JBoss EAP 6.3 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 1
Comparison against the immediately-prior release (V1R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 1
- V-62309 Medium fix The JBoss server must be configured to utilize syslog logging.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- JBOS-AS-000010
- Vuln IDs
-
- V-62073
- Rule IDs
-
- SV-76563r1_rule
Checks: C-62877r2_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. For a standalone configuration run the following command: "ls /core-service=management/management-interface=http-interface" If "secure-socket-binding"=undefined, this is a finding. For a domain configuration run the following command: "ls /host=master/core-service=management/management-interface=http-interface" If "secure-port" is undefined, this is a finding.
Fix: F-67993r1_fix
Follow the specific instructions in the Red Hat Security Guide for EAP version 6.3 to configure the management console for HTTPS. This involves the following steps. 1. Create a keystore in JKS format. 2. Ensure the management console binds to HTTPS. 3. Create a new Security Realm. 4. Configure Management Interface to use new security realm. 5. Configure the management console to use the keystore. 6. Restart the EAP server.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- JBOS-AS-000015
- Vuln IDs
-
- V-62215
- Rule IDs
-
- SV-76705r1_rule
Checks: C-63019r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Review the web subsystem and ensure that HTTPS is enabled. Run the command: For a managed domain: "ls /profile=<PROFILE_NAME>/subsystem=web/connector=" For a standalone system: "ls /subsystem=web/connector=" If "https" is not returned, this is a finding.
Fix: F-68135r1_fix
Follow procedure "4.4. Configure the JBoss Web Server to use HTTPS." The detailed procedure is found in the JBoss EAP 6.3 Security Guide available at the vendor's site, RedHat.com. An overview of steps is provided here. 1. Obtain or generate DoD-approved SSL certificates. 2. Configure the SSL certificate using your certificate values. 3. Set the SSL protocol to TLS V1.1 or V1.2.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- JBOS-AS-000025
- Vuln IDs
-
- V-62217
- Rule IDs
-
- SV-76707r1_rule
Checks: C-63021r1_chk
Obtain documentation from the admin that identifies the applications hosted on the JBoss server as well as the corresponding rights the application requires. For example, if the application requires network socket permissions and file write permissions, those requirements should be documented. 1. Identify the JBoss installation as either domain or standalone and review the relevant configuration file. For domain installs: JBOSS_HOME/bin/domain.conf For standalone installs: JBOSS_HOME/bin/standalone.conf 2. Identify the location and name of the security policy by reading the JAVA_OPTS flag -Djava.security.policy=<file name> where <file name> will indicate name and location of security policy. If the application uses a policy URL, obtain URL and policy file from system admin. 3. Review security policy and ensure hosted applications have the appropriate restrictions placed on them as per documented application functionality requirements. If the security policy does not restrict application access to host resources as per documented requirements, this is a finding.
Fix: F-68137r1_fix
Configure the Java security manager to enforce access restrictions to the host system resources in accordance with application design and resource requirements.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- JBOS-AS-000040
- Vuln IDs
-
- V-62219
- Rule IDs
-
- SV-76709r1_rule
Checks: C-63023r1_chk
Review the mgmt-users.properties file. Also review the <management /> section in the standalone.xml or domain.xml configuration files. The relevant xml file will depend on if the JBoss server is configured in standalone or domain mode. Ensure all users listed in these files are approved for management access to the JBoss server and are in the appropriate role. For domain configurations: <JBOSS_HOME>/domain/configuration/mgmt-users.properties. <JBOSS_HOME>/domain/configuration/domain.xml For standalone configurations: <JBOSS_HOME>/standalone/configuration/mgmt-users.properties. <JBOSS_HOME>/standalone/configuration/standalone.xml If the users listed are not in the appropriate role, this is a finding.
Fix: F-68139r1_fix
Document approved management users and their roles. Configure the application server to use RBAC and ensure users are placed into the appropriate roles.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- JBOS-AS-000045
- Vuln IDs
-
- V-62221
- Rule IDs
-
- SV-76711r1_rule
Checks: C-63025r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Verify that Silent Authentication has been removed from the default Application security realm. Run the following command. For standalone servers, run the following command: "ls /core-service=management/securityrealm=ApplicationRealm/authentication" For managed domain installations, run the following command: "ls /host=HOST_NAME/core-service=management/securityrealm=ApplicationRealm/authentication" If "local" is returned, this is a finding.
Fix: F-68141r1_fix
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Remove the local element from the Application Realm. For standalone servers, run the following command: /core-service=management/securityrealm= ApplicationRealm/authentication=local:remove For managed domain installations, run the following command: /host=HOST_NAME/core-service=management/securityrealm= ApplicationRealm/authentication=local:remove
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- JBOS-AS-000050
- Vuln IDs
-
- V-62223
- Rule IDs
-
- SV-76713r1_rule
Checks: C-63027r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Verify that Silent Authentication has been removed from the default Management security realm. Run the following command. For standalone servers run the following command: "ls /core-service=management/securityrealm=ManagementRealm/authentication" For managed domain installations run the following command: "ls /host=HOST_NAME/core-service=management/securityrealm=ManagementRealm/authentication" If "local" is returned, this is a finding.
