| V-204746 | | The application server must use multifactor authentication for network access to privileged accounts. | Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the application server. If one ... |
| V-204747 | | The application server must use multifactor authentication for local access to privileged accounts. | Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the application server. If one f... |
| V-204758 | | The application server must utilize FIPS 140-2 approved encryption modules when authenticating users and processes. | Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upo... |
| V-204766 | | The application server must generate a unique session identifier using a FIPS 140-2 approved random number generator. | The application server will use session IDs to communicate between modules or applications within the application server and between the application s... |
| V-204800 | | The application server must accept Personal Identity Verification (PIV) credentials to access the management interface. | The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access.
PIV credentials are only used in an unclassified ... |
| V-204801 | | The application server must electronically verify Personal Identity Verification (PIV) credentials for access to the management interface. | The use of Personal Identity Verification (PIV) credentials facilitates standardization and reduces the risk of unauthorized access.
PIV credentials ... |
| V-204812 | | The application server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components. | Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an appli... |
| V-204813 | | The application must implement cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components. | Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an appli... |
| V-204816 | | The application server must protect the confidentiality and integrity of transmitted information through the use of an approved TLS version. | Preventing the disclosure of transmitted information requires that the application server take measures to employ some form of cryptographic mechanism... |
| V-204817 | | The application server must remove all export ciphers to protect the confidentiality and integrity of transmitted information. | During the initial setup of a Transport Layer Security (TLS) connection to the application server, the client sends a list of supported cipher suites ... |
| V-204708 | | The application server must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types. | Application management includes the ability to control the number of sessions that utilize an application by all accounts and/or account types. Limiti... |
| V-204709 | | The application server must use encryption strength in accordance with the categorization of the management data during remote access management sessions. | Remote management access is accomplished by leveraging common communication protocols and establishing a remote connection to the application server v... |
| V-204710 | | The application server must implement cryptography mechanisms to protect the integrity of the remote access session. | Encryption is critical for protection of remote access sessions. If encryption is not being used for integrity, malicious users may gain the ability t... |
| V-204711 | | The application server must ensure remote sessions for accessing security functions and security-relevant information are logged. | Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigation... |
| V-204712 | | The application server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. | Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policies, role-based policies, a... |
| V-204713 | | The application server management interface must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. | Application servers are required to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system management inter... |
| V-204714 | | The application server management interface must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. | To establish acceptance of system usage policy, a click-through banner at the application server management interface logon is required. The banner sh... |
| V-204715 | | The application server must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. | Non-repudiation of actions taken is required in order to maintain application integrity. Examples of particular actions taken by individuals include c... |
| V-204716 | | For application servers providing log record aggregation, the application server must compile log records from organization-defined information system components into a system-wide log trail that is time-correlated with an organization-defined level of tolerance for the relationship between time stamps of individual records in the log trail. | Log generation and log records can be generated from various components within the application server. The list of logged events is the set of events ... |
| V-204717 | | The application server must generate log records for access and authentication events. | Log records can be generated from various components within the application server. From an application server perspective, certain specific applicat... |
| V-204718 | | The application server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which logable events are to be logged. | Log records can be generated from various components within the application server, (e.g., httpd, beans, etc.) From an application perspective, certai... |
| V-204719 | | The application server must generate log records when successful/unsuccessful attempts to access subject privileges occur. | Accessing a subject's privileges can be used to elevate a lower-privileged subject's privileges temporarily in order to cause harm to the application ... |
| V-204720 | | The application server must initiate session logging upon startup. | Session logging activities are developed, integrated, and used in consultation with legal counsel in accordance with applicable federal laws, Executiv... |
| V-204721 | | The application server must produce log records containing information to establish what type of events occurred. | Information system logging capability is critical for accurate forensic analysis. Without being able to establish what type of event occurred, it wou... |
| V-204722 | | The application server must produce log records containing sufficient information to establish when (date and time) the events occurred. | Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of th... |
| V-204723 | | The application server must produce log records containing sufficient information to establish where the events occurred. | Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the... |
