Application Server Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ⚠ 2
Comparison against the immediately-prior release (V4R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Severity changes 2
- V-204812 Medium High The application server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components.
- V-204813 Medium High The application must implement cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-AS-000001
- Vuln IDs
-
- V-204708
- V-35070
- Rule IDs
-
- SV-204708r960735_rule
- SV-46335
Checks: C-4828r282771_chk
Review the application server product documentation and configuration to determine if the number of concurrent sessions can be limited to the organization-defined number of sessions for all accounts and/or account types. If a feature to limit the number of concurrent sessions is not available, is not set, or is set to unlimited, this is a finding.
Fix: F-4828r282772_fix
Configure the application server to limit the number of concurrent sessions for all accounts and/or account types to the organization-defined number.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-APP-000014-AS-000009
- Vuln IDs
-
- V-204709
- V-35089
- Rule IDs
-
- SV-204709r960759_rule
- SV-46376
Checks: C-4829r282774_chk
Check the application server configuration to ensure all management interfaces use encryption in accordance with the management data. If the application server is not configured to encrypt remote access management sessions in accordance with the categorization of the management data, this is a finding.
Fix: F-4829r282775_fix
Configure the application server to use encryption strength in accordance with the categorization of the management data during remote access management sessions.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-APP-000015-AS-000010
- Vuln IDs
-
- V-204710
- V-35090
- Rule IDs
-
- SV-204710r960762_rule
- SV-46377
Checks: C-4830r282777_chk
Review the application server documentation and configuration to ensure the application server is configured to use cryptography to protect the integrity of remote access sessions. If the application server is not configured to implement cryptography mechanisms to protect the integrity of remote access sessions, this is a finding.
Fix: F-4830r282778_fix
Configure the application server to implement cryptography mechanisms to protect the integrity of the remote access session.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-APP-000016-AS-000013
- Vuln IDs
-
- V-204711
- V-57411
- Rule IDs
-
- SV-204711r960765_rule
- SV-71683
Checks: C-4831r282780_chk
Review the application server product documentation to determine if the application server logs remote administrative sessions. If the application server does not log remote sessions for the admin user, then this is a finding.
Fix: F-4831r282781_fix
Configure the application server to log an event for each instance when the administrator accesses the system remotely.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-AS-000024
- Vuln IDs
-
- V-204712
- V-35738
- Rule IDs
-
- SV-204712r960792_rule
- SV-47025
Checks: C-4832r282783_chk
Review application server product documentation and configuration to determine if the system enforces authorization requirements for logical access to the system in accordance with applicable policy. If the application server is not configured to utilize access controls or follow access control policies, this is a finding.
Fix: F-4832r282784_fix
Configure the application server to enforce access control policies for logical access to the system in accordance with applicable policy.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- SRG-APP-000068-AS-000035
- Vuln IDs
-
- V-204713
- V-35096
- Rule IDs
-
- SV-204713r960843_rule
- SV-46383
Checks: C-4833r282786_chk
Review the application server management interface configuration to verify the application server is configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access. The banner must read: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." If the application server management interface does not display the banner or displays an unapproved banner, this is a finding.
Fix: F-4833r282787_fix
Configure the application server management interface so it displays the Standard Mandatory DoD Notice and Consent Banner prior to allowing access. The banner must read: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details."
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- SRG-APP-000069-AS-000036
- Vuln IDs
-
- V-204714
- V-35098
- Rule IDs
-
- SV-204714r960846_rule
- SV-46385
Checks: C-4834r282789_chk
Review application server management interface product documentation and configuration to determine that the logon banner can be displayed until the user takes action to acknowledge the agreement. If the banner screen allows continuation to the application server without user interaction, this is a finding.
Fix: F-4834r282790_fix
Configure the application server management interface to retain the logon banner on the screen until the user takes explicit action to logon to the server.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- SRG-APP-000080-AS-000045
- Vuln IDs
-
- V-204715
- V-35135
- Rule IDs
-
- SV-204715r960864_rule
- SV-46422
Checks: C-4835r282792_chk
Review application server product documentation and server configuration to determine if the system does protect against an individual's (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. If the application does not meet this requirement, this is a finding.
Fix: F-4835r282793_fix
Configure the application server to protect against an individual's (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000174
- Version
- SRG-APP-000086-AS-000048
- Vuln IDs
-
- V-204716
- V-35139
- Rule IDs
-
- SV-204716r960873_rule
- SV-46426
Checks: C-4836r282795_chk
Review the application server log feature configuration to determine if the application server or an external logging tool in conjunction with the application server does compile log records from multiple components within the server into a system-wide log trail that is time-correlated with an organization-defined level of tolerance for the relationship between time stamps of individual records in the log trail. If the application server does not meet this requirement, this is a finding.
Fix: F-4836r282796_fix
Configure the application server or an external logging tool supporting the application server to compile log records from multiple components within the server into a system-wide log trail that is time-correlated with an organization-defined level of tolerance for the relationship between time stamps of individual records in the log trail.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-AS-000050
- Vuln IDs
-
- V-204717
- V-35141
- Rule IDs
-
- SV-204717r960879_rule
- SV-46428
Checks: C-4837r282798_chk
Review the application server documentation and the deployed system configuration to determine if, at a minimum, system startup and shutdown, system access, and system authentication events are logged. If the logs do not include the minimum logable events, this is a finding.
Fix: F-4837r282799_fix
Configure the application server to generate log records for system startup and shutdown, system access, and system authentication events.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- SRG-APP-000090-AS-000051
- Vuln IDs
-
- V-204718
- V-35142
- Rule IDs
-
- SV-204718r960882_rule
- SV-46429
Checks: C-4838r282801_chk
Review application server product documentation and configuration to determine if the system only allows the ISSM (or individuals or roles appointed by the ISSM) to change logable events. If the system is not configured to perform this function, this is a finding.
Fix: F-4838r282802_fix
Configure the application server to only allow the ISSM (or individuals or roles appointed by the ISSM) to change logable events.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000091-AS-000052
- Vuln IDs
-
- V-204719
- V-35143
- Rule IDs
-
- SV-204719r960885_rule
- SV-46430
Checks: C-4839r282804_chk
Review the application server documentation and the system configuration to determine if the application server generates log records when successful/unsuccessful attempts are made to access privileges. If log records are not generated, this is a finding.
Fix: F-4839r282805_fix
Configure the application server to generate log records when privileges are successfully/unsuccessfully accessed.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-AS-000053
- Vuln IDs
-
- V-204720
- V-35148
- Rule IDs
-
- SV-204720r960888_rule
- SV-46435
Checks: C-4840r282807_chk
Review the application server product documentation and server configuration to determine if the application server initiates session logging on application server startup. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-4840r282808_fix
Configure the application server to initiate session logging on application server startup.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-AS-000056
- Vuln IDs
-
- V-204721
- V-35159
- Rule IDs
-
- SV-204721r960891_rule
- SV-46446
Checks: C-4841r282810_chk
Review the application server log configuration to determine if the application server produces log records showing what type of event occurred. If the log data does not show the type of event, this is a finding.
Fix: F-4841r282811_fix
Configure the application server to include the event type in the log data.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-AS-000059
- Vuln IDs
-
- V-204722
- V-35165
- Rule IDs
-
- SV-204722r960894_rule
- SV-46452
Checks: C-4842r282813_chk
Review the logs on the application server to determine if the date and time are included in the log event data. If the date and time are not included, this is a finding.
Fix: F-4842r282814_fix
Configure the application server logging system to log date and time with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-AS-000060
- Vuln IDs
-
- V-204723
- V-35167
- Rule IDs
-
- SV-204723r960897_rule
- SV-46454
Checks: C-4843r282816_chk
Review the configuration settings on the application server to determine if the application server is configured to log information that establishes where within the application server the event occurred. The data in the log file should identify the event, the component, module, filename, host name, servlets, containers, API’s, or other functionality within the application server, as well as, any source and destination information that indicates where an event occurred. If the application server is not configured to log where within the application server the event took place, this is a finding.
