V-35329 | Medium | The application server must utilize FIPS 140-2 approved encryption modules when authenticating users and processes. | Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon to provide confidentiality or integrity, and... |
V-35328 | Medium | The application server must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals. | To prevent the compromise of authentication information during the authentication process, the application server authentication screens must obfuscate input so an unauthorized user cannot view a... |
V-35325 | Medium | The application server must map the authenticated identity to the individual user or group account for PKI-based authentication. | The cornerstone of PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information, but the key can... |
V-35324 | Medium | Only authenticated system administrators or the designated PKI Sponsor for the application server must have access to the web servers private key. | The cornerstone of the PKI is the private key used to encrypt or digitally sign information.
If the private key is stolen, this will lead to the compromise of the authentication and... |
V-35322 | Medium | The application server must perform RFC 5280-compliant certification path validation. | A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to... |
V-57543 | Medium | Application servers must use NIST-approved or NSA-approved key management technology and processes. | An asymmetric encryption key must be protected during transmission. The public portion of an asymmetric key pair can be freely distributed without fear of compromise, and the private portion of... |
V-57541 | Medium | The application server must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. | Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to... |
V-57547 | Medium | The application server must identify prohibited mobile code. | Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded and executed on a local system without explicit installation or execution... |
V-57545 | Medium | The application server must use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates. | Class 3 PKI certificates are used for servers and software signing rather than for identifying individuals. Class 4 certificates are used for business-to-business transactions. Utilizing... |
V-57549 | Medium | The application server must generate a unique session identifier for each session. | Unique session IDs are the opposite of sequentially generated session IDs, which can be easily guessed by an attacker. Unique session identifiers help to reduce predictability of session... |
V-57429 | Medium | The application server must provide an immediate real-time alert to authorized users of all log failure events requiring real-time alerts. | It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures include software/hardware errors, failures in the... |
V-57425 | Medium | The application server must, at a minimum, transfer the logs of interconnected systems in real time, and transfer the logs of standalone systems weekly. | Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Protecting log data is important during a forensic investigation to ensure investigators can... |
V-57427 | Medium | The application server must provide an immediate warning to the SA and ISSO, at a minimum, when allocated log record storage volume reaches 75% of maximum log record storage capacity. | It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures include software/hardware errors, failures in the... |
V-57421 | Medium | The application server must allocate log record storage capacity in accordance with organization-defined log record storage requirements. | The proper management of log records not only dictates proper archiving processes and procedures be established, it also requires allocating enough storage space to maintain the logs online for a... |
V-57423 | Medium | The application server must off-load log records onto a different system or media from the system being logged. | Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited... |
V-35190 | Medium | The application server must shut down by default upon log failure (unless availability is an overriding concern). | It is critical that, when a system is at risk of failing to process logs, it detects and takes action to mitigate the failure. Log processing failures include software/hardware errors, failures in... |
V-35212 | Medium | The application server must protect log information from unauthorized deletion. | If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve.... |
V-35217 | Medium | The application server must use cryptographic mechanisms to protect the integrity of log information. | Protection of log records is of critical importance. Encrypting log records provides a level of protection that does not rely on host-based protections that can be accidentally misconfigured, such... |
V-35216 | Medium | The application server must back up log records at least every seven days onto a different system or system component than the system or component being logged. | Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up log records to a different system or onto separate media from the system the application server is... |
V-35215 | Medium | The application server must protect log tools from unauthorized deletion. | Protecting log data also includes identifying and protecting the tools used to view and manipulate log data.
Depending upon the log format and application, system and application log tools may... |
V-35214 | Medium | The application server must protect log tools from unauthorized modification. | Protecting log data also includes identifying and protecting the tools used to view and manipulate log data.