| V-204724 | | The application server must produce log records containing sufficient information to establish the sources of the events. | Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of th... |
| V-204725 | | The application server must produce log records that contain sufficient information to establish the outcome of events. | Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement ... |
| V-204726 | | The application server must generate log records containing information that establishes the identity of any individual or process associated with the event. | Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement ... |
| V-204727 | | The application server must generate log records containing the full-text recording of privileged commands or the individual identities of group account users. | Privileged commands are commands that change the configuration or data of the application server. Since this type of command changes the application ... |
| V-204728 | | The application server must alert the SA and ISSO, at a minimum, in the event of a log processing failure. | Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a security incident. When log... |
| V-204731 | | The application server must use internal system clocks to generate time stamps for log records. | Without the use of an approved and synchronized time source configured on the systems, events cannot be accurately correlated and analyzed to determin... |
| V-204732 | | The application server must protect log information from any type of unauthorized read access. | If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is ... |
| V-204733 | | The application server must protect log information from unauthorized modification. | If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is ... |
| V-204734 | | The application server must protect log information from unauthorized deletion. | If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is ... |
| V-204735 | | The application server must protect log tools from unauthorized access. | Protecting log data also includes identifying and protecting the tools used to view and manipulate log data.
Depending upon the log format and appli... |
| V-204736 | | The application server must protect log tools from unauthorized modification. | Protecting log data also includes identifying and protecting the tools used to view and manipulate log data.
Depending upon the log format and appli... |
| V-204737 | | The application server must protect log tools from unauthorized deletion. | Protecting log data also includes identifying and protecting the tools used to view and manipulate log data.
Depending upon the log format and appli... |
| V-204738 | | The application server must back up log records at least every seven days onto a different system or system component than the system or component being logged. | Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up log records to a different system or onto separate m... |
| V-204739 | | The application server must use cryptographic mechanisms to protect the integrity of log information. | Protecting the integrity of log records helps to ensure log files are not tampered with. Cryptographic mechanisms are the industry-established standar... |
| V-204740 | | The application server must prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate recognized and approved by the organization. | Changes to any software components can have significant effects on the overall security of the application. Verifying software components have been di... |
| V-204741 | | The application server must limit privileges to change the software resident within software libraries. | Application servers have the ability to specify that the hosted applications utilize shared libraries. The application server must have a capability t... |
| V-204742 | | The application server must be capable of reverting to the last known good configuration in the event of failed installations and upgrades. | Any changes to the components of the application server can have significant effects on the overall security of the system.
In order to ensure a prom... |
| V-204743 | | The application server must adhere to the principles of least functionality by providing only essential capabilities. | Application servers provide a myriad of differing processes, features and functionalities. Some of these processes may be deemed to be unnecessary or ... |
| V-204744 | | The application server must prohibit or restrict the use of nonsecure ports, protocols, modules, and/or services as defined in the PPSM CAL and vulnerability assessments. | Some networking protocols may not meet organizational security requirements to protect data and components.
Application servers natively host a numbe... |
| V-204745 | | The application server must use an approved DOD enterprise identity, credential, and access management (ICAM) solution to uniquely identify and authenticate users (or processes acting on behalf of organizational users). | To ensure accountability and prevent unauthorized access, application server users must be uniquely identified and authenticated. This is typically ac... |
| V-204748 | | The application server must authenticate users individually prior to using a group authenticator. | To ensure individual accountability and prevent unauthorized access, application server users (and any processes acting on behalf of application serve... |
| V-204749 | | The application server must provide security extensions to extend the SOAP protocol and provide secure authentication when accessing sensitive data. | Application servers may provide a web services capability that could be leveraged to allow remote access to sensitive application data. A web service,... |
| V-204750 | | The application server must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. | Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can potentially obtain and mai... |
| V-204751 | | The application server must for password-based authentication, store passwords using an approved salted key derivation function, preferably using a keyed hash. | Applications must enforce password encryption when storing passwords. Passwords need to be protected at all times and encryption is the standard metho... |
| V-204752 | | The application server must transmit only encrypted representations of passwords. | Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. If passwords are not... |
| V-204753 | | The application server must utilize encryption when using LDAP for authentication. | Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission.