Fix: F-68143r1_fix
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Remove the local element from the Management Realm. For standalone servers run the following command: /core-service=management/securityrealm= ManagementRealm/authentication=local:remove For managed domain installations run the following command: /host=HOST_NAME/core-service=management/securityrealm= ManagementRealm/authentication=local:remove
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- JBOS-AS-000030
- Vuln IDs
-
- V-62225
- Rule IDs
-
- SV-76715r1_rule
Checks: C-63029r1_chk
To determine if the Java Security Manager is enabled for JBoss, you must examine the startup commands. JBoss can be configured to run in either "domain" or a "standalone" mode. JBOSS_HOME is the variable home directory for the JBoss installation. Use relevant OS commands to navigate the file system. A. For a managed domain installation, review the domain.conf and domain.conf.bat files: JBOSS_HOME/bin/domain.conf JBOSS_HOME/bin/domain.conf.bat In domain.conf file, ensure there is a JAVA_OPTS flag that loads the Java Security Manager as well as a relevant Java Security policy. The following is an example: JAVA_OPTS="$JAVA_OPTS -Djava.security.manager -Djava.security.policy==$PWD/server.policy -Djboss.home.dir=/path/to/JBOSS_HOME -Djboss.modules.policy-permissions=true" In domain.conf.bat file, ensure JAVA_OPTS flag is set. The following is an example: set "JAVA_OPTS=%JAVA_OPTS% -Djava.security.manager -Djava.security.policy==/path/to/server.policy -Djboss.home.dir=/path/to/JBOSS_HOME -Djboss.modules.policy-permissions=true" B. For a standalone installation, review the standalone.conf and standalone.conf.bat files: JBOSS_HOME/bin/standalone.conf JBOSS_HOME/bin/standalone.conf.bat In the standalone.conf file, ensure the JAVA_OPTS flag is set. The following is an example: JAVA_OPTS="$JAVA_OPTS -Djava.security.manager -Djava.security.policy==$PWD/server.policy -Djboss.home.dir=$JBOSS_HOME -Djboss.modules.policy-permissions=true" In the standalone.conf.bat file, ensure the JAVA_OPTS flag is set. The following is an example: set "JAVA_OPTS=%JAVA_OPTS% -Djava.security.manager -Djava.security.policy==/path/to/server.policy -Djboss.home.dir=%JBOSS_HOME% -Djboss.modules.policy-permissions=true" If the security manager is not enabled and a security policy not defined, this is a finding.
Fix: F-68145r1_fix
For a domain installation: Enable the respective JAVA_OPTS flag in both the domain.conf and the domain.conf.bat files. For a standalone installation: Enable the respective JAVA_OPTS flag in both the standalone.conf and the standalone.conf.bat files.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- JBOS-AS-000035
- Vuln IDs
-
- V-62227
- Rule IDs
-
- SV-76717r1_rule
Checks: C-63031r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Run the following command: For standalone servers: "ls /core-service=management/access=authorization/" For managed domain installations: "ls /host=master/core-service=management/access=authorization/" If the "provider" attribute is not set to "rbac", this is a finding.
Fix: F-68147r1_fix
Run the following command. <JBOSS_HOME>/bin/jboss-cli.sh -c -> connect -> cd /core-service=management/access-authorization :write-attribute(name=provider, value=rbac) Restart JBoss. Map users to roles by running the following command. Upper-case words are variables. role-mapping=ROLENAME/include=ALIAS:add(name-USERNAME, type=USER ROLE)
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- JBOS-AS-000075
- Vuln IDs
-
- V-62229
- Rule IDs
-
- SV-76719r1_rule
Checks: C-63033r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Identify the management interfaces. To identity the management interfaces, run the following command: For standalone servers: "ls /core-service=management/management-interface=" For managed domain installations: "ls /host=HOST_NAME/core-service=management/management-interface=" By default, JBoss provides two management interfaces; they are named "NATIVE-INTERFACE" and "HTTP-INTERFACE". The system may or may not have both interfaces enabled. For each management interface listed as a result of the previous command, append the name of the management interface to the end of the following command. For a standalone system: "ls /core-service=management/management-interface=<MANAGEMENT INTERFACE NAME>" For a managed domain: "ls /host=HOST_NAME/core-service=management/management-interface=<MANAGEMENT INTERFACE NAME>" If the "security-realm=" attribute is not associated with a management realm, this is a finding.
Fix: F-68149r1_fix
Identify the security realm used for management of the system. By default, this is called "Management Realm". If a management security realm is not already available, reference the Jboss EAP 6.3 system administration guide for instructions on how to create a security realm for management purposes. Create the management realm, and assign authentication and authorization access restrictions to the management realm. Assign the management interfaces to the management realm.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- JBOS-AS-000080
- Vuln IDs
-
- V-62231
- Rule IDs
-
- SV-76721r1_rule
Checks: C-63035r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68151r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role, and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- JBOS-AS-000085
- Vuln IDs
-
- V-62233
- Rule IDs
-
- SV-76723r1_rule
Checks: C-63037r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=authorization/role-mapping=Auditor/include=" For a Standalone configuration: "ls /core-service=management/access=authorization/role-mapping=Auditor/include=" If the list of users in the Auditors group is not approved by the ISSM, this is a finding.
Fix: F-68153r1_fix
Obtain documented approvals from ISSM, and assign the appropriate personnel into the "Auditor" role.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- JBOS-AS-000095
- Vuln IDs
-
- V-62235
- Rule IDs
-
- SV-76725r1_rule
Checks: C-63039r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68155r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- JBOS-AS-000105
- Vuln IDs
-
- V-62237
- Rule IDs
-
- SV-76727r1_rule
Checks: C-63041r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68157r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role, and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- JBOS-AS-000110
- Vuln IDs
-
- V-62239
- Rule IDs
-
- SV-76729r1_rule
Checks: C-63043r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68159r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role, and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- JBOS-AS-000115
- Vuln IDs
-
- V-62241
- Rule IDs
-
- SV-76731r1_rule
Checks: C-63045r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68161r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role, and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- JBOS-AS-000120
- Vuln IDs
-
- V-62243
- Rule IDs
-
- SV-76733r1_rule
Checks: C-63047r1_chk
Application logs are a configurable variable. Interview the system admin, and have them identify the applications that are running on the application server. Have the system admin identify the log files/location where application activity is stored. Review the log files to ensure each application is uniquely identified within the logs or each application has its own unique log file. Generate application activity by either authenticating to the application or generating an auditable event, and ensure the application activity is recorded in the log file. Recently time stamped application events are suitable evidence of compliance. If the log records do not indicate which application hosted on the application server generated the event, or if no events are recorded related to application activity, this is a finding.
Fix: F-68163r1_fix
Configure log formatter to audit application activity so individual application activity can be identified.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- JBOS-AS-000125
- Vuln IDs
-
- V-62245
- Rule IDs
-
- SV-76735r1_rule
Checks: C-63049r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68165r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role, and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- JBOS-AS-000130
- Vuln IDs
-
- V-62247
- Rule IDs
-
- SV-76737r1_rule
Checks: C-63051r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68167r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role, and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- JBOS-AS-000135
- Vuln IDs
-
- V-62249
- Rule IDs
-
- SV-76739r1_rule
Checks: C-63053r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. The PROFILE NAMEs included with a Managed Domain JBoss configuration are: "default", "full", "full-ha" or "ha" For a Managed Domain configuration, you must check each profile name: For each PROFILE NAME, run the command: "ls /profile=<PROFILE NAME>/subsystem=logging/root-logger=ROOT" If ROOT logger "level" is not set to INFO, DEBUG or TRACE This is a finding for each <PROFILE NAME> (default, full, full-ha and ha) For a Standalone configuration: "ls /subsystem=logging/root-logger=ROOT" If "level" not = INFO, DEBUG or TRACE, this is a finding.