Depending upon the log format and application, system and application log tools may... |
V-35135 | Medium | The application server must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. | Non-repudiation of actions taken is required in order to maintain application integrity. Examples of particular actions taken by individuals include creating information, sending a message,... |
V-35440 | Medium | The application server must only generate error messages that provide information necessary for corrective actions without revealing sensitive or potentially harmful information in error logs and administrative messages. | Any application providing too much information in error logs and in administrative messages to the screen risks compromising the data and security of the application and system. The structure and... |
V-35139 | Medium | For application servers providing log record aggregation, the application server must compile log records from organization-defined information system components into a system-wide log trail that is time-correlated with an organization-defined level of tolerance for the relationship between time stamps of individual records in the log trail. | Log generation and log records can be generated from various components within the application server. The list of logged events is the set of events for which logs are to be generated. This set... |
V-35445 | Medium | The application server must use cryptographic mechanisms to protect the integrity of log tools. | Protecting the integrity of the tools used for logging purposes is a critical step in ensuring the integrity of log data. Log data includes all information (e.g., log records, log settings, and... |
V-57551 | Medium | The application server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions. | Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD systems or by organizations with insufficient... |
V-57553 | Medium | The application server must fail to a secure state if system initialization fails, shutdown fails, or aborts fail. | Fail-secure is a condition achieved by the application server in order to ensure that in the event of an operational failure, the system does not enter into an unsecure state where intended... |
V-57555 | Medium | The application server must protect the confidentiality and integrity of all information at rest. | When data is written to digital media such as hard drives, mobile computers, external/removable hard drives, personal digital assistants, flash/thumb drives, etc., there is risk of data loss and... |
V-35234 | Medium | The application server must adhere to the principles of least functionality by providing only essential capabilities. | Application servers provide a myriad of differing processes, features and functionalities. Some of these processes may be deemed to be unnecessary or too unsecure to run on a production DoD... |
V-57559 | Medium | The application must implement cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components. | Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an application server. Alternative physical... |
V-57419 | Medium | The application server must provide centralized management and configuration of the content to be captured in log records generated by all application components. | A clustered application server is made up of several servers working together to provide the user a failover and increased computing capability. To facilitate uniform logging in the event of an... |
V-57411 | Medium | The application server must ensure remote sessions for accessing security functions and security-relevant information are logged. | Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident.
Remote access by... |
V-57413 | Medium | The application server must control remote access methods. | Application servers provide remote access capability and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy... |
V-57415 | Medium | The application server must provide the capability to immediately disconnect or disable remote access to the management interface. | Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking progress would not be immediately stopped.
The application server must have the... |
V-57417 | Medium | The application server must generate log records containing the full-text recording of privileged commands or the individual identities of group account users. | Privileged commands are commands that change the configuration or data of the application server. Since this type of command changes the application server configuration and could possibly change... |
V-57491 | Medium | The application server must enforce access restrictions associated with changes to application server configuration. | When dealing with access restrictions pertaining to change control, it should be noted that any changes to the software, and/or application server configuration can potentially have significant... |
V-57493 | Medium | The application server must log the enforcement actions used to restrict access associated with changes to the application server. | Without logging the enforcement of access restrictions against changes to the application server configuration, it will be difficult to identify attempted attacks, and a log trail will not be... |
V-35203 | Medium | The application server must use internal system clocks to generate time stamps for log records. | Without the use of an approved and synchronized time source configured on the systems, events cannot be accurately correlated and analyzed to determine what is transpiring within the application... |
V-57495 | Medium | The application server must prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization. | Changes to any software components can have significant effects on the overall security of the application. Verifying software components have been digitally signed using a certificate that is... |
V-35205 | Medium | The application server must protect log information from any type of unauthorized read access. | If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In... |
V-57497 | Medium | The application server must be capable of reverting to the last known good configuration in the event of failed installations and upgrades. | Any changes to the components of the application server can have significant effects on the overall security of the system.