Fix: F-4843r282817_fix
Configure the application server logging system to log where the event took place.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-AS-000061
- Vuln IDs
-
- V-204724
- V-35170
- Rule IDs
-
- SV-204724r960900_rule
- SV-46457
Checks: C-4844r282819_chk
Review the application server documentation and deployment configuration to determine if the application server is configured to generate sufficient information to resolve the source, e.g., source IP, of the log event. Request a user access the application server and generate logable events, and then review the logs to determine if the source of the event can be established. If the source of the event cannot be determined, this is a finding.
Fix: F-4844r282820_fix
Configure the application server to generate the source of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-AS-000062
- Vuln IDs
-
- V-204725
- V-35176
- Rule IDs
-
- SV-204725r960903_rule
- SV-46463
Checks: C-4845r282822_chk
Review application server documentation and the log files on the application server to determine if the logs contain information that establishes the outcome of event data. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-4845r282823_fix
Configure the application server logging system to log the event outcome.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-AS-000063
- Vuln IDs
-
- V-204726
- V-35182
- Rule IDs
-
- SV-204726r960906_rule
- SV-46469
Checks: C-4846r282825_chk
Review application server documentation and the log files on the application server to determine if the logs contain information that establishes the identity of the user or process associated with log event data. If the application server does not produce logs that establish the identity of the user or process associated with log event data, this is a finding.
Fix: F-4846r282826_fix
Configure the application server logging system to log the identity of the user or process related to the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-APP-000101-AS-000072
- Vuln IDs
-
- V-204727
- V-57417
- Rule IDs
-
- SV-204727r960909_rule
- SV-71689
Checks: C-4847r282828_chk
Review the application server documentation and deployment configuration to determine if the application server is configured to generate full-text recording of privileged commands or the individual identities of group users at a minimum. Have a user execute a privileged command and review the log data to validate that the full-text or identity of the individual is being logged. If the application server is not meeting this requirement, this is a finding.
Fix: F-4847r282829_fix
Configure the application server to generate the full-text recording of privileged commands or the individual identities of group users, or both.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-APP-000108-AS-000067
- Vuln IDs
-
- V-204728
- V-35186
- Rule IDs
-
- SV-204728r960912_rule
- SV-46473
Checks: C-4848r282831_chk
Review application server log configuration. Verify the application server sends alerts to the SA and ISSO in the event of a log processing failure. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-4848r282832_fix
Configure the application server log feature to alert the SA and ISSO in the event of a log processing failure.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-AS-000076
- Vuln IDs
-
- V-204731
- V-35203
- Rule IDs
-
- SV-204731r960927_rule
- SV-46490
Checks: C-4851r282840_chk
Review the application server configuration files to determine if the internal system clock is used for time stamps. If this is not feasible, an alternative workaround is to take an action that generates an entry in the logs and then immediately query the operating system for the current time. A reasonable match between the two times will suffice as evidence that the system is using the internal clock for timestamps. If the application server does not use the internal system clock to generate time stamps, this is a finding.
Fix: F-4851r282841_fix
Configure the application server to use internal system clocks to generate time stamps for log records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-AS-000078
- Vuln IDs
-
- V-204732
- V-35205
- Rule IDs
-
- SV-204732r960930_rule
- SV-46492
Checks: C-4852r282843_chk
Review the configuration settings to determine if the application server log features protect log information from unauthorized access. Review file system settings to verify the application server sets secure file permissions on log files. If the application server does not protect log information from unauthorized read access, this is a finding.
Fix: F-4852r282844_fix
Configure the application server to protect log information from unauthorized read access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-AS-000079
- Vuln IDs
-
- V-204733
- V-35772
- Rule IDs
-
- SV-204733r960933_rule
- SV-47059
Checks: C-4853r282846_chk
Review the configuration settings to determine if the application server log features protect log information from unauthorized modification. Review file system settings to verify the application server sets secure file permissions on log files to prevent unauthorized modification. If the application server does not protect log information from unauthorized modification, this is a finding.
Fix: F-4853r282847_fix
Configure the application server to protect log information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-AS-000080
- Vuln IDs
-
- V-204734
- V-35212
- Rule IDs
-
- SV-204734r960936_rule
- SV-46499
Checks: C-4854r282849_chk
Review the configuration settings to determine if the application server log features protect log information from unauthorized deletion. Review file system settings to verify the application server sets secure file permissions on log files to prevent unauthorized deletion. If the application server does not protect log information from unauthorized deletion, this is a finding.
Fix: F-4854r282850_fix
Configure the application server to protect log information from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-AS-000081
- Vuln IDs
-
- V-204735
- V-35213
- Rule IDs
-
- SV-204735r960939_rule
- SV-46500
Checks: C-4855r282852_chk
Review the application server documentation and server configuration to determine if the application server protects log tools from unauthorized access. Request a system administrator attempt to access log tools while logged into the server in a role that does not have the requisite privileges. If the application server does not protect log tools from unauthorized access, this is a finding.
Fix: F-4855r282853_fix
Configure the application server or OS to protect log tools from unauthorized access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-AS-000082
- Vuln IDs
-
- V-204736
- V-35214
- Rule IDs
-
- SV-204736r960942_rule
- SV-46501
Checks: C-4856r282855_chk
Review the application server documentation and server configuration to determine if the application server protects log tools from unauthorized modification. Request a system administrator attempt to modify log tools while logged into the server in a role that does not have the requisite privileges. Locate binary copies of log tool executables that are located on the file system and attempt to modify using unprivileged credentials. If the application server does not protect log tools from unauthorized modification, this is a finding.
Fix: F-4856r282856_fix
Configure the application server or the OS to protect log tools from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-AS-000083
- Vuln IDs
-
- V-204737
- V-35215
- Rule IDs
-
- SV-204737r960945_rule
- SV-46502
Checks: C-4857r282858_chk
Review the application server documentation and server configuration to determine if the application server protects log tools from unauthorized deletion. Locate binary copies of log tool executables that are located on the file system and attempt to delete using unprivileged credentials. If the application server does not protect log tools from unauthorized deletion, this is a finding.
Fix: F-4857r282859_fix
Configure the application server or the OS to protect log tools from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- SRG-APP-000125-AS-000084
- Vuln IDs
-
- V-204738
- V-35216
- Rule IDs
-
- SV-204738r960948_rule
- SV-46503
Checks: C-4858r282861_chk
Review the application server configuration to determine if the application server backs up log records every seven days onto a different system or media from the system being logged. If the application server does not back up log records every seven days onto a different system or media from the system being logged, this is a finding.
Fix: F-4858r282862_fix
Configure the application server to back up log records every seven days onto a different system or media from the system being logged.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001350
- Version
- SRG-APP-000126-AS-000085
- Vuln IDs
-
- V-204739
- V-35217
- Rule IDs
-
- SV-204739r960951_rule
- SV-46504
Checks: C-4859r282864_chk
Review the application server documentation and configuration to determine if the application server can be configured to protect the integrity of log data using cryptographic hashes and digital signatures. Configure the application server to hash and sign log data. This is typically done the moment when log files cease to be written to and are rolled over for storage or offloading. Alternatively, if the application server is not able to hash and sign log data, the task can be delegated by configuring the application server or underlying OS to send logs to a centralized log management system or SIEM that can meet the requirement. If the application server is not configured to hash and sign logs, or is not configured to utilize the aforementioned OS and centralized log management resources to meet the requirement, this is a finding.
Fix: F-4859r282865_fix
Configure the application server to hash and sign logs using cryptographic means. Alternatively, configure the application server or OS to send logs to a centralized log server that meets the hashing and signing requirement.
- RMF Control
- Severity
- M
- CCI
- CCI-003992
- Version
- SRG-APP-000131-AS-000002
- Vuln IDs
-
- V-204740
- V-57495
- Rule IDs
-
- SV-204740r981678_rule
- SV-71771
Checks: C-4860r981676_chk
Review system documentation to determine if the application server prevents the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate recognized and approved by the organization. If the application server does not meet this requirement, this is a finding.
