Finding ID |
Severity |
Title |
Description |
V-204817
|
High |
The application server must remove all export ciphers to protect the confidentiality and integrity of transmitted information. |
During the initial setup of a Transport Layer Security (TLS) connection to the application server, the client sends a list of supported cipher suites in order of preference. The application server will reply with the cipher suite it will use for communication from the client list. If an attacker can... |
V-204816
|
High |
The application server must protect the confidentiality and integrity of transmitted information through the use of an approved TLS version. |
Preventing the disclosure of transmitted information requires that the application server take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through the use of Transport Layer Security (TLS).
Transmission of data can take place between the application server... |
V-204801
|
High |
The application server must electronically verify Personal Identity Verification (PIV) credentials for access to the management interface. |
The use of Personal Identity Verification (PIV) credentials facilitates standardization and reduces the risk of unauthorized access.
PIV credentials are only used in an unclassified environment.
DoD has mandated the use of the CAC to support identity management and personal authentication for systems covered under HSPD 12, as well as... |
V-204800
|
High |
The application server must accept Personal Identity Verification (PIV) credentials to access the management interface. |
The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access.
PIV credentials are only used in an unclassified environment.
DoD has mandated the use of the CAC to support identity management and personal authentication for systems covered under HSPD 12, as well as its use as... |
V-204766
|
High |
The application server must generate a unique session identifier using a FIPS 140-2 approved random number generator. |
The application server will use session IDs to communicate between modules or applications within the application server and between the application server and users. The session ID allows the application to track the communications along with credentials that may have been used to authenticate users or modules.
Unique session IDs... |
V-204758
|
High |
The application server must utilize FIPS 140-2 approved encryption modules when authenticating users and processes. |
Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon to provide confidentiality or integrity, and DoD data may be compromised due to weak algorithms. The use of TLS provides confidentiality of data in transit between the application... |
V-204747
|
High |
The application server must use multifactor authentication for local access to privileged accounts. |
Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the application server. If one factor is compromised or broken, the attacker still has at least one more barrier to breach before successfully breaking into the target. Unlike a simple username/password scenario where... |
V-204746
|
High |
The application server must use multifactor authentication for network access to privileged accounts. |
Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the application server. If one factor is compromised or broken, the attacker still has at least one more barrier to breach before successfully breaking into the target. Unlike a simple username/password scenario where... |
V-263556
|
Medium |
The application server must synchronize system clocks within and between systems or system components. |
Time synchronization of system clocks is essential for the correct execution of many system services, including identification and authentication processes that involve certificates and time-of-day restrictions as part of access control. Denial of service or failure to deny expired credentials may result without properly synchronized clocks within and between systems... |
V-263555
|
Medium |
The application server must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store. |
A Trusted Platform Module (TPM) is an example of a hardware-protected data store that can be used to protect cryptographic keys. |
V-263554
|
Medium |
The application server must include only approved trust anchors in trust stores or certificate stores managed by the organization. |
Public key infrastructure (PKI) certificates are certificates with visibility external to organizational systems and certificates related to the internal operations of systems, such as application-specific time services. In cryptographic systems with a hierarchical structure, a trust anchor is an authoritative source (i.e., a certificate authority) for which trust is assumed... |
V-263553
|
Medium |
The application server must protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths. |
Nonlocal maintenance and diagnostic activities are conducted by individuals who communicate through either an external or internal network.
Communications paths can be logically separated using encryption. |
V-263552
|
Medium |
The application server must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements. |
The purpose of requiring a device separate from the system to which the user is attempting to gain access for one of the factors during multifactor authentication is to reduce the likelihood of compromising authenticators or credentials stored on the system. Adversaries may be able to compromise such authenticators or... |
V-263551
|
Medium |
The application server must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access. |
The purpose of requiring a device separate from the system to which the user is attempting to gain access for one of the factors during multifactor authentication is to reduce the likelihood of compromising authenticators or credentials stored on the system. Adversaries may be able to compromise such authenticators or... |
V-263550
|
Medium |
The application server must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information. |
Audit information includes all information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and personally identifiable information. Audit logging tools are those programs and devices used to conduct system audit and logging activities. Protection of audit information focuses on technical protection and limits... |
V-263549
|
Medium |
The application server must disable accounts when the accounts are no longer associated to a user. |
Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality, which reduce the attack surface of the system. |
V-240925
|
Medium |
The application server must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. |
Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data.
