UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application server must specify administrative users and grant them the sole right to change application security attributes pertaining to application server configuration.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35081 SRG-APP-000010-AS-000006 SV-46368r1_rule High
Description
Security attributes are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. Security attributes are typically associated with internal data structures and configuration (e.g., application deployment, logging, monitoring) within the application server and are used to enable the implementation of access control and flow control policies, reflect special dissemination, handling or distribution instructions, or support other aspects of the organizational information security policy. If unauthorized entities were able to change security attributes, the integrity and/or confidentiality of the AS could be compromised.
STIG Date
Application Server Security Requirements Guide 2013-01-08

Details

Check Text ( C-43468r2_chk )
Review AS configuration to ensure that only the administrator can change security attributes. If any other accounts can modify security attributes, this is a finding.
Fix Text (F-39632r3_fix)
Configure the AS to only allow the administrator to change security attributes.