Fix: F-4860r981677_fix
Configure the application server to prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate recognized and approved by the organization.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-AS-000092
- Vuln IDs
-
- V-204741
- V-35224
- Rule IDs
-
- SV-204741r960960_rule
- SV-46511
Checks: C-4861r282870_chk
Check the application server documentation and configuration to determine if the application server provides role-based access that limits the capability to change shared software libraries. Validate file permission settings to ensure library files are secured in relation to OS access. If the application server does not meet this requirement, this is a finding.
Fix: F-4861r282871_fix
Configure the application server to limit privileges to change the software resident within software libraries through the use of defined user roles and file permissions.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000133-AS-000093
- Vuln IDs
-
- V-204742
- V-57497
- Rule IDs
-
- SV-204742r960960_rule
- SV-71773
Checks: C-4862r282873_chk
Check the application server documentation and configuration to determine if the application server provides an automated rollback capability to a known good configuration in the event of a failed installation and upgrade. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-4862r282874_fix
Configure the application server to automatically rollback to a known good configuration in the event of failed application installations and application server upgrades.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-AS-000095
- Vuln IDs
-
- V-204743
- V-35234
- Rule IDs
-
- SV-204743r960963_rule
- SV-46521
Checks: C-4863r282876_chk
Review the application server documentation and configuration to determine if the application server can disable non-essential features and capabilities. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-4863r282877_fix
Configure the application server to use only essential features and capabilities.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-AS-000014
- Vuln IDs
-
- V-204744
- V-57501
- Rule IDs
-
- SV-204744r1043177_rule
- SV-71777
Checks: C-4864r282879_chk
Review the application server documentation and deployment configuration to determine which ports and protocols are enabled. Verify that the ports and protocols being used are not prohibited and are necessary for the operation of the application server and the hosted applications. If any of the ports or protocols is prohibited or not necessary for the application server operation, this is a finding.
Fix: F-4864r282880_fix
Configure the application server to disable any ports or protocols that are prohibited by the PPSM CAL and vulnerability assessments.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-AS-000101
- Vuln IDs
-
- V-204745
- V-35299
- Rule IDs
-
- SV-204745r1051118_rule
- SV-46586
Checks: C-4865r1051116_chk
Review application server documentation and configuration settings to determine if the application server is using an approved enterprise ICAM solution to authenticate organizational users and processes running on the users' behalf. If an approved enterprise ICAM solution is not being used, this is a finding. Note: If the site is currently using an enterprise solution (AAA Server) and has documented their plans to move to an approved enterprise ICAM solution, the severity of this control can be reduced to a CAT III.
Fix: F-4865r1051117_fix
Configure the application server to use an approved enterprise ICAM solution to uniquely identify and authenticate users and processes acting on behalf of organizational users.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000765
- Version
- SRG-APP-000149-AS-000102
- Vuln IDs
-
- V-204746
- V-35300
- Rule IDs
-
- SV-204746r960972_rule
- SV-46587
Checks: C-4866r282885_chk
Review the application server configuration to ensure the system is authenticating via multifactor authentication for privileged users. If all aspects of application server web management interfaces are not authenticating privileged users via multifactor authentication methods, this is a finding.
Fix: F-4866r282886_fix
Configure the application server to authenticate privileged users via multifactor authentication for network access to the management interface.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000765
- Version
- SRG-APP-000151-AS-000103
- Vuln IDs
-
- V-204747
- V-35301
- Rule IDs
-
- SV-204747r981679_rule
- SV-46588
Checks: C-4867r282888_chk
Review the application server configuration to ensure the system is authenticating via multifactor authentication for privileged users. If all aspects of application server command line management interfaces are not authenticating privileged users via multifactor authentication methods, this is a finding.
Fix: F-4867r282889_fix
Configure the application server to authenticate privileged users via multifactor authentication for local access to the management interface.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SRG-APP-000153-AS-000104
- Vuln IDs
-
- V-204748
- V-35302
- Rule IDs
-
- SV-204748r981680_rule
- SV-46589
Checks: C-4868r282891_chk
Review the application server documentation and configuration to determine if the application server individually authenticates users prior to authenticating via a role or group. Review application server logs to verify user accesses requiring authentication can be traced back to an individual account. If the application server does not authenticate users on an individual basis, this is a finding.
Fix: F-4868r282892_fix
Configure the application server to authenticate users individually prior to allowing any group-based authentication.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-APP-000156-AS-000106
- Vuln IDs
-
- V-204749
- V-35304
- Rule IDs
-
- SV-204749r960993_rule
- SV-46591
Checks: C-4869r282894_chk
Review application server documentation to ensure the application server provides extensions to the SOAP protocol that provide secure authentication. These protocols include, but are not limited to, WS_Security suite. Review policy and data owner protection requirements in order to identify sensitive data. If secure authentication protocols are not utilized to protect data identified by data owner as requiring protection, this is a finding.
Fix: F-4869r282895_fix
Configure the application server to utilize secure authentication when SOAP web services are used to access sensitive data.
- RMF Control
- Severity
- M
- CCI
- CCI-003627
- Version
- SRG-APP-000163-AS-000111
- Vuln IDs
-
- V-204750
- V-35309
- Rule IDs
-
- SV-204750r981681_rule
- SV-46596
Checks: C-4870r282897_chk
Review the application server documentation and configuration to ensure the application server disables identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. If the application server is not configured to disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity, this is a finding.
Fix: F-4870r282898_fix
Configure the application server to disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- SRG-APP-000171-AS-000119
- Vuln IDs
-
- V-204751
- V-35317
- Rule IDs
-
- SV-204751r981682_rule
- SV-46604
Checks: C-4871r282900_chk
Review application server documentation and configuration to determine if the application server enforces the requirement to only store encrypted representations of passwords. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-4871r282901_fix
Configure the application server to only store encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-APP-000172-AS-000120
- Vuln IDs
-
- V-204752
- V-35318
- Rule IDs
-
- SV-204752r961029_rule
- SV-46605
Checks: C-4872r282903_chk
Review application server documentation and configuration to determine if the application server enforces the requirement to encrypt passwords when they are transmitted. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-4872r282904_fix
Configure the application server to transmit only encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-APP-000172-AS-000121
- Vuln IDs
-
- V-204753
- V-35319
- Rule IDs
-
- SV-204753r961029_rule
- SV-46606
Checks: C-4873r282906_chk
Review application server documentation and configuration to determine if the application server enforces the requirement to encrypt LDAP traffic. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-4873r282907_fix
Configure the application server to encrypt LDAP traffic.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000175-AS-000124
- Vuln IDs
-
- V-204754
- V-35322
- Rule IDs
-
- SV-204754r961038_rule
- SV-46609
Checks: C-4874r282909_chk
Review the application server documentation and deployed configuration to determine whether the application server provides PKI functionality that validates certification paths in accordance with RFC 5280. If PKI is not being used, this is NA. If the application server is using PKI, but it does not perform this requirement, this is a finding.
Fix: F-4874r282910_fix
Configure the application server to validate certificates in accordance with RFC 5280.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-AS-000125
- Vuln IDs
-
- V-204755
- V-35324
- Rule IDs
-
- SV-204755r961041_rule
- SV-46611
Checks: C-4875r282912_chk
Review application server configuration and documentation to ensure the application server enforces authorized access to the corresponding private key. If the application server is not configured to enforce authorized access to the corresponding private key, this is a finding.
Fix: F-4875r282913_fix
Configure the application server to enforce authorized access to the corresponding private key.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-APP-000177-AS-000126
- Vuln IDs
-
- V-204756
- V-35325
- Rule IDs
-
- SV-204756r961044_rule
- SV-46612
Checks: C-4876r282915_chk
Review application server documentation to ensure the application server provides a PKI integration capability that meets DoD PKI infrastructure requirements. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-4876r282916_fix
Configure the application server to utilize the DoD Enterprise PKI infrastructure.