Application servers... |
| V-204754 | | The application server must perform RFC 5280-compliant certification path validation. | A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path val... |
| V-204755 | | Only authenticated system administrators or the designated PKI Sponsor for the application server must have access to the web servers private key. | The cornerstone of the PKI is the private key used to encrypt or digitally sign information.
If the private key is stolen, this will lead to the com... |
| V-204756 | | The application server must map the authenticated identity to the individual user or group account for PKI-based authentication. | The cornerstone of PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not cont... |
| V-204757 | | The application server must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals. | To prevent the compromise of authentication information during the authentication process, the application server authentication screens must obfuscat... |
| V-204759 | | The application server must provide a log reduction capability that supports on-demand reporting requirements. | The ability to generate on-demand reports, including after the log data has been subjected to log reduction, greatly facilitates the organization's ab... |
| V-204760 | | The application server must identify prohibited mobile code. | Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded and executed on a local sys... |
| V-204761 | | The application server must separate hosted application functionality from application server management functionality. | The application server consists of the management interface and hosted applications. By separating the management interface from hosted applications,... |
| V-204762 | | The application server must be configured to mutually authenticate connecting proxies, application servers or gateways. | Application architecture may sometimes require a configuration where an application server is placed behind a web proxy, an application gateway or com... |
| V-204763 | | The application server must invalidate session identifiers upon user logout or other session termination. | If communications sessions remain open for extended periods of time even when unused, there is the potential for an adversary to hijack the session an... |
| V-204764 | | The application server must generate a unique session identifier for each session. | Unique session IDs are the opposite of sequentially generated session IDs, which can be easily guessed by an attacker. Unique session identifiers help... |
| V-204765 | | The application server must recognize only system-generated session identifiers. | This requirement focuses on communications protection at the application session, versus network packet level. The intent of this control is to establ... |
| V-204767 | | The application server must be configured to perform complete application deployments. | Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information syste... |
| V-204768 | | The application server must provide a clustering capability. | This requirement is dependent upon system MAC and confidentiality. If the system MAC and confidentiality levels do not specify redundancy requirements... |
| V-204769 | | The application server must fail to a secure state if system initialization fails, shutdown fails, or aborts fail. | Fail-secure is a condition achieved by the application server in order to ensure that in the event of an operational failure, the system does not ente... |
| V-204770 | | The application server must protect the confidentiality and integrity of all information at rest. | When data is written to digital media such as hard drives, mobile computers, external/removable hard drives, personal digital assistants, flash/thumb ... |
| V-204771 | | The application server must employ cryptographic mechanisms to ensure confidentiality and integrity of all information at rest when stored off-line. | This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers user information and sys... |
| V-204772 | | The application server must check the validity of all data inputs to the management interface, except those specifically identified by the organization. | Invalid user input occurs when a user inserts data or characters into an applications data entry field and the application is unprepared to process th... |
| V-204773 | | The application server must identify potentially security-relevant error conditions. | The structure and content of error messages need to be carefully considered by the organization and development team. Any application providing too m... |
| V-204774 | | The application server must only generate error messages that provide information necessary for corrective actions without revealing sensitive or potentially harmful information in error logs and administrative messages. | Any application providing too much information in error logs and in administrative messages to the screen risks compromising the data and security of ... |
| V-204775 | | The application server must restrict error messages only to authorized users. | If the application provides too much information in error logs and administrative messages to the screen, this could lead to compromise. The structure... |
| V-204776 | | The application server must use cryptographic mechanisms to protect the integrity of log tools. | Protecting the integrity of the tools used for logging purposes is a critical step in ensuring the integrity of log data. Log data includes all inform... |
| V-204777 | | The application server must automatically terminate a user session after organization-defined conditions or trigger events requiring a session disconnect. | An attacker can take advantage of user sessions that are left open, thus bypassing the user authentication process.