Fix: F-68169r1_fix
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. The PROFILE NAMEs included with a Managed Domain JBoss configuration are: "default", "full", "full-ha" or "ha" For a Managed Domain configuration, you must check each profile name: For each PROFILE NAME, run the command: "/profile=<PROFILE NAME>/subsystem=logging/root-logger=ROOT:write-attribute(name=level,value=INFO)" For a Standalone configuration: "/subsystem=logging/root-logger=ROOT:write-attribute(name=level,value=INFO)"
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- JBOS-AS-000165
- Vuln IDs
-
- V-62251
- Rule IDs
-
- SV-76741r1_rule
Checks: C-63055r1_chk
Examine the log file locations and inspect the file permissions. Interview the system admin to determine log file locations. The default location for the log files is: Standalone configuration: <JBOSS_HOME>/standalone/log/ Managed Domain configuration: <JBOSS_HOME>/domain/servers/<servername>/log/ <JBOSS_HOME>/domain/log/ Review the file permissions for the log file directories. The method used for identifying file permissions will be based upon the OS the EAP server is installed on. Identify all users with file permissions that allow them to read log files. Request documentation from system admin that identifies the users who are authorized to read log files. If unauthorized users are allowed to read log files, or if documentation that identifies the users who are authorized to read log files is missing, this is a finding.
Fix: F-68171r1_fix
Configure the OS file permissions on the application server to protect log information from unauthorized read access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- JBOS-AS-000170
- Vuln IDs
-
- V-62253
- Rule IDs
-
- SV-76743r1_rule
Checks: C-63057r1_chk
Examine the log file locations and inspect the file permissions. Interview the system admin to determine log file locations. The default location for the log files is: Standalone configuration: <JBOSS_HOME>/standalone/log/ Managed Domain configuration: <JBOSS_HOME>/domain/servers/<servername>/log/ <JBOSS_HOME>/domain/log/ Review the file permissions for the log file directories. The method used for identifying file permissions will be based upon the OS the EAP server is installed on. Identify all users with file permissions that allow them to modify log files. Request documentation from system admin that identifies the users who are authorized to modify log files. If unauthorized users are allowed to modify log files, or if documentation that identifies the users who are authorized to modify log files is missing, this is a finding.
Fix: F-68173r1_fix
Configure the OS file permissions on the application server to protect log information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- JBOS-AS-000175
- Vuln IDs
-
- V-62255
- Rule IDs
-
- SV-76745r1_rule
Checks: C-63059r1_chk
Examine the log file locations and inspect the file permissions. Interview the system admin to determine log file locations. The default location for the log files is: Standalone configuration: <JBOSS_HOME>/standalone/log/ Managed Domain configuration: <JBOSS_HOME>/domain/servers/<servername>/log/ <JBOSS_HOME>/domain/log/ Review the file permissions for the log file directories. The method used for identifying file permissions will be based upon the OS the EAP server is installed on. Identify all users with file permissions that allow them to delete log files. Request documentation from system admin that identifies the users who are authorized to delete log files. If unauthorized users are allowed to delete log files, or if documentation that identifies the users who are authorized to delete log files is missing, this is a finding.
Fix: F-68175r1_fix
Configure the OS file permissions on the application server to protect log information from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- JBOS-AS-000195
- Vuln IDs
-
- V-62257
- Rule IDs
-
- SV-76747r1_rule
Checks: C-63061r1_chk
Interview the system admin and obtain details on how the log files are being off-loaded to a different system or media. If the log files are not off-loaded a minimum of every 7 days, this is a finding.
Fix: F-68177r1_fix
Configure the application server to off-load log records every seven days onto a different system or media from the system being logged.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- JBOS-AS-000210
- Vuln IDs
-
- V-62259
- Rule IDs
-
- SV-76749r1_rule
Checks: C-63063r1_chk
The mgmt-users.properties files are located in the standalone or domain configuration folder. <JBOSS_HOME>/domain/configuration/mgmt-users.properties. <JBOSS_HOME>/standalone/configuration/mgmt-users.properties. Identify users who have access to the files using relevant OS commands. Obtain documentation from system admin identifying authorized users. Owner can be full access. Group can be full access. All others must have execute permissions only. If the file permissions are not configured so as to restrict access to only authorized users, or if documentation that identifies authorized users is missing, this is a finding.
Fix: F-68179r1_fix
Configure the file permissions to allow access to authorized users only. Owner can be full access. Group can be full access. All others must have execute permissions only.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- JBOS-AS-000220
- Vuln IDs
-
- V-62261
- Rule IDs
-
- SV-76751r1_rule
Checks: C-63065r1_chk
Identify the user account used to run the JBoss server. Use relevant OS commands to determine logon rights to the system. This account should not have full shell/interactive access to the system. If the user account used to operate JBoss can log on interactively, this is a finding.
Fix: F-68181r1_fix
Use the relevant OS commands to restrict JBoss user account from interactively logging on to the console of the JBoss system. For Windows systems, use GPO. For UNIX like systems using ssh DenyUsers <account id> or follow established procedure for restricting access.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- JBOS-AS-000225
- Vuln IDs
-
- V-62263
- Rule IDs
-
- SV-76753r1_rule
Checks: C-63067r1_chk
Open the EAP web console by pointing a web browser to HTTPS://<SERVERNAME>:9443 or HTTP://<SERVERNAME>:9990 Log on to the admin console using admin credentials. On the bottom right-hand side of the screen, select "Settings". If the "Enable Data Usage Collection" box is checked, this is a finding.