- RMF Control
- IA-6
- Severity
- M
- CCI
- CCI-000206
- Version
- SRG-APP-000178-AS-000127
- Vuln IDs
-
- V-204757
- V-35328
- Rule IDs
-
- SV-204757r961047_rule
- SV-46615
Checks: C-4877r282918_chk
Review the application server documentation and configuration to determine if any interfaces which are provided for authentication purposes display the user's password when it is typed into the data entry field. If authentication information is not obfuscated when entered, this is a finding.
Fix: F-4877r282919_fix
Configure the application server to obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-APP-000179-AS-000129
- Vuln IDs
-
- V-204758
- V-35329
- Rule IDs
-
- SV-204758r961050_rule
- SV-46616
Checks: C-4878r282921_chk
Review the application server documentation and deployed configuration to determine which version of TLS is being used. If the application server is not using TLS when authenticating users or non-FIPS-approved SSL versions are enabled, this is a finding.
Fix: F-4878r282922_fix
Configure the application server to use a FIPS-2 approved TLS version to authenticate users and to disable all non-FIPS-approved SSL versions.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001876
- Version
- SRG-APP-000181-AS-000255
- Vuln IDs
-
- V-204759
- V-57527
- Rule IDs
-
- SV-204759r961056_rule
- SV-71803
Checks: C-4879r282924_chk
Review application server product documentation and server configuration to determine if the application server is configured to provide log reduction with on-demand reporting. If the application server is not configured to provide log reduction with on-demand reporting, or is not configured to send its logs to a centralized log system, this is a finding.
Fix: F-4879r282925_fix
Configure the application server to provide and utilize log reduction with on-demand reporting or configure the application server to send its logs to a centralized log log system that provides log reduction and on-demand reporting functions.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- SRG-APP-000206-AS-000145
- Vuln IDs
-
- V-204760
- V-57547
- Rule IDs
-
- SV-204760r961083_rule
- SV-71823
Checks: C-4880r282927_chk
Review the application server configuration to determine if the application server is configured to identify prohibited mobile code. If the application server is not configured to identify prohibited mobile code, this is a finding.
Fix: F-4880r282928_fix
Configure the application server to identify prohibited mobile code.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-AS-000146
- Vuln IDs
-
- V-204761
- V-35376
- Rule IDs
-
- SV-204761r961095_rule
- SV-46663
Checks: C-4881r282930_chk
Review the application server documentation and configuration to verify that the application server separates admin functionality from hosted application functionality. If the application server does not separate application server admin functionality from hosted application functionality, this is a finding.
Fix: F-4881r282931_fix
Configure the application server so that admin management functionality and hosted applications are separated.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-APP-000219-AS-000147
- Vuln IDs
-
- V-204762
- V-35381
- Rule IDs
-
- SV-204762r1043178_rule
- SV-46668
Checks: C-4882r282933_chk
Review application server documentation, system security plan and application data protection requirements. If the connected web proxy is exposed to an untrusted network or if data protection requirements specified in the system security plan mandate the need to establish the identity of the connecting application server, proxy or application gateway and the application server is not configured to mutually authenticate the application server, proxy server or gateway, this is a finding.
Fix: F-4882r282934_fix
Configure the application server to mutually authenticate proxy servers, other application servers and application gateways as specified.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-APP-000220-AS-000148
- Vuln IDs
-
- V-204763
- V-35415
- Rule IDs
-
- SV-204763r1043179_rule
- SV-46702
Checks: C-4883r282936_chk
Review the application server configuration and organizational policy to determine if the system is configured to terminate administrator sessions upon administrator logout or any other organization- or policy-defined session termination events, such as idle time limit exceeded. If the configuration is not set to terminate administrator sessions per defined events, this is a finding.
Fix: F-4883r282937_fix
Configure the application server to terminate administrative sessions upon logout or any other organization- or policy-defined session termination events.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-AS-000150
- Vuln IDs
-
- V-204764
- V-57549
- Rule IDs
-
- SV-204764r1043180_rule
- SV-71825
Checks: C-4884r282939_chk
Review the application server session management configuration settings in either the application server management console, application server initialization or application server configuration files to determine if the application server is configured to generate a unique session identifier for each session. If the application server is not configured to generate a unique session identifier for each session, this is a finding.
Fix: F-4884r282940_fix
Configure the application server to generate a unique session identifier for each session.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-AS-000151
- Vuln IDs
-
- V-204765
- V-35421
- Rule IDs
-
- SV-204765r1043180_rule
- SV-46708
Checks: C-4885r282942_chk
Review the application server configuration to determine if the application server recognizes only system-generated session identifiers. If the application server does not recognize only system-generated session identifiers, this is a finding.
Fix: F-4885r282943_fix
Design the application server to recognize only system-generated session identifiers.
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-001188
- Version
- SRG-APP-000224-AS-000152
- Vuln IDs
-
- V-204766
- V-35422
- Rule IDs
-
- SV-204766r1043181_rule
- SV-46709
Checks: C-4886r282945_chk
Review the application server configuration and documentation to determine if the application server uses a FIPS 140-2 approved random number generator to create unique session identifiers. Have a user log onto the application server to determine if the session IDs generated are random and unique. If the application server does not generate unique session identifiers and does not use a FIPS 140-2 random number generator to create the randomness of the session ID, this is a finding.
Fix: F-4886r282946_fix
Configure the application server to generate unique session identifiers and to use a FIPS 140-2 random number generator to generate the randomness of the session identifiers.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-AS-000153
- Vuln IDs
-
- V-204767
- V-35423
- Rule IDs
-
- SV-204767r961122_rule
- SV-46710
Checks: C-4887r282948_chk
Review the application server configuration and documentation to ensure the system is configured to perform complete application deployments. If the application server is not configured to ensure complete application deployments or provides no rollback functionality, this is a finding.
Fix: F-4887r282949_fix
Configure the application server to detect errors that occur during application deployment and to prevent deployment if errors are encountered.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-AS-000154
- Vuln IDs
-
- V-204768
- V-35424
- Rule IDs
-
- SV-204768r961122_rule
- SV-46711
Checks: C-4888r282951_chk
This requirement is dependent upon system MAC and confidentiality. If the system MAC and confidentiality levels do not specify redundancy requirements, this requirement is NA. Review the application server configuration and documentation to ensure the application server is configured to provide clustering functionality. If the application server is not configured to provide clustering or some form of failover functionality, this is a finding.
Fix: F-4888r282952_fix
This requirement is dependent upon system MAC and confidentiality. If the system MAC and confidentiality levels do not specify redundancy requirements, this requirement is NA. Configure the application server to provide application failover or participate in an application cluster which provides failover.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-AS-000166
- Vuln IDs
-
- V-204769
- V-57553
- Rule IDs
-
- SV-204769r961122_rule
- SV-71829
Checks: C-4889r282954_chk
Review application server documentation and configuration to determine if the application server fails to a secure state if system initialization fails, shutdown fails, or aborts fail. If the application server cannot be configured to fail securely, this is a finding.
Fix: F-4889r282955_fix
Configure the application server to fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-AS-000133
- Vuln IDs
-
- V-204770
- V-57555
- Rule IDs
-
- SV-204770r961128_rule
- SV-71831
Checks: C-4890r282957_chk
Review the application server documentation and configuration to ensure the application server is protecting the confidentiality and integrity of all information at rest. If the confidentiality and integrity of all information at rest is not protected, this is a finding.
Fix: F-4890r282958_fix
Configure the application server to protect the confidentiality and integrity of all information at rest.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-AS-000156
- Vuln IDs
-
- V-204771
- V-35426
- Rule IDs
-
- SV-204771r961128_rule
- SV-46713
Checks: C-4891r282960_chk
Review the application server configuration to ensure the system is protecting the confidentiality and integrity of all application server data at rest when stored off-line. If the application server is not configured to protect all application server data at rest when stored off-line, this is a finding.
Fix: F-4891r282961_fix
Configure the application server to employ cryptographic mechanisms to ensure confidentiality and integrity of all application server data at rest when stored off-line.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-AS-000165
- Vuln IDs
-
- V-204772
- V-35436
- Rule IDs
-
- SV-204772r961158_rule
- SV-46723
Checks: C-4892r282963_chk
Review the application server configuration to determine if the system checks the validity of information inputs to the management interface, except those specifically identified by the organization. If the management interface data inputs are not validated, this is a finding.
