule IDs
-
- SV-71817r2_rule
Checks: C-58249r1_chk
Review application server documentation to verify that the application server is using NSA-approved cryptography to protect classified data and applications resident on the device. If the application server is not using NSA-approved cryptography for classified data and applications, this is a finding.
Fix: F-62609r1_fix
Configure the application server to utilize NSA-approved cryptography to protect classified information.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-AS-000136
- Vuln IDs
-
- V-57543
- Rule IDs
-
- SV-71819r2_rule
Checks: C-58251r1_chk
Review application server configuration and the NIST FIPS certificate to validate the application server uses NIST-approved or NSA-approved key management technology and processes when producing, controlling or distributing symmetric and asymmetric keys. If the application server does not use this NIST-approved or NSA-approved key management technology and processes, this is a finding.
Fix: F-62611r1_fix
Configure the application server to utilize NIST-approved or NSA-approved key management technology when the application server produces, controls, and distributes symmetric and asymmetric cryptographic keys.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-AS-000137
- Vuln IDs
-
- V-57545
- Rule IDs
-
- SV-71821r2_rule
Checks: C-58253r1_chk
Review the application server configuration to determine if the application server utilizes approved PKI Class 3 or Class 4 certificates. If the application server is not configured to use approved DoD or CNS certificates, this is a finding.
Fix: F-62613r1_fix
Configure the application server to use DoD- or CNSS-approved Class 3 or Class 4 PKI certificates.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- SRG-APP-000206-AS-000145
- Vuln IDs
-
- V-57547
- Rule IDs
-
- SV-71823r2_rule
Checks: C-58255r1_chk
Review the application server configuration to determine if the application server is configured to identify prohibited mobile code. If the application server is not configured to identify prohibited mobile code, this is a finding.
Fix: F-62615r1_fix
Configure the application server to identify prohibited mobile code.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-AS-000150
- Vuln IDs
-
- V-57549
- Rule IDs
-
- SV-71825r3_rule
Checks: C-58257r3_chk
Review the application server session management configuration settings in either the application server management console, application server initialization or application server configuration files to determine if the application server is configured to generate a unique session identifier for each session. If the application server is not configured to generate a unique session identifier for each session, this is a finding.
Fix: F-62617r1_fix
Configure the application server to generate a unique session identifier for each session.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-APP-000427-AS-000264
- Vuln IDs
-
- V-57551
- Rule IDs
-
- SV-71827r2_rule
Checks: C-58259r1_chk
Review the application server documentation and configuration to determine if the application server only allows the use of DoD PKI-established certificate authorities. If the application server allows other certificate authorities for verification, this is a finding.
Fix: F-62619r1_fix
Configure the application server to allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-AS-000166
- Vuln IDs
-
- V-57553
- Rule IDs
-
- SV-71829r2_rule
Checks: C-58261r1_chk
Review application server documentation and configuration to determine if the application server fails to a secure state if system initialization fails, shutdown fails, or aborts fail. If the application server cannot be configured to fail securely, this is a finding.
Fix: F-62621r1_fix
Configure the application server to fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-AS-000133
- Vuln IDs
-
- V-57555
- Rule IDs
-
- SV-71831r2_rule
Checks: C-58263r1_chk
Review the application server documentation and configuration to ensure the application server is protecting the confidentiality and integrity of all information at rest. If the confidentiality and integrity of all information at rest is not protected, this is a finding.
Fix: F-62623r1_fix
Configure the application server to protect the confidentiality and integrity of all information at rest.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002475
- Version
- SRG-APP-000428-AS-000265
- Vuln IDs
-
- V-57557
- Rule IDs
-
- SV-71833r2_rule
Checks: C-58265r1_chk
Review application server documentation and configuration to determine if the application server implements cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components. If the application server does not implement cryptographic mechanisms to prevent unauthorized modification, this is a finding.
Fix: F-62625r1_fix
Configure the application server to implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- SRG-APP-000429-AS-000157
- Vuln IDs
-
- V-57559
- Rule IDs
-
- SV-71835r2_rule
Checks: C-58267r1_chk
Review application server documentation and configuration to determine if the application server implements cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components. If the application server does not implement cryptographic mechanisms to prevent unauthorized disclosure, this is a finding.
Fix: F-62627r1_fix
Configure the application server to implement cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-AS-000266
- Vuln IDs
-
- V-57561
- Rule IDs
-
- SV-71837r2_rule
Checks: C-58269r1_chk
Review the application server documentation and configuration to determine if the application server checks with a patch management system to install security-relevant software updates within a timeframe directed by an authoritative source. If the application server does not install security-relevant patches within the time period directed by the authoritative source, this is a finding.
Fix: F-62629r1_fix
Configure the application server to use a patch management system to ensure security-relevant updates are installed within the time period directed by the authoritative source.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- SRG-APP-000454-AS-000268
- Vuln IDs
-
- V-57563
- Rule IDs
-
- SV-71839r2_rule
Checks: C-58271r1_chk
Review the application server documentation and configuration to determine if organization-defined software components are removed after updated versions have been installed. If organization-defined software components are not removed after updated versions have been installed, this is a finding.
Fix: F-62631r1_fix
Configure the application server to remove organization-defined software components after updated versions have been installed.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-APP-000447-AS-000273
- Vuln IDs
-
- V-57565
- Rule IDs
-
- SV-71841r2_rule
Checks: C-58273r1_chk
Review the application server configuration to determine if the management interface behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. If the application server does not meet this requirement, this is a finding.
Fix: F-62633r1_fix
Configure the application server management interface to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-AS-000168
- Vuln IDs
-
- V-57567
- Rule IDs
-
- SV-71843r2_rule
Checks: C-58275r1_chk
Review the application server configuration to determine if the system identifies potentially security-relevant error conditions on the server. If this function is not performed, this is a finding.
Fix: F-62635r1_fix
Configure the application server to identify potentially security-relevant error conditions on the server.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-AS-000274
- Vuln IDs
-
- V-61351
- Rule IDs
-
- SV-75833r1_rule
Checks: C-62281r2_chk
Review the application server documentation and deployed configuration to determine if export ciphers are removed. If the application server does not have the export ciphers removed, this is a finding.
Fix: F-67253r1_fix
Configure the application server to have export ciphers removed.