Fix: F-68183r1_fix
Using the EAP web console, log on using admin credentials. On the bottom right-hand side of the screen, select "Settings", uncheck the "Enable Data Usage Collection" box, and save the configuration.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- JBOS-AS-000230
- Vuln IDs
-
- V-62265
- Rule IDs
-
- SV-76755r1_rule
Checks: C-63069r1_chk
The script that is used to start JBoss determines the mode in which JBoss will operate, which will be in either in standalone mode or domain mode. Both scripts are installed by default in the <JBOSS_HOME>/bin/ folder. In addition to running the JBoss server as an interactive script launched from the command line, JBoss can also be started as a service. The scripts used to start JBoss are: Red Hat: standalone.sh domain.sh Windows: standalone.bat domain.bat Use the relevant OS commands to determine JBoss ownership. When running as a process: Red Hat: "ps -ef|grep -i jboss". Windows: "services.msc". Search for the JBoss process, which by default is named "JBOSSEAP6". If the user account used to launch the JBoss script or start the JBoss process has admin rights on the system, this is a finding.
Fix: F-68185r1_fix
Run the JBoss server with non-admin rights.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- JBOS-AS-000235
- Vuln IDs
-
- V-62267
- Rule IDs
-
- SV-76757r1_rule
Checks: C-63071r1_chk
Examine the <JBOSS_HOME> folder. If a jboss-eap-6.3.0-GA-quickstarts folder exits, this is a finding.
Fix: F-68187r1_fix
Delete the QuickStarts folder.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- JBOS-AS-000240
- Vuln IDs
-
- V-62269
- Rule IDs
-
- SV-76759r1_rule
Checks: C-63073r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. For a Managed Domain configuration, you must check each profile name: For each PROFILE NAME, run the command: "ls /profile=<PROFILE NAME>/subsystem=jmx/remoting-connector" For a Standalone configuration: "ls /subsystem=jmx/remoting-connector" If "jmx" is returned, this is a finding.
Fix: F-68189r1_fix
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. For a Managed Domain configuration you must check each profile name: For each PROFILE NAME, run the command: "/profile=<PROFILE NAME>/subsystem=jmx/remoting-connector=jmx:remove" For a Standalone configuration: "/subsystem=jmx/remoting-connector=jmx:remove"
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- JBOS-AS-000245
- Vuln IDs
-
- V-62271
- Rule IDs
-
- SV-76761r1_rule
Checks: C-63075r1_chk
Use a web browser and browse to HTTP://JBOSS SERVER IP ADDRESS:8080 If the JBoss Welcome page is displayed, this is a finding.
Fix: F-68191r1_fix
Use the Management CLI script JBOSS_HOME/bin/jboss-cli.sh to run the following command. You may need to change the profile to modify a different managed domain profile, or remove the "/profile=default" portion of the command for a standalone server. "/profile=default/subsystem=web/virtual-server=default-host:writeattribute(name=enable-welcome-root,value=false)" To configure your web application to use the root context (/) as its URL address, modify the applications jboss-web.xml, which is located in the applications META-INF/ or WEB-INF/ directory. Replace its <context-root> directive with one that looks like the following: <jboss-web> <context-root>/</context-root> </jboss-web>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- JBOS-AS-000250
- Vuln IDs
-
- V-62273
- Rule IDs
-
- SV-76763r1_rule
Checks: C-63077r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Run the command: ls /deployment The list of deployed applications is displayed. Have the system admin identify the applications listed and confirm they are approved applications. If the system admin cannot provide documentation proving their authorization for deployed applications, this is a finding.
Fix: F-68193r1_fix
Identify, authorize, and document all applications that are deployed to the application server. Remove unauthorized applications.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- JBOS-AS-000255
- Vuln IDs
-
- V-62275
- Rule IDs
-
- SV-76765r1_rule
Checks: C-63079r1_chk
Open the EAP web console by pointing a web browser to HTTPS://<Servername>:9443 or HTTP://<Servername>:9990 Log on to the admin console using admin credentials Select the "Configuration" tab Expand the "General Configuration" sub system by clicking on the + Select "Socket Binding" Select the "View" option next to "standard-sockets" Select "Inbound" Review the configured ports and determine if they are all approved by the PPSM CAL. If all the ports are not approved by the PPSM CAL, this is a finding.
Fix: F-68195r1_fix
Open the EAP web console by pointing a web browser to HTTPS://<Servername>:9990 Log on to the admin console using admin credentials Select the "Configuration" tab Expand the "General Configuration" sub system by clicking on the + Select "Socket Binding" Select the "View" option next to "standard-sockets" Select "Inbound" Select the port that needs to be reconfigured and select "Edit".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- JBOS-AS-000260
- Vuln IDs
-
- V-62277
- Rule IDs
-
- SV-76767r1_rule
Checks: C-63081r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. To obtain the list of security realms run the command: "ls /core-service=management/security-realm=" Review each security realm using the command: "ls /core-service=management/security-realm=<SECURITY_REALM_NAME>/authentication" If this command does not return a security realm that uses LDAP for authentication, this is a finding.
Fix: F-68197r1_fix
Follow steps in section 11.8 - Management Interface Security in the JBoss_Enterprise_Application_Platform-6.3-Administration_and_Configuration_Guide-en-US document. 1. Create an outbound connection to the LDAP server. 2. Create an LDAP-enabled security realm. 3. Reference the new security domain in the Management Interface.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- JBOS-AS-000265
- Vuln IDs
-
- V-62279
- Rule IDs
-
- SV-76769r1_rule
Checks: C-63083r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Follow these steps: 1. Identify the security realm assigned to the management interfaces by using the following command: For standalone systems: "ls /core-service=management/management-interface=<INTERFACE-NAME>" For managed domain systems: "ls /host=master/core-service=management/management-interface=<INTERFACE-NAME>" Document the name of the security-realm associated with each management interface. 2. Review the security realm using the command: For standalone systems: "ls /core-service=management/security-realm=<SECURITY_REALM_NAME>/authentication" For managed domains: "ls /host=master/core-service=management/security-realm=<SECURITY_REALM_NAME>/authentication" If the command in step 2 does not return a security realm that uses certificates for authentication, this is a finding.