Fix: F-4892r282964_fix
Configure the application server to check the validity of data inputs into the management interface except those specifically identified by the organization.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-AS-000168
- Vuln IDs
-
- V-204773
- V-57567
- Rule IDs
-
- SV-204773r961167_rule
- SV-71843
Checks: C-4893r282966_chk
Review the application server configuration to determine if the system identifies potentially security-relevant error conditions on the server. If this function is not performed, this is a finding.
Fix: F-4893r282967_fix
Configure the application server to identify potentially security-relevant error conditions on the server.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-AS-000169
- Vuln IDs
-
- V-204774
- V-35440
- Rule IDs
-
- SV-204774r961167_rule
- SV-46727
Checks: C-4894r282969_chk
Review system documentation and logs to determine if the application server writes sensitive information such as passwords or private keys into the logs and administrative messages. If the application server writes sensitive or potentially harmful information into the logs and administrative messages, this is a finding.
Fix: F-4894r282970_fix
Configure the application server to not write sensitive information into the logs and administrative messages.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- SRG-APP-000267-AS-000170
- Vuln IDs
-
- V-204775
- V-35441
- Rule IDs
-
- SV-204775r961170_rule
- SV-46728
Checks: C-4895r282972_chk
Review the application server configuration and documentation to determine if the application server will restrict access to error messages so only authorized users may view or otherwise access them. If the application server cannot be configured to restrict access to error messages to only authorized users, this is a finding.
Fix: F-4895r282973_fix
Configure the application server to restrict access to error messages so only authorized users may view or otherwise access them.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001496
- Version
- SRG-APP-000290-AS-000174
- Vuln IDs
-
- V-204776
- V-35445
- Rule IDs
-
- SV-204776r961206_rule
- SV-46732
Checks: C-4896r282975_chk
Review the application server configuration to determine if the application server log tools have been cryptographically signed to protect the integrity of the tools. If the application server log tools have not been cryptographically signed, this is a finding.
Fix: F-4896r282976_fix
Configure the application server log tools to be cryptographically signed to protect the integrity of the tools.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-AS-000263
- Vuln IDs
-
- V-204777
- V-57401
- Rule IDs
-
- SV-204777r1043182_rule
- SV-71673
Checks: C-4897r282978_chk
Review application server documentation and configuration settings to determine if the application server is configured to close user sessions after defined conditions or trigger events are met. If the application server is not configured or cannot be configured to disconnect users after defined conditions and trigger events are met, this is a finding.
Fix: F-4897r282979_fix
Configure the application server to terminate user sessions on defined conditions or trigger events.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-APP-000296-AS-000201
- Vuln IDs
-
- V-204778
- V-57403
- Rule IDs
-
- SV-204778r961224_rule
- SV-71675
Checks: C-4898r282981_chk
Review application server documentation and configuration settings to determine if the application server management interface provides a logout capability. If the application server management interface does not provide a logout capability, this is a finding.
Fix: F-4898r282982_fix
Configure the application server management interface to provide a logout capability for the users.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-APP-000297-AS-000188
- Vuln IDs
-
- V-204779
- V-57405
- Rule IDs
-
- SV-204779r961227_rule
- SV-71677
Checks: C-4899r282984_chk
Review application server documentation and configuration settings to determine if the application server management interface displays a logout message. If the application server management interface does not display a logout message, this is a finding.
Fix: F-4899r282985_fix
Configure the application server management interface to display an explicit logout message to users.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002263
- Version
- SRG-APP-000313-AS-000003
- Vuln IDs
-
- V-204780
- V-57407
- Rule IDs
-
- SV-204780r961272_rule
- SV-71679
Checks: C-4900r282987_chk
Review the application server documentation to determine if the application associates organization-defined types of security attributes with organization-defined security attribute values to information in process. If the application server does not associate the security attributes to information in process or the feature is not implemented, this is a finding.
Fix: F-4900r282988_fix
Configure the application server to associate organization-defined types of security attributes having organization-defined security attribute values with information in process.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002264
- Version
- SRG-APP-000314-AS-000005
- Vuln IDs
-
- V-204781
- V-57409
- Rule IDs
-
- SV-204781r961275_rule
- SV-71681
Checks: C-4901r282990_chk
Review the application server documentation to determine if the application associates organization-defined types of security attributes with organization-defined security attribute values to information in transmission. If the application server does not associate the security attributes to information in transmission or the feature is not implemented, this is a finding.
Fix: F-4901r282991_fix
Configure the application server to associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-APP-000315-AS-000094
- Vuln IDs
-
- V-204782
- V-57413
- Rule IDs
-
- SV-204782r961278_rule
- SV-71685
Checks: C-4902r282993_chk
Review organization policy, application server product documentation and configuration to determine if the system enforces the organization's requirements for remote connections. If the system is not configured to enforce these requirements, or the remote connection settings are not in accordance with the requirements, this is a finding.
Fix: F-4902r282994_fix
Configure the application server to enforce remote connection settings.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- SRG-APP-000316-AS-000199
- Vuln IDs
-
- V-204783
- V-57415
- Rule IDs
-
- SV-204783r961281_rule
- SV-71687
Checks: C-4903r282996_chk
Review the application server product documentation and server configuration to ensure that there is a capability to immediately disconnect or disable remote access to the management interface. If there is no capability, this is a finding.
Fix: F-4903r282997_fix
Configure the application server to have the capability to immediately disconnect or disable remote access to the management interface.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-APP-000340-AS-000185
- Vuln IDs
-
- V-204784
- V-57399
- Rule IDs
-
- SV-204784r961353_rule
- SV-71671
Checks: C-4904r282999_chk
Review application server documentation and configuration to verify that non-privileged users cannot access or execute privileged functions. Have a user logon as a non-privileged user and attempt to execute privileged functions. If the user is capable of executing privileged functions, this is a finding.
Fix: F-4904r283000_fix
Configure the application server to deny non-privileged users access to and execution of privileged functions.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- SRG-APP-000343-AS-000030
- Vuln IDs
-
- V-204785
- V-57397
- Rule IDs
-
- SV-204785r961362_rule
- SV-71669
Checks: C-4905r283002_chk
Review application server documentation and log configuration to verify the application server logs privileged activity. If the application server is not configured to log privileged activity, this is a finding.
Fix: F-4905r283003_fix
Configure the application server to log privileged activity.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-AS-000038
- Vuln IDs
-
- V-204788
- V-57421
- Rule IDs
-
- SV-204788r961392_rule
- SV-71693
Checks: C-4908r283011_chk
Review the application server documentation and configuration to determine if the application server creates log storage to buffer log data until offloading to a log data storage facility. If the application server does not allocate storage for log data, this is a finding.
Fix: F-4908r283012_fix
Configure the application server to allocate storage for log data before offloading to a log data storage facility.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-AS-000064
- Vuln IDs
-
- V-204789
- V-57423
- Rule IDs
-
- SV-204789r961395_rule
- SV-71695
Checks: C-4909r283014_chk
Verify the log records are being off-loaded to a separate system or transferred from the application server to a storage location other than the application server itself. The system administrator of the device may demonstrate this capability using a log management application, system configuration, or other means. If logs are not being off-loaded, this is a finding.
Fix: F-4909r283015_fix
Configure the application server to off-load the logs to a remote log or management server.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-AS-000065
- Vuln IDs
-
- V-204790
- V-57427
- Rule IDs
-
- SV-204790r961398_rule
- SV-71699
Checks: C-4910r283017_chk
Review the configuration settings to determine if the application server logging system provides a warning to the SA and ISSO when 75% of allocated log record storage volume is reached. If designated alerts are not sent, or the application server is not configured to use a dedicated logging tool that meets this requirement, this is a finding.