NSA has developed Type 1 algorithms for protecting classified information. The Committee on National Security Systems (CNSS) National Information Assurance... |
V-204834
|
Medium |
The application server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. |
Configuring the application to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive security posture consistent with operational requirements.
Configuration settings are the set of parameters that can be changed that affect the... |
V-204833
|
Medium |
The application server must, at a minimum, transfer the logs of interconnected systems in real time, and transfer the logs of standalone systems weekly. |
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Protecting log data is important during a forensic investigation to ensure investigators can track and understand what may have occurred. Off-loading should be set up as a scheduled task but can be configured to be run... |
V-204832
|
Medium |
The application server must use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates. |
Class 3 PKI certificates are used for servers and software signing rather than for identifying individuals. Class 4 certificates are used for business-to-business transactions. Utilizing unapproved certificates not issued or approved by DoD or CNS creates an integrity risk. The application server must utilize approved DoD or CNS Class 3... |
V-204831
|
Medium |
Application servers must use NIST-approved or NSA-approved key management technology and processes. |
An asymmetric encryption key must be protected during transmission. The public portion of an asymmetric key pair can be freely distributed without fear of compromise, and the private portion of the key must be protected. The application server will provide software libraries that applications can programmatically utilize to encrypt and... |
V-204830
|
Medium |
The application server must generate log records for all account creations, modifications, disabling, and termination events. |
The maintenance of user accounts is a key activity within the system to determine access and privileges. Through changes to accounts, an attacker can create an account for persistent access, modify an account to elevate privileges or terminate/disable an account(s) to cause a DoS for user(s). To be able to... |
V-204829
|
Medium |
The application server must generate log records when concurrent logons from different workstations occur to the application server management interface. |
Being able to work on a system through multiple views into the application allows a user to work more efficiently and more accurately. Before environments with windowing capabilities or multiple desktops, a user would log onto the application from different workstations or terminals. With today's workstations, this is no longer... |
V-204828
|
Medium |
The application must generate log records showing starting and ending times for user access to the application server management interface. |
Determining when a user has accessed the management interface is important to determine the timeline of events when a security incident occurs. Generating these events, especially if the management interface is accessed via a stateless protocol like HTTP, the log events will be generated when the user performs a logon... |
V-204827
|
Medium |
The application server must generate log records for privileged activities. |
Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one.
Privileged activities would occur through the management interface. This interface can be web-based... |
V-204826
|
Medium |
The application server must generate log records when successful/unsuccessful logon attempts occur. |
Logging the access to the application server allows the system administrators to monitor user accounts. By logging successful/unsuccessful logons, the system administrator can determine if an account is compromised (e.g., frequent logons) or is in the process of being compromised (e.g., frequent failed logons) and can take actions to thwart... |
V-204825
|
Medium |
The application server must generate log records when successful/unsuccessful attempts to delete privileges occur. |
Deleting privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful and unsuccessful privilege deletions are made, the events need to be logged. By logging the event, the modification or attempted modification can be investigated to determine if it was performed inadvertently or maliciously. |
V-204824
|
Medium |
The application server must generate log records when successful/unsuccessful attempts to modify privileges occur. |
Changing privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful/unsuccessful changes are made, the event needs to be logged. By logging the event, the modification or attempted modification can be investigated to determine if it was performed inadvertently or maliciously. |
V-204823
|
Medium |
The application server must install security-relevant software updates within the time period directed by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs). |
Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to promptly install security-relevant software updates (e.g., patches, service packs, and hot fixes) to production systems after thorough testing... |
V-204822
|
Medium |
The application server must remove organization-defined software components after updated versions have been installed. |
Installation of patches and updates is performed when there are errors or security vulnerabilities in the current release of the software. When previous versions of software components are not removed from the application server after updates have been installed, an attacker may use the older components to exploit the system. |
V-204821
|
Medium |
The application server must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. |
Invalid user input occurs when a user inserts data or characters into an applications data entry field and the application is unprepared to process that data. This results in unanticipated application behavior potentially leading to an application or information system compromise. Invalid user input is one of the primary methods... |
V-204820
|
Medium |
The application server must maintain the confidentiality and integrity of information during reception. |
Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information.