To thwart the vulnerability of op... |
| V-204778 | | The application server management interface must provide a logout capability for user-initiated communication session. | If a user cannot explicitly end an application server management interface session, the session may remain open and be exploited by an attacker; this ... |
| V-204779 | | The application server management interface must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions. | Providing a logout capability to the user allows the user to explicitly close a session and free those resources used during the session.
If a user c... |
| V-204780 | | The application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in process. | The application server provides a framework for applications to communicate between each other to form an overall well-designed application to perform... |
| V-204781 | | The application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission. | The application server provides a framework for applications to communicate between each other to form an overall well-designed application to perform... |
| V-204782 | | The application server must control remote access methods. | Application servers provide remote access capability and must be able to enforce remote access policy requirements or work in conjunction with enterpr... |
| V-204783 | | The application server must provide the capability to immediately disconnect or disable remote access to the management interface. | Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking progress would not be immediately stopped... |
| V-204784 | | The application server must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. | Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary... |
| V-204785 | | The application server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged. | In order to be able to provide a forensic history of activity, the application server must ensure users who are granted a privileged role or those who... |
| V-204788 | | The application server must allocate log record storage capacity in accordance with organization-defined log record storage requirements. | The proper management of log records not only dictates proper archiving processes and procedures be established, it also requires allocating enough st... |
| V-204789 | | The application server must off-load log records onto a different system or media from the system being logged. | Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement ... |
| V-204790 | | The application server must provide an immediate warning to the SA and ISSO, at a minimum, when allocated log record storage volume reaches 75% of maximum log record storage capacity. | It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures inclu... |
| V-204791 | | The application server must provide an immediate real-time alert to authorized users of all log failure events requiring real-time alerts. | It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures inclu... |
| V-204792 | | The application server must compare internal application server clocks at least every 24 hours with an authoritative time source. | Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating syste... |
| V-204793 | | The application server must synchronize internal application server clocks to an authoritative time source when the time difference is greater than the organization-defined time period. | Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating syste... |
| V-204794 | | The application server must record time stamps for log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). | If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis.
Time stamps generate... |
| V-204795 | | The application server must record time stamps for log records that meet a granularity of one second for a minimum degree of precision. | To investigate an incident, the log records should be easily put into chronological order. Without sufficient granularity of time stamps, the chronol... |
| V-204796 | | The application server must enforce access restrictions associated with changes to application server configuration. | When dealing with access restrictions pertaining to change control, it should be noted that any changes to the software, and/or application server con... |
| V-204797 | | The application server must log the enforcement actions used to restrict access associated with changes to the application server. | Without logging the enforcement of access restrictions against changes to the application server configuration, it will be difficult to identify attem... |
| V-204798 | | The application server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication. | Without reauthentication, users may access resources or perform tasks for which they do not have authorization.
When applications provide the capabil... |
| V-204804 | | The application server must prohibit the use of cached authenticators after an organization-defined time period. | When the application server is using PKI authentication, a local revocation cache must be stored for instances when the revocation cannot be authentic... |
| V-204805 | | The application server, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. | The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not ... |
| V-204806 | | The application server must accept Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface. | Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting ... |
| V-204807 | | The application server must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface. | Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting ... |
| V-204808 | | The application server must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials. | Access may be denied to legitimate users if FICAM-approved third-party credentials are not accepted.