In order to ensure a prompt response to failed application... |
V-57499 | Medium | The application server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. | Configuring the application to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security... |
V-35309 | Medium | The application server must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. | Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can potentially obtain and maintain undetected access to the application.... |
V-35738 | Medium | The application server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. | Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access... |
V-35300 | Medium | The application server must use multifactor authentication for network access to privileged accounts. | Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the application server. If one factor is compromised or broken, the attacker... |
V-35302 | Medium | The application server must authenticate users individually prior to using a group authenticator. | To assure individual accountability and prevent unauthorized access, application server users (and any processes acting on behalf of application server users) must be individually identified and... |
V-35304 | Medium | The application server must provide security extensions to extend the SOAP protocol and provide secure authentication when accessing sensitive data. | Application servers may provide a web services capability that could be leveraged to allow remote access to sensitive application data. A web service, which is a repeatable process used to make... |
V-35306 | Medium | The application server must uniquely identify all network-connected endpoint devices before establishing any connection. | Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity.
For distributed application servers and components, the decisions... |
V-35381 | Medium | The application server must ensure authentication of both client and server during the entire session. | This control focuses on communications protection at the session, versus packet level.
At the application layer, session IDs are tokens generated by web applications to uniquely identify an... |
V-57407 | Medium | The application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in process. | The application server provides a framework for applications to communicate between each other to form an overall well-designed application to perform a task. As the information traverses the... |
V-57405 | Medium | The application server management interface must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions. | Providing a logout capability to the user allows the user to explicitly close a session and free those resources used during the session.
If a user cannot explicitly end an application session,... |
V-35143 | Medium | The application server must generate log records when successful/unsuccessful attempts to access subject privileges occur. | Accessing a subject's privileges can be used to elevate a lower-privileged subject's privileges temporarily in order to cause harm to the application server or to gain privileges to operate... |
V-35142 | Medium | The application server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which logable events are to be logged. | Log records can be generated from various components within the application server, (e.g., httpd, beans, etc.) From an application perspective, certain specific application functionalities may be... |
V-35141 | Medium | The application server must generate log records for access and authentication events. | Log records can be generated from various components within the application server. From an application server perspective, certain specific application server functionalities may be logged as... |
V-57401 | Medium | The application server must automatically terminate a user session after organization-defined conditions or trigger events requiring a session disconnect. | An attacker can take advantage of user sessions that are left open, thus bypassing the user authentication process.
To thwart the vulnerability of open and unused user sessions, the application... |
V-57565 | Medium | The application server must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. | Invalid user input occurs when a user inserts data or characters into an applications data entry field and the application is unprepared to process that data. This results in unanticipated... |
V-35436 | Medium | The application server must check the validity of all data inputs to the management interface, except those specifically identified by the organization. | Invalid user input occurs when a user inserts data or characters into an applications data entry field and the application is unprepared to process that data. This results in unanticipated... |
V-57567 | Medium | The application server must identify potentially security-relevant error conditions. | The structure and content of error messages need to be carefully considered by the organization and development team. Any application providing too much information in error logs and in... |
V-57561 | Medium | The application server must install security-relevant software updates within the time period directed by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs). | Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations... |
V-57563 | Medium | The application server must remove organization-defined software components after updated versions have been installed. | Installation of patches and updates is performed when there are errors or security vulnerabilities in the current release of the software. When previous versions of software components are not... |
V-35148 | Medium | The application server must initiate session logging upon startup. | Session logging activities are developed, integrated, and used in consultation with legal counsel in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations. |
V-57489 | Medium | The application server must provide the capability for authorized users to remotely view/hear, in real time, all content related to an established user session. | Without the capability to remotely view/hear all content related to a user session, investigations into suspicious user activity would be hampered. Real-time monitoring allows authorized personnel... |
V-57487 | Medium | The application server must provide the capability for organization-identified individuals or roles to change the logging to be performed on all application components, based on all selectable event criteria within organization-defined time thresholds. | Log records can be generated from various components within the application server. The list of logged events is the set of events for which logs are to be generated. This set of events is... |
V-57485 | Medium | The application server must generate log records for all account creations, modifications, disabling, and termination events. | The maintenance of user accounts is a key activity within the system to determine access and privileges. Through changes to accounts, an attacker can create an account for persistent access,... |
V-57483 | Medium | The application server must generate log records when concurrent logons from different workstations occur to the application server management interface. | Being able to work on a system through multiple views into the application allows a user to work more efficiently and more accurately. Before environments with windowing capabilities or multiple... |
V-57481 | Medium | The application must generate log records showing starting and ending times for user access to the application server management interface. | Determining when a user has accessed the management interface is important to determine the timeline of events when a security incident occurs. Generating these events, especially if the... |
V-35424 | Medium | The application server must provide a clustering capability. | This requirement is dependent upon system MAC and confidentiality. If the system MAC and confidentiality levels do not specify redundancy requirements, this requirement is NA.