Protecting the confidentiality and integrity of received information requires that application servers take... |
V-204819
|
Medium |
The application server must maintain the confidentiality and integrity of information during preparation for transmission. |
Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information.
An example of this would be an SMTP queue. This queue... |
V-204818
|
Medium |
The application server must employ approved cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission. |
Preventing the disclosure or modification of transmitted information requires that application servers take measures to employ approved cryptography in order to protect the information during transmission over the network. This is usually achieved through the use of Transport Layer Security (TLS), SSL VPN, or IPSec tunnel.
If data in transit... |
V-204815
|
Medium |
The application server must protect against or limit the effects of all types of Denial of Service (DoS) attacks by employing organization-defined security safeguards. |
DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. To reduce the possibility or effect of a DoS, the application server must employ defined security safeguards. These safeguards will be... |
V-204814
|
Medium |
The application server, when a MAC I system, must be in a high-availability (HA) cluster. |
A MAC I system is a system that handles data vital to the organization's operational readiness or effectiveness of deployed or contingency forces. A MAC I system must maintain the highest level of integrity and availability. By HA clustering the application server, the hosted application and data are given a... |
V-204813
|
Medium |
The application must implement cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components. |
Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an application server. Alternative physical protection measures include protected distribution systems.
In order to prevent unauthorized disclosure or modification of the information, application servers must protect... |
V-204812
|
Medium |
The application server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components. |
Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an application server. Alternative physical protection measures include protected distribution systems.
In order to prevent unauthorized disclosure or modification of the information, application servers must protect... |
V-204811
|
Medium |
The application server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions. |
Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD systems or by organizations with insufficient security controls. If the CA used for verifying the certificate is not a DoD-approved CA, trust of this CA has not been established.... |
V-204809
|
Medium |
The application server must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles. |
Without conforming to FICAM-issued profiles, the information system may not be interoperable with FICAM-authentication protocols, such as SAML 2.0 and OpenID 2.0.
This requirement addresses open identity management standards. |
V-204808
|
Medium |
The application server must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials. |
Access may be denied to legitimate users if FICAM-approved third-party credentials are not accepted.
This requirement typically applies to organizational information systems that are accessible to non-federal government agencies and other partners. This allows federal government relying parties to trust such credentials at their approved assurance levels.
Third-party credentials are... |
V-204807
|
Medium |
The application server must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface. |
Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials. PIV credentials are only used in an... |
V-204806
|
Medium |
The application server must accept Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface. |
Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials. PIV credentials are only used in an... |
V-204805
|
Medium |
The application server, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. |
The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information.
Application servers must provide the capability to utilize and meet requirements of the DOD Enterprise PKI infrastructure for application... |
V-204804
|
Medium |
The application server must prohibit the use of cached authenticators after an organization-defined time period. |
When the application server is using PKI authentication, a local revocation cache must be stored for instances when the revocation cannot be authenticated through the network, but if cached authentication information is out of date, the validity of the authentication information may be questionable. |
V-204798
|
Medium |
The application server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication. |
Without reauthentication, users may access resources or perform tasks for which they do not have authorization.
When applications provide the capability to change security roles or escalate the functional capability of the application, it is critical the user reauthenticate.
In addition to the reauthentication requirements associated with session locks, the... |
V-204797
|
Medium |
The application server must log the enforcement actions used to restrict access associated with changes to the application server. |
Without logging the enforcement of access restrictions against changes to the application server configuration, it will be difficult to identify attempted attacks, and a log trail will not be available for forensic investigation for after-the-fact actions. Configuration changes may occur to any of the modules within the application server through... |
V-204796
|
Medium |
The application server must enforce access restrictions associated with changes to application server configuration. |
When dealing with access restrictions pertaining to change control, it should be noted that any changes to the software, and/or application server configuration can potentially have significant effects on the overall security of the system.
Access restrictions for changes also include application software libraries.
If the application server provides automatic... |
V-204795
|
Medium |
The application server must record time stamps for log records that meet a granularity of one second for a minimum degree of precision. |
To investigate an incident, the log records should be easily put into chronological order. Without sufficient granularity of time stamps, the chronological order cannot be determined.
Time stamps generated by the application server include date and time. Granularity of time measurements refers to the degree of synchronization between information system... |
V-204794
|
Medium |
The application server must record time stamps for log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). |
If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis.