Fix: F-68199r1_fix
Configure the application server to authenticate privileged users via multifactor/certificate-based authentication mechanisms when using network access to the management interface.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- JBOS-AS-000275
- Vuln IDs
-
- V-62281
- Rule IDs
-
- SV-76771r1_rule
Checks: C-63085r1_chk
If the application server management interface is configured to use LDAP authentication this requirement is NA. Determine the mode in which the JBoss server is operating by authenticating to the OS, changing to the <JBOSS_HOME>/bin/ folder and executing the jboss-cli script. Connect to the server and authenticate. Run the command: "ls" and examine the "launch-type" setting. User account information is stored in the following files for a JBoss server configured in standalone mode. The command line flags passed to the "standalone" startup script determine the standalone operating mode: <JBOSS_HOME>/standalone/configuration/standalone.xml <JBOSS_HOME>/standalone/configuration/standalone-full.xml <JBOSS_HOME>/standalone/configuration/standalone.-full-ha.xml <JBOSS_HOME>/standalone/configuration/standalone.ha.xml For a Managed Domain: <JBOSS_HOME>/domain/configuration/domain.xml. Review both files for generic or shared user accounts. Open each xml file with a text editor and locate the <management-interfaces> section. Review the <user name = "xxxxx"> sub-section where "xxxxx" will be a user name. Have the system administrator identify the user of each user account. If user accounts are not assigned to individual users, this is a finding.
Fix: F-68201r1_fix
Configure the application server so required users are individually authenticated by creating individual user accounts. Utilize an LDAP server that is configured according to DOD policy.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- JBOS-AS-000285
- Vuln IDs
-
- V-62283
- Rule IDs
-
- SV-76773r1_rule
Checks: C-63087r1_chk
Obtain documentation and network drawings from system admin that shows the network interfaces on the JBoss server and the networks they are configured for. If a management network is not used, you may substitute localhost/127.0.0.1 for management address. If localhost/127.0.0.1 is used for management interface, this is not a finding. From the JBoss server open the web-based admin console by pointing a browser to HTTP://127.0.0.1:9990. Log on to the management console with admin credentials. Select "RUNTIME". Expand STATUS by clicking on +. Expand PLATFORM by clicking on +. In the "Environment" tab, click the > arrow until you see the "jboss.bind.properties" and the "jboss.bind.properties.management" values. If the jboss.bind.properties and the jboss.bind.properties.management do not have different IP network addresses assigned, this is a finding. Review the network documentation. If access to the management IP address is not restricted, this is a finding.
Fix: F-68203r1_fix
Refer to Section 4.9 of the JBoss EAP 6.3 Installation guide for detailed instructions on how to start JBoss as a service. Use the following command line parameters to assign the management interface to a specific management network. These command line flags must be added both when starting JBoss as a service and when starting from the command line. Substitute your actual network address for the 10.x.x.x addresses provided as an example below. For a standalone configuration: JBOSS_HOME/bin/standalone.sh -bmanagement=10.2.2.1 -b 10.1.1.1 JBOSS_HOME/bin/domain.sh -bmanagement=10.2.2.1 -b 10.1.1.1 If a management network is not available, you may substitute localhost/127.0.0.1 for management address. This will force you to manage the JBoss server from the local host.
- RMF Control
- IA-4
- Severity
- M
- CCI
- CCI-000795
- Version
- JBOS-AS-000290
- Vuln IDs
-
- V-62285
- Rule IDs
-
- SV-76775r1_rule
Checks: C-63089r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Obtain the list of management interfaces by running the command: "ls /core-service=management/management-interface" Identify the security realm used by each management interface configuration by running the command: "ls /core-service=management/management-interface=<MANAGEMENT-INTERFACE-NAME>" Determine if the security realm assigned to the management interface uses LDAP for authentication by running the command: "ls /core-service=management/security-realm=<SECURITY_REALM_NAME>/authentication" If the security realm assigned to the management interface does not utilize LDAP for authentication, this is a finding.
Fix: F-68205r1_fix
Follow steps in section 11.8 - Management Interface Security in the JBoss_Enterprise_Application_Platform-6.3-Administration_and_Configuration_Guide-en-US document. 1. Create an outbound connection to the LDAP server. 2. Create an LDAP-enabled security realm. 3. Reference the new security domain in the Management Interface.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- JBOS-AS-000295
- Vuln IDs
-
- V-62287
- Rule IDs
-
- SV-76777r1_rule
Checks: C-63091r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Run the command: "ls /core-service=vault" If "code=undefined" and "module=undefined", this is a finding.
Fix: F-68207r1_fix
Configure the application server to use the java keystore and JBoss vault as per section 11.13.1 -Password Vault System in the JBoss_Enterprise_Application_Platform-6.3-Administration_and_Configuration_Guide-en-US document. 1. Create a java keystore. 2. Mask the keystore password and initialize the password vault. 3. Configure JBoss to use the password vault.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- JBOS-AS-000300
- Vuln IDs
-
- V-62289
- Rule IDs
-
- SV-76779r1_rule
Checks: C-63093r1_chk
The default location for the keystore used by the JBoss vault is the <JBOSS_HOME>/vault/ folder. If a vault keystore has been created, by default it will be in the file: <JBOSS_HOME>/vault/vault.keystore. The file stores a single key, with the default alias vault, which will be used to store encrypted strings, such as passwords, for JBoss EAP. Have the system admin provide the procedure used to encrypt the keystore password that unlocks the keystore. If the system administrator is unable to demonstrate or provide written process documentation on how to encrypt the keystore password, this is a finding.
Fix: F-68209r1_fix
Configure the application server to mask the java keystore password as per the procedure described in section 11.13.3 -Password Vault System in the JBoss_Enterprise_Application_Platform-6.3-Administration_and_Configuration_Guide-en-US document.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- JBOS-AS-000305
- Vuln IDs
-
- V-62291
- Rule IDs
-
- SV-76781r1_rule
Checks: C-63095r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Run the command: "ls /core-service=management/security-realm=ldap_security_realm/authentication=ldap" If "allow-empty-passwords=true", this is a finding.
Fix: F-68211r1_fix
Configure the LDAP Security Realm using default settings that sets "allow-empty-values" to false. LDAP Security Realm creation is described in section 11.9 -Add an LDAP Security Realm in the JBoss_Enterprise_Application_Platform-6.3-Administration_and_Configuration_Guide-en-US document.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- JBOS-AS-000310
- Vuln IDs
-
- V-62293
- Rule IDs
-
- SV-76783r1_rule
Checks: C-63097r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Run the following command: For standalone servers: "ls /socket-binding-group=standard-sockets/remote-destination-outbound-socket-binding=ldap_connection" For managed domain installations: "ls /socket-binding-group=<PROFILE>/remote-destination-outbound-socket-binding=" The default port for secure LDAP is 636. If 636 or secure LDAP protocol is not utilized, this is a finding.