This requirement typically applies to organizati... |
| V-204809 | | The application server must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles. | Without conforming to FICAM-issued profiles, the information system may not be interoperable with FICAM-authentication protocols, such as SAML 2.0 and... |
| V-204811 | | The application server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions. | Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD syst... |
| V-204814 | | The application server, when a MAC I system, must be in a high-availability (HA) cluster. | A MAC I system is a system that handles data vital to the organization's operational readiness or effectiveness of deployed or contingency forces. A ... |
| V-204815 | | The application server must protect against or limit the effects of all types of Denial of Service (DoS) attacks by employing organization-defined security safeguards. | DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or ... |
| V-204818 | | The application server must employ approved cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission. | Preventing the disclosure or modification of transmitted information requires that application servers take measures to employ approved cryptography i... |
| V-204819 | | The application server must maintain the confidentiality and integrity of information during preparation for transmission. | Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission including, for example, during aggr... |
| V-204820 | | The application server must maintain the confidentiality and integrity of information during reception. | Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protoc... |
| V-204821 | | The application server must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. | Invalid user input occurs when a user inserts data or characters into an applications data entry field and the application is unprepared to process th... |
| V-204822 | | The application server must remove organization-defined software components after updated versions have been installed. | Installation of patches and updates is performed when there are errors or security vulnerabilities in the current release of the software. When previ... |
| V-204823 | | The application server must install security-relevant software updates within the time period directed by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs). | Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovere... |
| V-204824 | | The application server must generate log records when successful/unsuccessful attempts to modify privileges occur. | Changing privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful/unsuccessful changes are made, the e... |
| V-204825 | | The application server must generate log records when successful/unsuccessful attempts to delete privileges occur. | Deleting privileges of a subject/object may cause a subject/object to gain or lose capabilities. When successful and unsuccessful privilege deletions... |
| V-204826 | | The application server must generate log records when successful/unsuccessful logon attempts occur. | Logging the access to the application server allows the system administrators to monitor user accounts. By logging successful/unsuccessful logons, th... |
| V-204827 | | The application server must generate log records for privileged activities. | Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate,... |
| V-204828 | | The application must generate log records showing starting and ending times for user access to the application server management interface. | Determining when a user has accessed the management interface is important to determine the timeline of events when a security incident occurs. Gener... |
| V-204829 | | The application server must generate log records when concurrent logons from different workstations occur to the application server management interface. | Being able to work on a system through multiple views into the application allows a user to work more efficiently and more accurately. Before environ... |
| V-204830 | | The application server must generate log records for all account creations, modifications, disabling, and termination events. | The maintenance of user accounts is a key activity within the system to determine access and privileges. Through changes to accounts, an attacker can... |
| V-204831 | | Application servers must use NIST-approved or NSA-approved key management technology and processes. | An asymmetric encryption key must be protected during transmission. The public portion of an asymmetric key pair can be freely distributed without fea... |
| V-204832 | | The application server must use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates. | Class 3 PKI certificates are used for servers and software signing rather than for identifying individuals. Class 4 certificates are used for business... |
| V-204833 | | The application server must, at a minimum, transfer the logs of interconnected systems in real time, and transfer the logs of standalone systems weekly. | Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Protecting log data is important during a forens... |
| V-204834 | | The application server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. | Configuring the application to implement organization-wide security implementation guides and security checklists ensures compliance with federal stan... |
| V-240925 | | The application server must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. | Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested encryption algorithms underm... |
| V-263549 | | The application server must disable accounts when the accounts are no longer associated to a user. | Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality, which reduce the attack... |
| V-263550 | | The application server must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information. | Audit information includes all information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and... |
| V-263551 | | The application server must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access. | The purpose of requiring a device separate from the system to which the user is attempting to gain access for one of the factors during multifactor au... |
| V-263552 | | The application server must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements. | The purpose of requiring a device separate from the system to which the user is attempting to gain access for one of the factors during multifactor au... |
| V-263553 | | The application server must protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths. | Nonlocal maintenance and diagnostic activities are conducted by individuals who communicate through either an external or internal network.
Communicat... |
| V-263554 | | The application server must include only approved trust anchors in trust stores or certificate stores managed by the organization. | Public key infrastructure (PKI) certificates are certificates with visibility external to organizational systems and certificates related to the inter... |
| V-263555 | | The application server must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store. | A Trusted Platform Module (TPM) is an example of a hardware-protected data store that can be used to protect cryptographic keys.... |
| V-263556 | | The application server must synchronize system clocks within and between systems or system components. | Time synchronization of system clocks is essential for the correct execution of many system services, including identification and authentication proc... |