Fix: F-4910r283018_fix
Configure the application server to provide an alert to the SA and ISSO when allocated log record storage volume reaches 75% of maximum log record storage capacity.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-APP-000360-AS-000066
- Vuln IDs
-
- V-204791
- V-57429
- Rule IDs
-
- SV-204791r961401_rule
- SV-71701
Checks: C-4911r283020_chk
Review the configuration settings to determine if the application server log system provides a real-time alert to authorized users when log failure events occur requiring real-time alerts. If designated alerts are not sent to authorized users, this is a finding.
Fix: F-4911r283021_fix
Configure the application server to provide a real-time alert to authorized users when log failure events occur that require real-time alerts.
- RMF Control
- Severity
- M
- CCI
- CCI-004923
- Version
- SRG-APP-000371-AS-000077
- Vuln IDs
-
- V-204792
- V-57435
- Rule IDs
-
- SV-204792r981685_rule
- SV-71707
Checks: C-4912r981684_chk
Review application server documentation and confirm the application server compares internal application server clocks at least every 24 hours with an authoritative time source. If the application server does not compare internal application server clocks to an authoritative source or if the frequency is greater than every 24 hours, this is a finding.
Fix: F-4912r283024_fix
Configure the application server to compare internal application server clocks at least every 24 hours with an authoritative time source.
- RMF Control
- Severity
- M
- CCI
- CCI-004926
- Version
- SRG-APP-000372-AS-000212
- Vuln IDs
-
- V-204793
- V-57437
- Rule IDs
-
- SV-204793r981686_rule
- SV-71709
Checks: C-4913r283026_chk
Review application server documentation and configuration to determine if the application server is configured to reset internal information clocks when the difference is greater than a defined threshold with an authoritative time source. If the application server cannot synchronize internal application server clocks to the authoritative time source when the time difference is greater than the organization-defined time period, this is a finding.
Fix: F-4913r283027_fix
Configure the application server to reset internal information system clocks when the time difference is greater than a defined time period with the authoritative time source.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-AS-000210
- Vuln IDs
-
- V-204794
- V-57431
- Rule IDs
-
- SV-204794r961443_rule
- SV-71703
Checks: C-4914r283029_chk
Review the application server documentation and configuration files to determine if time stamps for log records can be mapped to UTC or GMT. If the time stamp cannot be mapped to UTC or GMT, this is a finding.
Fix: F-4914r283030_fix
Configure the application server to use time stamps for log records that can easily be mapped to UTC or GMT.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-AS-000211
- Vuln IDs
-
- V-204795
- V-57433
- Rule IDs
-
- SV-204795r961446_rule
- SV-71705
Checks: C-4915r283032_chk
Review the application server documentation and configuration files to determine if time stamps for log records meet a granularity of one second. If the time stamp cannot generate to a one-second granularity, this is a finding.
Fix: F-4915r283033_fix
Configure the application server to use time stamps for log records that can meet a granularity of one second.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-AS-000088
- Vuln IDs
-
- V-204796
- V-57491
- Rule IDs
-
- SV-204796r961461_rule
- SV-71767
Checks: C-4916r283035_chk
Review the application server documentation and configuration to determine if the system employs mechanisms to enforce restrictions on application server configuration changes. Configuration changes include, but are not limited to, automatic code deployments, software library updates, and changes to configuration settings within the application server. If the application server does not enforce access restrictions for configuration changes, this is a finding.
Fix: F-4916r283036_fix
Configure the application server to enforce access restrictions associated with changes to the application server configuration to include code deployment, library updates, and changes to application server configuration settings.
- RMF Control
- Severity
- M
- CCI
- CCI-003938
- Version
- SRG-APP-000381-AS-000089
- Vuln IDs
-
- V-204797
- V-57493
- Rule IDs
-
- SV-204797r981687_rule
- SV-71769
Checks: C-4917r283038_chk
Check the application server documentation and logs to determine if enforcement actions used to restrict access associated with changes to the application server are logged. If these actions are not logged, this is a finding.
Fix: F-4917r283039_fix
Configure the application server to log the enforcement actions used to restrict access associated with changes to the application server.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- SRG-APP-000389-AS-000253
- Vuln IDs
-
- V-204798
- V-57523
- Rule IDs
-
- SV-204798r1050785_rule
- SV-71799
Checks: C-4918r981688_chk
Review the application server documentation and configuration to determine if the application server requires a user to reauthenticate when organization-defined circumstances or situations are met. If the application server does not require a user to reauthenticate when organization-defined circumstances or situations are met, this is a finding.
Fix: F-4918r981689_fix
Configure the application server to require a user to reauthenticate when organization-defined circumstances or situations are met.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-001953
- Version
- SRG-APP-000391-AS-000239
- Vuln IDs
-
- V-204800
- V-57503
- Rule IDs
-
- SV-204800r961494_rule
- SV-71779
Checks: C-4920r283047_chk
Review application server documentation and configuration to ensure the application server accepts PIV credentials to the management interface. If PIV credentials are not accepted, this is a finding.
Fix: F-4920r283048_fix
Configure the application server to accept PIV credentials to access the management interface.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-001954
- Version
- SRG-APP-000392-AS-000240
- Vuln IDs
-
- V-204801
- V-57505
- Rule IDs
-
- SV-204801r961497_rule
- SV-71781
Checks: C-4921r283050_chk
Review application server documentation and configuration to ensure the application server electronically verifies PIV credentials to the management interface. If PIV credentials are not electronically verified, this is a finding.
Fix: F-4921r283051_fix
Configure the application server to electronically verify PIV credentials to access the management interface.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-APP-000400-AS-000246
- Vuln IDs
-
- V-204804
- V-57513
- Rule IDs
-
- SV-204804r961521_rule
- SV-71789
Checks: C-4924r283053_chk
Review application server documentation to ensure the application server prohibits the use of cached authenticators after an organization-defined timeframe. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-4924r283054_fix
Configure the application server to prohibit the use of cached authenticators after an organization-defined timeframe.
- RMF Control
- Severity
- M
- CCI
- CCI-004068
- Version
- SRG-APP-000401-AS-000243
- Vuln IDs
-
- V-204805
- V-57511
- Rule IDs
-
- SV-204805r981694_rule
- SV-71787
Checks: C-4925r283056_chk
Review application server documentation to ensure the application server provides a PKI integration capability that implements a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. If the application server is not configured to meet this requirement, this is a finding.
Fix: F-4925r283057_fix
Configure the application server to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002009
- Version
- SRG-APP-000402-AS-000247
- Vuln IDs
-
- V-204806
- V-57515
- Rule IDs
-
- SV-204806r961527_rule
- SV-71791
Checks: C-4926r283059_chk
Review the application server documentation and configuration to determine if the application server accepts PIV credentials from other federal agencies to access the management interface. If the application server does not accept other federal agency PIV credentials to access the management interface, this is a finding.
Fix: F-4926r283060_fix
Configure the application server to accept PIV credentials from other federal agencies to access the management interface.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-002010
- Version
- SRG-APP-000403-AS-000248
- Vuln IDs
-
- V-204807
- V-57517
- Rule IDs
-
- SV-204807r961530_rule
- SV-71793
Checks: C-4927r283062_chk
The CAC is the standard DoD authentication token;the PIV is the standard authentication token used by federal/civilian agencies. If access to the application server is limited to DoD personnel accessing the system via CAC; and PIV access is not warranted or allowed as per the system security plan, the PIV requirement is NA. Review the application server documentation and configuration to determine if the application server electronically verifies PIV credentials from other federal agencies to access the management interface. If the application server does not electronically verify other federal agency PIV credentials to access the management interface, this is a finding.
Fix: F-4927r283063_fix
Configure the unclassified application server to electronically verify PIV credentials from other federal agencies before granting access to the management interface.
- RMF Control
- Severity
- M
- CCI
- CCI-004083
- Version
- SRG-APP-000404-AS-000249
- Vuln IDs
-
- V-204808
- V-57519
- Rule IDs
-
- SV-204808r981695_rule
- SV-71795
Checks: C-4928r283065_chk
Review the application server documentation and configuration to determine if the application server accepts FICAM-approved third-party credentials. If the application server does not accept FICAM-approved third-party credentials, this is a finding.