Failure to a known... |
V-35426 | Medium | The application server must employ cryptographic mechanisms to ensure confidentiality and integrity of all information at rest when stored off-line. | This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers user information and system information. Information at rest refers to... |
V-35159 | Medium | The application server must produce log records containing information to establish what type of events occurred. | Information system logging capability is critical for accurate forensic analysis. Without being able to establish what type of event occurred, it would be difficult to establish, correlate, and... |
V-35422 | Medium | The application server must generate a unique session identifier using a FIPS 140-2 approved random number generator. | The application server will use session IDs to communicate between modules or applications within the application server and between the application server and users. The session ID allows the... |
V-35423 | Medium | The application server must be configured to perform complete application deployments. | Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information system or a component of the system.
When an... |
V-35224 | Medium | The application server must limit privileges to change the software resident within software libraries. | Application servers have the ability to specify that the hosted applications utilize shared libraries. The application server must have a capability to divide roles based upon duties wherein one... |
V-35165 | Medium | The application server must produce log records containing sufficient information to establish when (date and time) the events occurred. | Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined.
Ascertaining... |
V-35167 | Medium | The application server must produce log records containing sufficient information to establish where the events occurred. | Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined.
Ascertaining... |
V-35415 | Medium | The application server must invalidate session identifiers upon user logout or other session termination. | If communications sessions remain open for extended periods of time even when unused, there is the potential for an adversary to hijack the session and use it to gain access to the device or... |
V-35213 | Medium | The application server must protect log tools from unauthorized access. | Protecting log data also includes identifying and protecting the tools used to view and manipulate log data.
Depending upon the log format and application, system and application log tools may... |
V-57509 | Medium | The application server must authenticate all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based. | Device authentication requires unique identification and authentication that may be defined by type, by specific device, or by a combination of type and device.
Bidirectional authentication... |
V-35317 | Medium | The application server must store only encrypted representations of passwords. | Applications must enforce password encryption when storing passwords. Passwords need to be protected at all times and encryption is the standard method for protecting passwords. If passwords are... |
V-57507 | Medium | The application server must authenticate all network-connected endpoint devices before establishing any connection. | Device authentication requires unique identification and authentication that may be defined by type, by specific device, or by a combination of type and device.
Device authentication is... |
V-57505 | Medium | The application server must electronically verify Personal Identity Verification (PIV) credentials for access to the management interface. | The use of Personal Identity Verification (PIV) credentials facilitates standardization and reduces the risk of unauthorized access.
PIV credentials are only used in an unclassified... |
V-57503 | Medium | The application server must accept Personal Identity Verification (PIV) credentials to access the management interface. | The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access.
PIV credentials are only used in an unclassified environment.
DoD has mandated the use of the... |
V-57501 | Medium | The application server must prohibit or restrict the use of nonsecure ports, protocols, modules, and/or services as defined in the PPSM CAL and vulnerability assessments. | Some networking protocols may not meet organizational security requirements to protect data and components.