Fix: F-68213r1_fix
Follow steps in section 11.8 - Management Interface Security in the JBoss_Enterprise_Application_Platform-6.3-Administration_and_Configuration_Guide-en-US document. 1. Create an outbound connection to the LDAP server. 2. Create an LDAP-enabled security realm. 3. Reference the new security domain in the Management Interface.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- JBOS-AS-000320
- Vuln IDs
-
- V-62295
- Rule IDs
-
- SV-76785r1_rule
Checks: C-63099r1_chk
The default location for the keystore used by the JBoss vault is the <JBOSS_HOME>/vault/ folder. If a vault keystore has been created, by default it will be in the file: <JBOSS_HOME>/vault/vault.keystore. The file stores a single key, with the default alias vault, which will be used to store encrypted strings, such as passwords, for JBoss EAP. Browse to the JBoss vault folder using the relevant OS commands. Review the file permissions and ensure only system administrators and JBoss users are allowed access. Owner can be full access Group can be full access All others must be restricted to execute access or no permission. If non-system administrators are allowed to access the <JBOSS_HOME>/vault/ folder, this is a finding.
Fix: F-68215r1_fix
Configure the application server OS file permissions on the corresponding private key to restrict access to authorized accounts or roles.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- JBOS-AS-000355
- Vuln IDs
-
- V-62297
- Rule IDs
-
- SV-76787r1_rule
Checks: C-63101r1_chk
If JBoss is not started with separate management and public interfaces, this is a finding. Review the network design documents to identify the IP address space for the management network. Use relevant OS commands and administrative techniques to determine how the system administrator starts the JBoss server. This includes interviewing the system admin, using the "ps -ef|grep" command for UNIX like systems or checking command line flags and properties on batch scripts for Windows systems. Ensure the startup syntax used to start JBoss specifies a management network address and a public network address. The "-b" flag specifies the public address space. The "-bmanagement" flag specifies the management address space. Example: <JBOSS_HOME>/bin/standalone.sh -bmanagement 10.10.10.35 -b 192.168.10.25 If JBoss is not started with separate management and public interfaces, this is a finding.
Fix: F-68217r1_fix
Start the application server with a -bmanagement and a -b flag so that admin management functionality and hosted applications are separated. Refer to section 4.9 in the JBoss EAP 6.3 Installation Guide for specific instructions on how to start the JBoss server as a service.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- JBOS-AS-000400
- Vuln IDs
-
- V-62299
- Rule IDs
-
- SV-76789r1_rule
Checks: C-63103r1_chk
By default, JBoss installs its files into a folder called "jboss-eap-6.3". This folder by default is stored within the home folder of the JBoss user account. The installation process, however, allows for the override of default values to obtain folder and user account information from the system admin. Log on with a user account with JBoss access and permissions. Navigate to the "Jboss-eap-6.3" folder using the relevant OS commands for either a UNIX-like OS or a Windows OS. Examine the permissions of the JBoss folder. Owner can be full access. Group can be full access. All others must be restricted to execute access or no permission. If the JBoss folder is world readable or world writeable, this is a finding.
Fix: F-68219r1_fix
Configure file permissions on the JBoss folder to protect from unauthorized access.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- JBOS-AS-000425
- Vuln IDs
-
- V-62301
- Rule IDs
-
- SV-76791r1_rule
Checks: C-63105r1_chk
If the JBoss log folder is installed in the default location and AS-000133-JBOSS-00079 is not a finding, the log folders are protected and this requirement is not a finding. By default, JBoss installs its log files into a sub-folder of the "jboss-eap-6.3" home folder. Using a UNIX like OS example, the default location for log files is: JBOSS_HOME/standalone/log JBOSS_HOME/domain/log For a standalone configuration: JBOSS_HOME/standalone/log/server.log" Contains all server log messages, including server startup messages. For a domain configuration: JBOSS_HOME/domain/log/hostcontroller.log Host Controller boot log. Contains log messages related to the startup of the host controller. JBOSS_HOME/domain/log/processcontroller.log Process controller boot log. Contains log messages related to the startup of the process controller. JBOSS_HOME/domain/servers/SERVERNAME/log/server.log The server log for the named server. Contains all log messages for that server, including server startup messages. Log on with an OS user account with JBoss access and permissions. Navigate to the "Jboss-eap-6.3" folder using the relevant OS commands for either a UNIX like OS or a Windows OS. Examine the permissions of the JBoss logs folders. Owner can be full access. Group can be full access. All others must be restricted. If the JBoss log folder is world readable or world writeable, this is a finding.
Fix: F-68221r1_fix
Configure file permissions on the JBoss log folder to protect from unauthorized access.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- JBOS-AS-000470
- Vuln IDs
-
- V-62303
- Rule IDs
-
- SV-76793r1_rule
Checks: C-63107r1_chk
Log on to each of the JBoss domain member servers. Note: Sites that manage systems using the JBoss Operations Network client require HTTP interface access. It is acceptable that the management console alone be disabled rather than disabling the entire interface itself. Run the <JBOSS_HOME>/bin/jboss-cli command line interface utility and connect to the JBoss server. Run the following command: ls /core-service=management/management-interface=httpinterface/ If "console-enabled=true", this is a finding.
Fix: F-68223r1_fix
Run the <JBOSS_HOME>/bin/jboss-cli command line interface utility. Connect to the JBoss server and run the following command. /core-service=management/management-interface=httpinterface/:write-attribute(name=console-enabled,value=false) Successful command execution returns {"outcome" => "success"}, and future attempts to access the management console via web browser at <SERVERNAME>:9990 will result in no access to the admin console.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- JBOS-AS-000475
- Vuln IDs
-
- V-62305
- Rule IDs
-
- SV-76795r1_rule
Checks: C-63109r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Run the following command: For standalone servers: "ls /core-service=management/access=authorization/" For managed domain installations: "ls /host=master/core-service=management/access=authorization/" If the "provider" attribute is not set to "rbac", this is a finding.