Time stamps generated by the application include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local... |
V-204793
|
Medium |
The application server must synchronize internal application server clocks to an authoritative time source when the time difference is greater than the organization-defined time period. |
Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating system events.
Synchronization of internal application server clocks is needed to correctly correlate the timing of events that occur across multiple systems. To meet this requirement, the organization will define... |
V-204792
|
Medium |
The application server must compare internal application server clocks at least every 24 hours with an authoritative time source. |
Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating system events.
Synchronization of system clocks is needed to correctly correlate the timing of events that occur across multiple systems. To meet this requirement, the organization will define an authoritative... |
V-204791
|
Medium |
The application server must provide an immediate real-time alert to authorized users of all log failure events requiring real-time alerts. |
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures include software/hardware errors, failures in the log capturing mechanisms, and log storage capacity being reached or exceeded. Notification of the failure event will allow... |
V-204790
|
Medium |
The application server must provide an immediate warning to the SA and ISSO, at a minimum, when allocated log record storage volume reaches 75% of maximum log record storage capacity. |
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures include software/hardware errors, failures in the log capturing mechanisms, and log storage capacity being reached or exceeded. Notification of the storage condition will allow... |
V-204789
|
Medium |
The application server must off-load log records onto a different system or media from the system being logged. |
Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited to, time stamps, source and destination IP addresses, user/process identifiers, event descriptions, application-specific events, success/fail indications, filenames involved, access control or... |
V-204788
|
Medium |
The application server must allocate log record storage capacity in accordance with organization-defined log record storage requirements. |
The proper management of log records not only dictates proper archiving processes and procedures be established, it also requires allocating enough storage space to maintain the logs online for a defined period of time.
If adequate online log storage capacity is not maintained, intrusion monitoring, security investigations, and forensic analysis... |
V-204785
|
Medium |
The application server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged. |
In order to be able to provide a forensic history of activity, the application server must ensure users who are granted a privileged role or those who utilize a separate distinct account when accessing privileged functions or data have their actions logged.
If privileged activity is not logged, no forensic... |
V-204784
|
Medium |
The application server must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. |
Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges.
Restricting non-privileged users also prevents an attacker, who has gained access to a non-privileged account, from elevating privileges, creating accounts, and performing system checks and maintenance. |
V-204783
|
Medium |
The application server must provide the capability to immediately disconnect or disable remote access to the management interface. |
Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking progress would not be immediately stopped.
The application server must have the capability to immediately disconnect current users remotely accessing the management interface and/or disable further remote access. The speed of disconnect or disablement... |
V-204782
|
Medium |
The application server must control remote access methods. |
Application servers provide remote access capability and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requirements. Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access... |
V-204781
|
Medium |
The application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission. |
The application server provides a framework for applications to communicate between each other to form an overall well-designed application to perform a task. As the information is transmitted, the security attributes must be maintained. Without the association of security attributes to information, there is no basis for the application to... |
V-204780
|
Medium |
The application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in process. |
The application server provides a framework for applications to communicate between each other to form an overall well-designed application to perform a task. As the information traverses the application server and the components, the security attributes must be maintained. Without the association of security attributes to information, there is no... |
V-204779
|
Medium |
The application server management interface must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions. |
Providing a logout capability to the user allows the user to explicitly close a session and free those resources used during the session.
If a user cannot explicitly end an application session, the session may remain open and be exploited by an attacker; this is referred to as a zombie... |
V-204778
|
Medium |
The application server management interface must provide a logout capability for user-initiated communication session. |
If a user cannot explicitly end an application server management interface session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session.
The attacker will then have access to the application server management functions without going through the user authentication process.... |
V-204777
|
Medium |
The application server must automatically terminate a user session after organization-defined conditions or trigger events requiring a session disconnect. |
An attacker can take advantage of user sessions that are left open, thus bypassing the user authentication process.
To thwart the vulnerability of open and unused user sessions, the application server must be configured to close the sessions when a configured condition or trigger event is met.
Session termination terminates... |
V-204776
|
Medium |
The application server must use cryptographic mechanisms to protect the integrity of log tools. |
Protecting the integrity of the tools used for logging purposes is a critical step in ensuring the integrity of log data. Log data includes all information (e.g., log records, log settings, and log reports) needed to successfully log information system activity.