Application servers natively host a number of various features, such as management... |
V-35421 | Medium | The application server must recognize only system-generated session identifiers. | This requirement focuses on communications protection at the application session, versus network packet level. The intent of this control is to establish grounds for confidence at each end of a... |
V-35301 | Medium | The application server must use multifactor authentication for local access to privileged accounts. | Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the application server. If one factor is compromised or broken, the attacker... |
V-35098 | Medium | The application server management interface must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. | To establish acceptance of system usage policy, a click-through banner at the application server management interface logon is required. The banner shall prevent further activity on the... |
V-57557 | Medium | The application server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components. | Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an application server. Alternative physical... |
V-35096 | Medium | The application server management interface must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. | Application servers are required to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system management interface, providing privacy and security notices... |
V-35090 | Medium | The application server must implement cryptography mechanisms to protect the integrity of the remote access session. | Encryption is critical for protection of remote access sessions. If encryption is not being used for integrity, malicious users may gain the ability to modify the application server configuration.... |
V-35318 | Medium | The application server must transmit only encrypted representations of passwords. | Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. If passwords are not encrypted, they can be plainly read (i.e.,... |
V-35319 | Medium | The application server must utilize encryption when using LDAP for authentication. | Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission.
Application servers have the capability to utilize LDAP... |
V-35070 | Medium | The application server must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types. | Application management includes the ability to control the number of sessions that utilize an application by all accounts and/or account types. Limiting the number of allowed sessions is helpful... |
V-35176 | Medium | The application server must produce log records that contain sufficient information to establish the outcome of events. | Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited... |
V-35170 | Medium | The application server must produce log records containing sufficient information to establish the sources of the events. | Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined.
Ascertaining... |
V-57519 | Medium | The application server must accept FICAM-approved third-party credentials. | Access may be denied to legitimate users if FICAM-approved third-party credentials are not accepted.
This requirement typically applies to organizational information systems that are accessible... |
V-57515 | Medium | The application server must accept Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface. | Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11... |
V-57517 | Medium | The application server must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface. | Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11... |
V-57511 | Medium | The application server, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. | The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user... |
V-57513 | Medium | The application server must prohibit the use of cached authenticators after an organization-defined time period. | When the application server is using PKI authentication, a local revocation cache must be stored for instances when the revocation cannot be authenticated through the network, but if cached... |
V-35089 | Medium | The application server must use encryption strength in accordance with the categorization of the management data during remote access management sessions. | Remote management access is accomplished by leveraging common communication protocols and establishing a remote connection to the application server via a network for the purposes of managing the... |
V-57403 | Medium | The application server management interface must provide a logout capability for user-initiated communication session. | If a user cannot explicitly end an application server management interface session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session.
The... |
V-57443 | Medium | The application server must generate log records when successful/unsuccessful logon attempts occur. | Logging the access to the application server allows the system administrators to monitor user accounts. By logging successful/unsuccessful logons, the system administrator can determine if an... |
V-57441 | Medium | The application server must generate log records when successful/unsuccessful attempts to delete privileges occur. | Deleting privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful and unsuccessful privilege deletions are made, the events need to be logged. By... |
V-35772 | Medium | The application server must protect log information from unauthorized modification. | If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In... |
V-57445 | Medium | The application server must generate log records for privileged activities. | Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an... |
V-57529 | Medium | The application server must protect against or limit the effects of all types of Denial of Service (DoS) attacks by employing organization-defined security safeguards. | DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. To reduce... |
V-57399 | Medium | The application server must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. | Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or... |
V-57521 | Medium | The application server must conform to FICAM-issued profiles. | Without conforming to FICAM-issued profiles, the information system may not be interoperable with FICAM-authentication protocols, such as SAML 2.0 and OpenID 2.0.
This requirement addresses open... |
V-57397 | Medium | The application server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged. | In order to be able to provide a forensic history of activity, the application server must ensure users who are granted a privileged role or those who utilize a separate distinct account when... |
V-57523 | Medium | The application server must require users to re-authenticate when organization-defined circumstances or situations require re-authentication. | Without re-authentication, users may access resources or perform tasks for which they do not have authorization.