Fix: F-68225r1_fix
Run the following command. <JBOSS_HOME>/bin/jboss-cli.sh -c -> connect -> cd /core-service=management/access-authorization :write-attribute(name=provider, value=rbac) Restart JBoss. Map users to roles by running the following command. Upper-case words are variables. role-mapping=ROLENAME/include=ALIAS:add(name-USERNAME, type=USER ROLE)
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- JBOS-AS-000480
- Vuln IDs
-
- V-62307
- Rule IDs
-
- SV-76797r1_rule
Checks: C-63111r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Run the command: /core-service=management/access=audit:read-resource(recursive=true) Under the "logger" => {audit-log} section of the returned response: If "enabled" => false, this is a finding
Fix: F-68227r1_fix
Launch the jboss-cli management interface substituting standalone or domain for <CONFIG> based upon the server installation. <JBOSS_HOME>/<CONFIG>/bin/jboss-cli connect to the server and run the following command: /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- JBOS-AS-000505
- Vuln IDs
-
- V-62309
- Rule IDs
-
- SV-76799r2_rule
Checks: C-63113r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Run the command: Standalone configuration: "ls /subsystem=logging/syslog-handler=" Domain configuration: "ls /profile=<specify>/subsystem=logging/syslog-handler=" Where <specify> = the selected application server profile of; default,full, full-ha or ha. If no values are returned, this is a finding.
Fix: F-68229r2_fix
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the “<JBOSS_HOME>/bin/” folder. Run the “jboss-cli” script. Connect to the server and authenticate. To add a syslog handler: Standalone configuration: "/subsystem=logging/syslog-handler=<HANDLER_NAME:add>" Domain configuration: "/profile=default/subsystem=logging/syslog-handler=<HANDLER_NAME:add>" To configure a syslog handler: Standalone configuration. "/subsystem=logging/syslog-handler=<HANDLER_NAME:write-attribute(name=ATTRIBUTE_NAME, value=ATTRIBUTE_VALUE)" Domain configuration. "/profile=default/subsystem=logging/syslog-handler=<HANDLER_NAME:write-attribute(name=ATTRIBUTE_NAME, value=ATTRIBUTE_VALUE)" *reference the RedHat web-site for the list of syslog handler attributes and corresponding values. Sample attributes include but are not limited to: port, enabled, app-name, level, server-address, hostname, etcetera.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- JBOS-AS-000545
- Vuln IDs
-
- V-62311
- Rule IDs
-
- SV-76801r1_rule
Checks: C-63115r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Run the command: ls /subsystem=deployment-scanner/scanner=default If "scan-enabled"=true, this is a finding.
Fix: F-68231r1_fix
Determine the JBoss server configuration as being either standalone or domain. Launch the relevant jboss-cli management interface substituting standalone or domain for <CONFIG> <JBOSS_HOME>/<CONFIG>/bin/jboss-cli connect to the server and run the command: /subsystem=deployment-scanner/scanner=default:write-attribute(name=scan-enabled,value=false)
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- JBOS-AS-000550
- Vuln IDs
-
- V-62313
- Rule IDs
-
- SV-76803r1_rule
Checks: C-63117r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Run the command: ls /core-service=management/access=audit/logger=audit-log If "enabled" = false, this is a finding.
Fix: F-68233r1_fix
Launch the jboss-cli management interface substituting standalone or domain for <CONFIG> based upon the server installation. <JBOSS_HOME>/<CONFIG>/bin/jboss-cli connect to the server and run the following command: /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- JBOS-AS-000555
- Vuln IDs
-
- V-62315
- Rule IDs
-
- SV-76805r1_rule
Checks: C-63119r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Run the command: ls /core-service=management/access=audit/logger=audit-log If "enabled" = false, this is a finding.
Fix: F-68235r1_fix
Launch the jboss-cli management interface substituting standalone or domain for <CONFIG> based upon the server installation. <JBOSS_HOME>/<CONFIG>/bin/jboss-cli connect to the server and run the following command: /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- JBOS-AS-000625
- Vuln IDs
-
- V-62317
- Rule IDs
-
- SV-76807r1_rule
Checks: C-63121r1_chk
Locate the cacerts file for the JVM. This can be done using the appropriate find command for the OS and change to the directory where the cacerts file is located. To view the certificates stored within this file, execute the java command "keytool -list -v -keystore ./cacerts". Verify that the Certificate Authority (CA) for each certificate is DoD-approved. If any certificates have a CA that are not DoD-approved, this is a finding.
Fix: F-68237r1_fix
Locate the cacerts file for the JVM. This can be done using the appropriate find command for the OS and change to the directory where the cacerts file is located. Remove the certificates that have a CA that is non-DoD approved, and import DoD CA-approved certificates.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- JBOS-AS-000640
- Vuln IDs
-
- V-62319
- Rule IDs
-
- SV-76809r1_rule
Checks: C-63123r1_chk
Interview the system admin and determine if the applications hosted on the application server are mission critical and require load balancing (LB) or high availability (HA). If the applications do not require LB or HA, this requirement is NA. If the documentation shows the LB or HA services are being provided by another system other than the application server, this requirement is NA. If applications require LB or HA, request documentation from the system admin that identifies what type of LB or HA configuration has been implemented on the application server. Ask the system admin to identify the components that require protection. Some options are included here as an example. Bear in mind the examples provided are not complete and absolute and are only provided as examples. The components being made redundant or HA by the application server will vary based upon application availability requirements. Examples are: Instances of the Application Server Web Applications Stateful, stateless and entity Enterprise Java Beans (EJBs) Single Sign On (SSO) mechanisms Distributed Cache HTTP sessions JMS and Message Services. If the hosted application requirements specify LB or HA and the JBoss server has not been configured to offer HA or LB, this is a finding.
Fix: F-68239r1_fix
Configure the application server to provide LB or HA services for the hosted application.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- JBOS-AS-000650
- Vuln IDs
-
- V-62321
- Rule IDs
-
- SV-76811r2_rule
Checks: C-63125r3_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Validate that the TLS protocol is used for HTTPS connections. Run the command: "ls /subsystem=web/connector=https/ssl=configuration" If a TLS V1.1 or V1.2 protocol is not returned, this is a finding.