It is not uncommon for attackers to replace the... |
V-204775
|
Medium |
The application server must restrict error messages only to authorized users. |
If the application provides too much information in error logs and administrative messages to the screen, this could lead to compromise. The structure and content of error messages need to be carefully considered by the organization and development team. The extent to which the information system is able to identify... |
V-204774
|
Medium |
The application server must only generate error messages that provide information necessary for corrective actions without revealing sensitive or potentially harmful information in error logs and administrative messages. |
Any application providing too much information in error logs and in administrative messages to the screen risks compromising the data and security of the application and system. The structure and content of error messages needs to be carefully considered by the organization and development team.
The application server must not... |
V-204773
|
Medium |
The application server must identify potentially security-relevant error conditions. |
The structure and content of error messages need to be carefully considered by the organization and development team. Any application providing too much information in error logs and in administrative messages to the screen risks compromising the data and security of the application and system. The extent to which the... |
V-204772
|
Medium |
The application server must check the validity of all data inputs to the management interface, except those specifically identified by the organization. |
Invalid user input occurs when a user inserts data or characters into an applications data entry field and the application is unprepared to process that data. This results in unanticipated application behavior potentially leading to an application or information system compromise. Invalid user input is one of the primary methods... |
V-204771
|
Medium |
The application server must employ cryptographic mechanisms to ensure confidentiality and integrity of all information at rest when stored off-line. |
This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers user information and system information. Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an organizational... |
V-204770
|
Medium |
The application server must protect the confidentiality and integrity of all information at rest. |
When data is written to digital media such as hard drives, mobile computers, external/removable hard drives, personal digital assistants, flash/thumb drives, etc., there is risk of data loss and data compromise.
Fewer protection measures are needed for media containing information determined by the organization to be in the public domain,... |
V-204769
|
Medium |
The application server must fail to a secure state if system initialization fails, shutdown fails, or aborts fail. |
Fail-secure is a condition achieved by the application server in order to ensure that in the event of an operational failure, the system does not enter into an unsecure state where intended security properties no longer hold. Preserving information system state information also facilitates system restart and return to the... |
V-204768
|
Medium |
The application server must provide a clustering capability. |
This requirement is dependent upon system MAC and confidentiality. If the system MAC and confidentiality levels do not specify redundancy requirements, this requirement is NA.
Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information system... |
V-204767
|
Medium |
The application server must be configured to perform complete application deployments. |
Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information system or a component of the system.
When an application is deployed to the application server, if the deployment process does not complete properly and without... |
V-204765
|
Medium |
The application server must recognize only system-generated session identifiers. |
This requirement focuses on communications protection at the application session, versus network packet level. The intent of this control is to establish grounds for confidence at each end of a communications session in the ongoing identity of the other party and in the validity of the information being transmitted.
Unique... |
V-204764
|
Medium |
The application server must generate a unique session identifier for each session. |
Unique session IDs are the opposite of sequentially generated session IDs, which can be easily guessed by an attacker. Unique session identifiers help to reduce predictability of session identifiers. Unique session IDs address man-in-the-middle attacks, including session hijacking or insertion of false information into a session. If the attacker is... |
V-204763
|
Medium |
The application server must invalidate session identifiers upon user logout or other session termination. |
If communications sessions remain open for extended periods of time even when unused, there is the potential for an adversary to hijack the session and use it to gain access to the device or networks to which it is attached. Terminating sessions after a logout event or after a certain... |
V-204762
|
Medium |
The application server must be configured to mutually authenticate connecting proxies, application servers or gateways. |
Application architecture may sometimes require a configuration where an application server is placed behind a web proxy, an application gateway or communicates directly with another application server. In those instances, the application server hosting the service/application is considered the server. The application server, proxy or application gateway consuming the hosted... |
V-204761
|
Medium |
The application server must separate hosted application functionality from application server management functionality. |
The application server consists of the management interface and hosted applications. By separating the management interface from hosted applications, the user must authenticate as a privileged user to the management interface before being presented with management functionality. This prevents non-privileged users from having visibility to functions not available to the... |
V-204760
|
Medium |
The application server must identify prohibited mobile code. |
Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded and executed on a local system without explicit installation or execution by the recipient.