When applications provide the capability to change security roles or escalate the... |
V-57525 | Medium | The application server must require devices to re-authenticate when organization-defined circumstances or situations require re-authentication. | Without re-authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity.
In addition to the re-authentication requirements associated with... |
V-57527 | Medium | The application server must provide a log reduction capability that supports on-demand reporting requirements. | The ability to generate on-demand reports, including after the log data has been subjected to log reduction, greatly facilitates the organization's ability to generate incident reports as needed... |
V-35191 | Medium | The application server must be configured to fail over to another system in the event of log subsystem failure. | This requirement is dependent upon system MAC and availability. If the system MAC and availability do not specify redundancy requirements, this requirement is NA.
It is critical that, when a... |
V-35376 | Medium | The application server must separate hosted application functionality from application server management functionality. | The application server consists of the management interface and hosted applications. By separating the management interface from hosted applications, the user must authenticate as a privileged... |
V-57409 | Medium | The application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission. | The application server provides a framework for applications to communicate between each other to form an overall well-designed application to perform a task. As the information is transmitted,... |
V-35441 | Medium | The application server must restrict error messages only to authorized users. | If the application provides too much information in error logs and administrative messages to the screen, this could lead to compromise. The structure and content of error messages need to be... |
V-57537 | Medium | The application server must maintain the confidentiality and integrity of information during preparation for transmission. | Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission including, for example, during aggregation, at protocol transformation points,... |
V-35299 | Medium | The application server must use an enterprise user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users). | To assure accountability and prevent unauthorized access, application server users must be uniquely identified and authenticated. This is typically accomplished via the use of a user store which... |
V-57535 | Medium | The application server must employ approved cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission. | Preventing the disclosure or modification of transmitted information requires that application servers take measures to employ approved cryptography in order to protect the information during... |
V-57533 | Medium | The application server must protect the confidentiality and integrity of transmitted information through the use of an approved TLS version. | Preventing the disclosure of transmitted information requires that the application server take measures to employ some form of cryptographic mechanism in order to protect the information during... |
V-57531 | Medium | The application server, when a MAC I system, must be in a high-availability (HA) cluster. | A MAC I system is a system that handles data vital to the organization's operational readiness or effectiveness of deployed or contingency forces. A MAC I system must maintain the highest level... |
V-57539 | Medium | The application server must maintain the confidentiality and integrity of information during reception. | Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during... |
V-57439 | Medium | The application server must generate log records when successful/unsuccessful attempts to modify privileges occur. | Changing privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful/unsuccessful changes are made, the event needs to be logged. By logging the... |
V-57437 | Medium | The application server must synchronize internal application server clocks to an authoritative time source when the time difference is greater than the organization-defined time period. | Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating system events.
Synchronization of internal... |
V-57435 | Medium | The application server must compare internal application server clocks at least every 24 hours with an authoritative time source. | Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating system events.
Synchronization of system clocks is... |
V-57433 | Medium | The application server must record time stamps for log records that meet a granularity of one second for a minimum degree of precision. | To investigate an incident, the log records should be easily put into chronological order. Without sufficient granularity of time stamps, the chronological order cannot be determined.
Time... |
V-57431 | Medium | The application server must record time stamps for log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). | If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis.
Time stamps generated by the application include date and time.... |
V-35182 | Medium | The application server must generate log records containing information that establishes the identity of any individual or process associated with the event. | Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes: time stamps, source... |
V-61351 | Medium | The application server must remove all export ciphers to protect the confidentiality and integrity of transmitted information. | During the initial setup of a Transport Layer Security (TLS) connection to the application server, the client sends a list of supported cipher suites in order of preference. The application... |
V-35186 | Medium | The application server must alert the SA and ISSO, at a minimum, in the event of a log processing failure. | Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a security incident. When log processing fails, the events during the... |