Fix: F-4928r283066_fix
Configure the application server to accept FICAM-approved third-party credentials.
- RMF Control
- Severity
- M
- CCI
- CCI-004085
- Version
- SRG-APP-000405-AS-000250
- Vuln IDs
-
- V-204809
- V-57521
- Rule IDs
-
- SV-204809r981696_rule
- SV-71797
Checks: C-4929r283068_chk
Review the application server documentation and configuration to determine if the application server conforms to FICAM-issued profiles. If the application server does not conform to FICAM-issued profiles, this is a finding.
Fix: F-4929r283069_fix
Configure the application server to conform to FICAM-issued profiles.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-APP-000427-AS-000264
- Vuln IDs
-
- V-204811
- V-57551
- Rule IDs
-
- SV-204811r961596_rule
- SV-71827
Checks: C-4931r283074_chk
Review the application server documentation and configuration to determine if the application server only allows the use of DoD PKI-established certificate authorities. If the application server allows other certificate authorities for verification, this is a finding.
Fix: F-4931r283075_fix
Configure the application server to allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-002475
- Version
- SRG-APP-000428-AS-000265
- Vuln IDs
-
- V-204812
- V-57557
- Rule IDs
-
- SV-204812r1067567_rule
- SV-71833
Checks: C-4932r283077_chk
Review application server documentation and configuration to determine if the application server implements cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components. If the application server does not implement cryptographic mechanisms to prevent unauthorized modification, this is a finding.
Fix: F-4932r283078_fix
Configure the application server to implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components.
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-002476
- Version
- SRG-APP-000429-AS-000157
- Vuln IDs
-
- V-204813
- V-57559
- Rule IDs
-
- SV-204813r1067568_rule
- SV-71835
Checks: C-4933r283080_chk
Review application server documentation and configuration to determine if the application server implements cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components. If the application server does not implement cryptographic mechanisms to prevent unauthorized disclosure, this is a finding.
Fix: F-4933r283081_fix
Configure the application server to implement cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-AS-000069
- Vuln IDs
-
- V-204814
- V-57531
- Rule IDs
-
- SV-204814r961620_rule
- SV-71807
Checks: C-4934r283083_chk
If the application server is not a MAC I system, this requirement is NA. Review the application server documentation and configuration to determine if the application server is part of an HA cluster. If the application server is not part of an HA cluster, this is a finding.
Fix: F-4934r283084_fix
If the application server is not a MAC I system, this requirement is NA. Configure the application server to be part of an HA cluster.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-AS-000163
- Vuln IDs
-
- V-204815
- V-57529
- Rule IDs
-
- SV-204815r961620_rule
- SV-71805
Checks: C-4935r283086_chk
Review application server documentation and configuration to determine if the application server can protect against or limit the effects of all types of Denial of Service (DoS) attacks by employing defined security safeguards. If the application server cannot be configured to protect against or limit the effects of all types of DoS, this is a finding.
Fix: F-4935r283087_fix
Configure the application server to protect against or limit the effects of all types of Denial of Service (DoS) attacks by employing defined security safeguards.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-APP-000439-AS-000155
- Vuln IDs
-
- V-204816
- V-57533
- Rule IDs
-
- SV-204816r961632_rule
- SV-71809
Checks: C-4936r283089_chk
Review the application server documentation and deployed configuration to determine which version of TLS is being used. If the application server is not using TLS to maintain the confidentiality and integrity of transmitted information or non-FIPS-approved SSL versions are enabled, this is a finding.
Fix: F-4936r283090_fix
Configure the application server to use a FIPS-2 approved TLS version to maintain the confidentiality and integrity of transmitted information and to disable all non-FIPS-approved SSL versions.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-APP-000439-AS-000274
- Vuln IDs
-
- V-204817
- V-61351
- Rule IDs
-
- SV-204817r961632_rule
- SV-75833
Checks: C-4937r283092_chk
Review the application server documentation and deployed configuration to determine if export ciphers are removed. If the application server does not have the export ciphers removed, this is a finding.
Fix: F-4937r283093_fix
Configure the application server to have export ciphers removed.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002421
- Version
- SRG-APP-000440-AS-000167
- Vuln IDs
-
- V-204818
- V-57535
- Rule IDs
-
- SV-204818r961635_rule
- SV-71811
Checks: C-4938r283095_chk
Review application server documentation and configuration to determine if the application server employs approved cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission. If the application server does not employ approved cryptographic mechanisms, this is a finding.
Fix: F-4938r283096_fix
Configure the application server to use AES 128 or AES 256 encryption for data in transit.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- SRG-APP-000441-AS-000258
- Vuln IDs
-
- V-204819
- V-57537
- Rule IDs
-
- SV-204819r961638_rule
- SV-71813
Checks: C-4939r283098_chk
Review the application server documentation and deployed configuration to determine if the application server maintains the confidentiality and integrity of information during preparation before transmission. If the confidentiality and integrity is not maintained, this is a finding.
Fix: F-4939r283099_fix
Configure the application server to maintain the confidentiality and integrity of information during preparation for transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- SRG-APP-000442-AS-000259
- Vuln IDs
-
- V-204820
- V-57539
- Rule IDs
-
- SV-204820r961641_rule
- SV-71815
Checks: C-4940r283101_chk
Review application server configuration to determine if the server is using a transmission method that maintains the confidentiality and integrity of information during reception. If a transmission method is not being used that maintains the confidentiality and integrity of the data during reception, this is a finding.
Fix: F-4940r283102_fix
Configure the application server to utilize a transmission method that maintains the confidentiality and integrity of information during reception.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-APP-000447-AS-000273
- Vuln IDs
-
- V-204821
- V-57565
- Rule IDs
-
- SV-204821r961656_rule
- SV-71841
Checks: C-4941r283104_chk
Review the application server configuration to determine if the management interface behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. If the application server does not meet this requirement, this is a finding.
Fix: F-4941r283105_fix
Configure the application server management interface to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- SRG-APP-000454-AS-000268
- Vuln IDs
-
- V-204822
- V-57563
- Rule IDs
-
- SV-204822r961677_rule
- SV-71839
Checks: C-4942r283107_chk
Review the application server documentation and configuration to determine if organization-defined software components are removed after updated versions have been installed. If organization-defined software components are not removed after updated versions have been installed, this is a finding.
Fix: F-4942r283108_fix
Configure the application server to remove organization-defined software components after updated versions have been installed.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-AS-000266
- Vuln IDs
-
- V-204823
- V-57561
- Rule IDs
-
- SV-204823r961683_rule
- SV-71837
Checks: C-4943r283110_chk
Review the application server documentation and configuration to determine if the application server checks with a patch management system to install security-relevant software updates within a timeframe directed by an authoritative source. If the application server does not install security-relevant patches within the time period directed by the authoritative source, this is a finding.
Fix: F-4943r283111_fix
Configure the application server to use a patch management system to ensure security-relevant updates are installed within the time period directed by the authoritative source.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-AS-000220
- Vuln IDs
-
- V-204824
- V-57439
- Rule IDs
-
- SV-204824r961800_rule
- SV-71711
Checks: C-4944r283113_chk
Review the application server documentation and the system configuration to determine if the application server generates log records when successful/unsuccessful attempts are made to modify privileges. If log records are not generated, this is a finding.
Fix: F-4944r283114_fix
Configure the application server to generate log records when privileges are successfully or unsuccessfully modified.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000499-AS-000224
- Vuln IDs
-
- V-204825
- V-57441
- Rule IDs
-
- SV-204825r961812_rule
- SV-71713
Checks: C-4945r283116_chk
Review the application server documentation and the system configuration to determine if the application server generates log records when successful and unsuccessful attempts are made to delete privileges. If log records are not generated, this is a finding.
Fix: F-4945r283117_fix
Configure the application server to generate log records when privileges are successfully or unsuccessfully deleted.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-AS-000228
- Vuln IDs
-
- V-204826
- V-57443
- Rule IDs
-
- SV-204826r961824_rule
- SV-71715
Checks: C-4946r283119_chk
Review product documentation and the system configuration to determine if the application server generates log records on successful and unsuccessful logon attempts by users. If logon attempts do not generate log records, this is a finding.