Mobile code technologies include: Java, JavaScript, ActiveX, PDF, Postscript, Shockwave movies, Flash animations, and VBScript. Usage restrictions and... |
V-204759
|
Medium |
The application server must provide a log reduction capability that supports on-demand reporting requirements. |
The ability to generate on-demand reports, including after the log data has been subjected to log reduction, greatly facilitates the organization's ability to generate incident reports as needed to better handle larger-scale or more complex security incidents.
Log reduction is a process that manipulates collected log information and organizes such... |
V-204757
|
Medium |
The application server must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals. |
To prevent the compromise of authentication information during the authentication process, the application server authentication screens must obfuscate input so an unauthorized user cannot view a password, PIN, or any other authenticator value as it is being typed.
This can occur when a user is authenticating to the application server... |
V-204756
|
Medium |
The application server must map the authenticated identity to the individual user or group account for PKI-based authentication. |
The cornerstone of PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information, but the key can be mapped to a user. Without mapping the certificate used to authenticate to the user account,... |
V-204755
|
Medium |
Only authenticated system administrators or the designated PKI Sponsor for the application server must have access to the web servers private key. |
The cornerstone of the PKI is the private key used to encrypt or digitally sign information.
If the private key is stolen, this will lead to the compromise of the authentication and non-repudiation gained through PKI because the attacker can use the private key to digitally sign documents and can... |
V-204754
|
Medium |
The application server must perform RFC 5280-compliant certification path validation. |
A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make an informed decision regarding acceptance of an end entity certificate. Certification path validation includes checks such as certificate issuer trust,... |
V-204753
|
Medium |
The application server must utilize encryption when using LDAP for authentication. |
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission.
Application servers have the capability to utilize LDAP directories for authentication. If LDAP connections are not protected during transmission, sensitive authentication credentials can be stolen. When the application server utilizes LDAP,... |
V-204752
|
Medium |
The application server must transmit only encrypted representations of passwords. |
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised.
Application servers have the capability to utilize either certificates (tokens) or user IDs and passwords... |
V-204751
|
Medium |
The application server must for password-based authentication, store passwords using an approved salted key derivation function, preferably using a keyed hash. |
Applications must enforce password encryption when storing passwords. Passwords need to be protected at all times and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read and easily compromised.
Application servers provide either a local user store or they integrate with... |
V-204750
|
Medium |
The application server must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. |
Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can potentially obtain and maintain undetected access to the application. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained.
Applications need to track periods... |
V-204749
|
Medium |
The application server must provide security extensions to extend the SOAP protocol and provide secure authentication when accessing sensitive data. |
Application servers may provide a web services capability that could be leveraged to allow remote access to sensitive application data. A web service, which is a repeatable process used to make data available to remote clients, should not be confused with a web server.
Many web services utilize SOAP, which... |
V-204748
|
Medium |
The application server must authenticate users individually prior to using a group authenticator. |
To ensure individual accountability and prevent unauthorized access, application server users (and any processes acting on behalf of application server users) must be individually identified and authenticated.
A group authenticator is a generic account used by multiple individuals. Use of a group authenticator alone does not uniquely identify individual users.... |
V-204745
|
Medium |
The application server must use an approved DOD enterprise identity, credential, and access management (ICAM) solution to uniquely identify and authenticate users (or processes acting on behalf of organizational users). |
To ensure accountability and prevent unauthorized access, application server users must be uniquely identified and authenticated. This is typically accomplished via the use of a user store, which is either local (OS-based) or centralized (LDAP). However, DoDI 8520.03 now requires that applications use an approved DOD enterprise (E-ICAM) solution whenever... |
V-204744
|
Medium |
The application server must prohibit or restrict the use of nonsecure ports, protocols, modules, and/or services as defined in the PPSM CAL and vulnerability assessments. |
Some networking protocols may not meet organizational security requirements to protect data and components.
Application servers natively host a number of various features, such as management interfaces, httpd servers and message queues. These features all run on TCPIP ports. This creates the potential that the vendor may choose to utilize... |
V-204743
|
Medium |
The application server must adhere to the principles of least functionality by providing only essential capabilities. |
Application servers provide a myriad of differing processes, features and functionalities. Some of these processes may be deemed to be unnecessary or too unsecure to run on a production DoD system. Application servers must provide the capability to disable or deactivate functionality and services that are deemed to be non-essential... |
V-204742
|
Medium |
The application server must be capable of reverting to the last known good configuration in the event of failed installations and upgrades. |
Any changes to the components of the application server can have significant effects on the overall security of the system.