Fix: F-68241r1_fix
Reference section 4.6 of the JBoss EAP 6.3 Security Guide located on the Red Hat vendor's web site for step-by-step instructions on establishing SSL encryption on JBoss. The overall steps include: 1. Add an HTTPS connector. 2. Configure the SSL encryption certificate and keys. 3. Set the protocol to TLS V1.1 or V1.2.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002421
- Version
- JBOS-AS-000655
- Vuln IDs
-
- V-62323
- Rule IDs
-
- SV-76813r2_rule
Checks: C-63127r2_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Validate that the TLS protocol is used for HTTPS connections. Run the command: "ls /subsystem=web/connector=https/ssl=configuration" Review the cipher suites. The following suites are acceptable as per NIST 800-52r1 section 3.3.1 - Cipher Suites. Refer to the NIST document for a complete list of acceptable cipher suites. The source NIST document and approved encryption algorithms/cipher suites are subject to change and should be referenced. AES_128_CBC AES_256_CBC AES_128_GCM AES_128_CCM AES_256_CCM If the cipher suites utilized by the TLS server are not approved by NIST as per 800-52r1, this is a finding.
Fix: F-68243r1_fix
Reference section 4.6 of the JBoss EAP 6.3 Security Guide located on the Red Hat vendor's website for step-by-step instructions on establishing SSL encryption on JBoss. The overall steps include: 1. Add an HTTPS connector. 2. Configure the SSL encryption certificate and keys. 3. Set the Cipher to an approved algorithm.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- JBOS-AS-000680
- Vuln IDs
-
- V-62325
- Rule IDs
-
- SV-76815r1_rule
Checks: C-63129r1_chk
Interview the system admin and have them either show documented proof of current support, or have them demonstrate their ability to access the Red Hat Enterprise Support portal. Verify Red Hat support includes coverage for the JBoss product. If there is no current and active support from the vendor, this is a finding.
Fix: F-68245r1_fix
Obtain vendor support from Red Hat.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- JBOS-AS-000685
- Vuln IDs
-
- V-62327
- Rule IDs
-
- SV-76817r1_rule
Checks: C-63131r1_chk
Interview the system admin and obtain details on their patch management processes as it relates to the OS and the Application Server. If there is no active, documented patch management process in use for these components, this is a finding.
Fix: F-68247r1_fix
Configure the operating system and the application server to use a patch management system or process that ensures security-relevant updates are installed within the time period directed by the ISSM.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- JBOS-AS-000690
- Vuln IDs
-
- V-62329
- Rule IDs
-
- SV-76819r1_rule
Checks: C-63133r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68249r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role, and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- JBOS-AS-000695
- Vuln IDs
-
- V-62331
- Rule IDs
-
- SV-76821r1_rule
Checks: C-63135r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68251r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role, and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- JBOS-AS-000700
- Vuln IDs
-
- V-62333
- Rule IDs
-
- SV-76823r1_rule
Checks: C-63137r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68253r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role, and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- JBOS-AS-000705
- Vuln IDs
-
- V-62335
- Rule IDs
-
- SV-76825r1_rule
Checks: C-63139r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68255r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role, and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- JBOS-AS-000710
- Vuln IDs
-
- V-62337
- Rule IDs
-
- SV-76827r1_rule
Checks: C-63141r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68257r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role, and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- JBOS-AS-000715
- Vuln IDs
-
- V-62339
- Rule IDs
-
- SV-76829r1_rule
Checks: C-63143r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68259r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role, and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- JBOS-AS-000720
- Vuln IDs
-
- V-62341
- Rule IDs
-
- SV-76831r1_rule
Checks: C-63145r1_chk
Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script to start the Command Line Interface (CLI). Connect to the server and authenticate. Run the command: For a Managed Domain configuration: "ls host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "ls /core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" If "enabled" = false, this is a finding.
Fix: F-68261r1_fix
Launch the jboss-cli management interface. Connect to the server by typing "connect", authenticate as a user in the Superuser role, and run the following command: For a Managed Domain configuration: "host=master/server/<SERVERNAME>/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)" For a Standalone configuration: "/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)"
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- JBOS-AS-000730
- Vuln IDs
-
- V-62343
- Rule IDs
-
- SV-76833r1_rule
Checks: C-63147r1_chk
Interview the administrator to determine if JBoss is using certificates for PKI. If JBoss is not performing any PKI functions, this finding is NA. The CA certs are usually stored in a file called cacerts located in the directory $JAVA_HOME/lib/security. If the file is not in this location, use a search command to locate the file, or ask the administrator where the certificate store is located. Open a dos shell or terminal window and change to the location of the certificate store. To view the certificates within the certificate store, run the command (in this example, the keystore file is cacerts.): keytool -list -v -keystore ./cacerts Locate the "OU" field for each certificate within the keystore. The field should contain either "DoD" or "CNSS" as the Organizational Unit (OU). If the OU does not show that the certificates are DoD or CNSS supplied, this is a finding.
Fix: F-68263r1_fix
Configure the application server to use DoD- or CNSS-approved Class 3 or Class 4 PKI certificates.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- JBOS-AS-000735
- Vuln IDs
-
- V-62345
- Rule IDs
-
- SV-76835r1_rule
Checks: C-63149r1_chk
If the JBoss server is configured to use a Syslog Handler, this is not a finding. Log on to the OS of the JBoss server with OS permissions that allow access to JBoss. Using the relevant OS commands and syntax, cd to the <JBOSS_HOME>/bin/ folder. Run the jboss-cli script. Connect to the server and authenticate. Determine if there is a periodic rotating file handler. For a domain configuration run the following command; where <SERVERNAME> is a variable for all of the servers in the domain. Usually "server-one", "server-two", etc.: "ls /host=master/server=<SERVERNAME>/subsystem=logging/periodic-rotating-file-handler=" For a standalone configuration run the command: "ls /subsystem=logging/periodic-rotating-file-handler=" If the command does not return "FILE", this is a finding. Review the <JBOSS_HOME>/standalone/log folder for the existence of rotated logs, and ask the admin to demonstrate how rotated logs are packaged and transferred to another system on at least a weekly basis.
Fix: F-68265r1_fix
Open the web-based management interface by opening a browser and pointing it to HTTPS://<EAP_SERVER>:9990/ Authenticate as a user with Admin rights. Navigate to the "Configuration" tab. Expand + Subsystems. Expand + Core. Select "Logging". Select the "Handler" tab. Select "Periodic". If a periodic file handler does not exist, reference JBoss admin guide for instructions on how to create a file handler that will rotate logs on a daily basis. Create scripts that package and off-load log data at least weekly.