Fix: F-4946r283120_fix
Configure the application server to generate log records when successful/unsuccessful logon attempts are made by users.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-AS-000229
- Vuln IDs
-
- V-204827
- V-57445
- Rule IDs
-
- SV-204827r961827_rule
- SV-71717
Checks: C-4947r283122_chk
Review the application server documentation and the system configuration to determine if the application server generates log records for privileged activities. If log records are not generated for privileged activities, this is a finding.
Fix: F-4947r283123_fix
Configure the application server to generate log records for privileged activities.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000505-AS-000230
- Vuln IDs
-
- V-204828
- V-57481
- Rule IDs
-
- SV-204828r961830_rule
- SV-71757
Checks: C-4948r283125_chk
Review the application server documentation and the system configuration to determine if the application server generates log records showing starting and ending times for user access to the management interface. If log records are not generated showing starting and ending times of user access to the management interface, this is a finding.
Fix: F-4948r283126_fix
Configure the application server to generate log records showing starting and ending times of user access to the management interface.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000506-AS-000231
- Vuln IDs
-
- V-204829
- V-57483
- Rule IDs
-
- SV-204829r961833_rule
- SV-71759
Checks: C-4949r283128_chk
Review the application server documentation and the system configuration to determine if the application server generates log records showing concurrent logons from different workstations to the management interface. If concurrent logons from different workstations are not logged, this is a finding.
Fix: F-4949r283129_fix
Configure the application server to generate log records showing concurrent logons from different workstations to the management interface.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000509-AS-000234
- Vuln IDs
-
- V-204830
- V-57485
- Rule IDs
-
- SV-204830r961842_rule
- SV-71761
Checks: C-4950r283131_chk
Review the application server documentation and the system configuration to determine if the application server generates log records when accounts are created, modified, disabled, or terminated. If the application server does not generate log records for account creation, modification, disabling, and termination, this is a finding.
Fix: F-4950r283132_fix
Configure the application server to generate log records when accounts are created, modified, disabled, or terminated.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-AS-000136
- Vuln IDs
-
- V-204831
- V-57543
- Rule IDs
-
- SV-204831r961857_rule
- SV-71819
Checks: C-4951r283134_chk
Review application server configuration and the NIST FIPS certificate to validate the application server uses NIST-approved or NSA-approved key management technology and processes when producing, controlling or distributing symmetric and asymmetric keys. If the application server does not use this NIST-approved or NSA-approved key management technology and processes, this is a finding.
Fix: F-4951r283135_fix
Configure the application server to utilize NIST-approved or NSA-approved key management technology when the application server produces, controls, and distributes symmetric and asymmetric cryptographic keys.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-AS-000137
- Vuln IDs
-
- V-204832
- V-57545
- Rule IDs
-
- SV-204832r961857_rule
- SV-71821
Checks: C-4952r283137_chk
Review the application server configuration to determine if the application server utilizes approved PKI Class 3 or Class 4 certificates. If the application server is not configured to use approved DoD or CNS certificates, this is a finding.
Fix: F-4952r283138_fix
Configure the application server to use DoD- or CNSS-approved Class 3 or Class 4 PKI certificates.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000515-AS-000203
- Vuln IDs
-
- V-204833
- V-57425
- Rule IDs
-
- SV-204833r961860_rule
- SV-71697
Checks: C-4953r283140_chk
Verify the log records are being off-loaded, at a minimum of real time for interconnected systems and weekly for standalone systems. If the application server is not meeting these requirements, this is a finding.
Fix: F-4953r283141_fix
Configure the application server to off-load interconnected systems in real time and standalone systems weekly.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AS-000237
- Vuln IDs
-
- V-204834
- V-57499
- Rule IDs
-
- SV-204834r961863_rule
- SV-71775
Checks: C-4954r283143_chk
Review the application server documentation and configuration to determine if the application server is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If the application server is not configured in accordance with security configuration settings, this is a finding.
Fix: F-4954r283144_fix
Configure the application server to be in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000416-AS-000140
- Vuln IDs
-
- V-240925
- V-57541
- Rule IDs
-
- SV-240925r962034_rule
- SV-71817
Checks: C-44158r675811_chk
Review application server documentation to verify that the application server is using NSA-approved cryptography to protect classified data and applications resident on the device. If the application server is not using NSA-approved cryptography for classified data and applications, this is a finding.
Fix: F-44117r675812_fix
Configure the application server to utilize NSA-approved cryptography to protect classified information.
- RMF Control
- Severity
- M
- CCI
- CCI-003628
- Version
- SRG-APP-000705-AS-000110
- Vuln IDs
-
- V-263549
- Rule IDs
-
- SV-263549r981699_rule
Checks: C-67449r981697_chk
Verify the application server disables accounts when the accounts are no longer associated to a user. If the application server does not disable accounts when the accounts are no longer associated to a user, this is a finding.
Fix: F-67357r981698_fix
Configure the application server to disable accounts when the accounts are no longer associated to a user.
- RMF Control
- Severity
- M
- CCI
- CCI-003831
- Version
- SRG-APP-000795-AS-000130
- Vuln IDs
-
- V-263550
- Rule IDs
-
- SV-263550r981702_rule
Checks: C-67450r981700_chk
Verify the application server alerts organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information. If the application server does not alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information, this is a finding.
Fix: F-67358r981701_fix
Configure the application server to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- SRG-APP-000820-AS-000170
- Vuln IDs
-
- V-263551
- Rule IDs
-
- SV-263551r981705_rule
Checks: C-67451r981703_chk
Verify the application server implements multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the application server does not implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-67359r981704_fix
Configure the application server to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- Severity
- M
- CCI
- CCI-004047
- Version
- SRG-APP-000825-AS-000180
- Vuln IDs
-
- V-263552
- Rule IDs
-
- SV-263552r981708_rule
Checks: C-67452r981706_chk
Verify the application server implements multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements. If the application server does not implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements, this is a finding.
Fix: F-67360r981707_fix
Configure the application server to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
- RMF Control
- Severity
- M
- CCI
- CCI-004192
- Version
- SRG-APP-000880-AS-000290
- Vuln IDs
-
- V-263553
- Rule IDs
-
- SV-263553r981711_rule
Checks: C-67453r981709_chk
Verify the application server protects nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths. If the application server does not protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths, this is a finding.
Fix: F-67361r981710_fix
Configure the application server to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.
- RMF Control
- Severity
- M
- CCI
- CCI-004909
- Version
- SRG-APP-000910-AS-000300
- Vuln IDs
-
- V-263554
- Rule IDs
-
- SV-263554r981714_rule
Checks: C-67454r981712_chk
Verify the application server includes only approved trust anchors in trust stores or certificate stores managed by the organization. If the application server does not include only approved trust anchors in trust stores or certificate stores managed by the organization, this is a finding.
Fix: F-67362r981713_fix
Configure the application server to include only approved trust anchors in trust stores or certificate stores managed by the organization.
- RMF Control
- Severity
- M
- CCI
- CCI-004910
- Version
- SRG-APP-000915-AS-000310
- Vuln IDs
-
- V-263555
- Rule IDs
-
- SV-263555r981717_rule
Checks: C-67455r981715_chk
Verify the application server provides protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store. If the application server does not provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store, this is a finding.
Fix: F-67363r981716_fix
Configure the application server to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- RMF Control
- Severity
- M
- CCI
- CCI-004922
- Version
- SRG-APP-000920-AS-000320
- Vuln IDs
-
- V-263556
- Rule IDs
-
- SV-263556r981720_rule
Checks: C-67456r981718_chk
Verify the application server synchronizes system clocks within and between systems or system components. If the application server does not synchronize system clocks within and between systems or system components, this is a finding.
Fix: F-67364r981719_fix
Configure the application server to synchronize system clocks within and between systems or system components.