In order to ensure a prompt response to failed application installations and application server upgrades, the application server must provide an automated rollback capability that allows the system to be... |
V-204741
|
Medium |
The application server must limit privileges to change the software resident within software libraries. |
Application servers have the ability to specify that the hosted applications utilize shared libraries. The application server must have a capability to divide roles based upon duties wherein one project user (such as a developer) cannot modify the shared library code of another project user. The application server must also... |
V-204740
|
Medium |
The application server must prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate recognized and approved by the organization. |
Changes to any software components can have significant effects on the overall security of the application. Verifying software components have been digitally signed using a certificate recognized and approved by the organization ensures the software has not been tampered with and that it has been provided by a trusted vendor.... |
V-204739
|
Medium |
The application server must use cryptographic mechanisms to protect the integrity of log information. |
Protecting the integrity of log records helps to ensure log files are not tampered with. Cryptographic mechanisms are the industry-established standard used to protect the integrity of log data. An example of cryptographic mechanisms is the computation and application of a cryptographic hash and using asymmetric cryptography with digital signatures.... |
V-204738
|
Medium |
The application server must back up log records at least every seven days onto a different system or system component than the system or component being logged. |
Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up log records to a different system or onto separate media from the system the application server is actually running on helps to assure that in the event of a catastrophic system failure, the log... |
V-204737
|
Medium |
The application server must protect log tools from unauthorized deletion. |
Protecting log data also includes identifying and protecting the tools used to view and manipulate log data.
Depending upon the log format and application, system and application log tools may provide the only means to manipulate and manage application and system log data.
It is, therefore, imperative that access to... |
V-204736
|
Medium |
The application server must protect log tools from unauthorized modification. |
Protecting log data also includes identifying and protecting the tools used to view and manipulate log data.
Depending upon the log format and application, system and application log tools may provide the only means to manipulate and manage application and system log data.
It is, therefore, imperative that access to... |
V-204735
|
Medium |
The application server must protect log tools from unauthorized access. |
Protecting log data also includes identifying and protecting the tools used to view and manipulate log data.
Depending upon the log format and application, system and application log tools may provide the only means to manipulate and manage application and system log data.
It is, therefore, imperative that access to... |
V-204734
|
Medium |
The application server must protect log information from unauthorized deletion. |
If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve.
Application servers contain admin interfaces that allow reading and manipulation of log records. Therefore, these interfaces should not allow for unfettered... |
V-204733
|
Medium |
The application server must protect log information from unauthorized modification. |
If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In addition, access to log records provides information an attacker could potentially use to his or her advantage.
Application servers contain... |
V-204732
|
Medium |
The application server must protect log information from any type of unauthorized read access. |
If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In addition, access to log records provides information an attacker could potentially use to his or her advantage.
Application servers contain... |
V-204731
|
Medium |
The application server must use internal system clocks to generate time stamps for log records. |
Without the use of an approved and synchronized time source configured on the systems, events cannot be accurately correlated and analyzed to determine what is transpiring within the application server.
If an event has been triggered on the network, and the application server is not configured with the correct time,... |
V-204728
|
Medium |
The application server must alert the SA and ISSO, at a minimum, in the event of a log processing failure. |
Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a security incident. When log processing fails, the events during the failure can be lost. To minimize the timeframe of the log failure, an alert needs to be sent to the... |
V-204727
|
Medium |
The application server must generate log records containing the full-text recording of privileged commands or the individual identities of group account users. |
Privileged commands are commands that change the configuration or data of the application server. Since this type of command changes the application server configuration and could possibly change the security posture of the application server, these commands need to be logged to show the full-text of the command executed. Without... |
V-204726
|
Medium |
The application server must generate log records containing information that establishes the identity of any individual or process associated with the event. |
Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes: time stamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, filenames involved, and access control or flow control rules invoked.
Application servers have... |
V-204725
|
Medium |
The application server must produce log records that contain sufficient information to establish the outcome of events. |
Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited to, time stamps, source and destination IP addresses, user/process identifiers, event descriptions, application-specific events, success/fail indications, filenames involved, access control or... |
V-204724
|
Medium |
The application server must produce log records containing sufficient information to establish the sources of the events. |
Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined.
Ascertaining the correct source, e.g., source IP, of the events is important during forensic analysis. Correctly determining the source will add information to the overall reconstruction... |
V-204723
|
Medium |
The application server must produce log records containing sufficient information to establish where the events occurred. |
Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined.
Ascertaining the correct location or process within the application server where the events occurred is important during forensic analysis. To determine where an event occurred, the... |
V-204722
|
Medium |
The application server must produce log records containing sufficient information to establish when (date and time) the events occurred. |
Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined.
Ascertaining the correct order of the events that occurred is important during forensic analysis. Events that appear harmless by themselves might be flagged as a potential... |
V-204721
|
Medium |
The application server must produce log records containing information to establish what type of events occurred. |
Information system logging capability is critical for accurate forensic analysis. Without being able to establish what type of event occurred, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible.
Log record content that may be necessary to satisfy the requirement... |
V-204720
|
Medium |
The application server must initiate session logging upon startup. |
Session logging activities are developed, integrated, and used in consultation with legal counsel in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations. |
V-204719
|
Medium |
The application server must generate log records when successful/unsuccessful attempts to access subject privileges occur. |
Accessing a subject's privileges can be used to elevate a lower-privileged subject's privileges temporarily in order to cause harm to the application server or to gain privileges to operate temporarily for a designed purpose. When these actions take place, the event needs to be logged.
Application servers either provide a... |
V-204718
|
Medium |
The application server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which logable events are to be logged. |
Log records can be generated from various components within the application server, (e.g., httpd, beans, etc.) From an application perspective, certain specific application functionalities may be logged, as well.
The list of logged events is the set of events for which logs are to be generated. This set of events... |
V-204717
|
Medium |
The application server must generate log records for access and authentication events. |
Log records can be generated from various components within the application server. From an application server perspective, certain specific application server functionalities may be logged as well. The application server must allow the definition of what events are to be logged. As conditions change, the number and types of events... |
V-204716
|
Medium |
For application servers providing log record aggregation, the application server must compile log records from organization-defined information system components into a system-wide log trail that is time-correlated with an organization-defined level of tolerance for the relationship between time stamps of individual records in the log trail. |
Log generation and log records can be generated from various components within the application server. The list of logged events is the set of events for which logs are to be generated. This set of events is typically a subset of the list of all events for which the system... |
V-204715
|
Medium |
The application server must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. |
Non-repudiation of actions taken is required in order to maintain application integrity. Examples of particular actions taken by individuals include creating information, sending a message, approving information (e.g., indicating concurrence or signing a contract), and receiving a message.
Non-repudiation protects individuals against later claims by an author of not having... |
V-204714
|
Medium |
The application server management interface must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. |
To establish acceptance of system usage policy, a click-through banner at the application server management interface logon is required. The banner shall prevent further activity on the application server unless and until the user executes a positive action to manifest agreement by clicking on a box indicating "OK". |
V-204713
|
Medium |
The application server management interface must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. |
Application servers are required to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system management interface, providing privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance that states that:
(i) users are accessing a U.S. Government... |
V-204712
|
Medium |
The application server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. |
Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) must be employed by the application server to control access between users (or processes acting on behalf of... |
V-204711
|
Medium |
The application server must ensure remote sessions for accessing security functions and security-relevant information are logged. |
Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident.
Remote access by administrators requires that the admin activity be logged.
Application servers provide a web and command line-based remote management capability for managing the... |
V-204710
|
Medium |
The application server must implement cryptography mechanisms to protect the integrity of the remote access session. |
Encryption is critical for protection of remote access sessions. If encryption is not being used for integrity, malicious users may gain the ability to modify the application server configuration. The use of cryptography for ensuring integrity of remote access sessions mitigates that risk.
Application servers utilize a web management interface... |
V-204709
|
Medium |
The application server must use encryption strength in accordance with the categorization of the management data during remote access management sessions. |
Remote management access is accomplished by leveraging common communication protocols and establishing a remote connection to the application server via a network for the purposes of managing the application server. If cryptography is not used, then the session data traversing the remote connection could be intercepted and compromised.
Types of... |
V-204708
|
Medium |
The application server must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types. |
Application management includes the ability to control the number of sessions that utilize an application by all accounts and/or account types. Limiting the number of allowed sessions is helpful in limiting risks related to Denial of Service attacks.
Application servers host and expose business logic and application processes.
The application... |