Check for Standalone mode | DISA JBoss EAP 6.3 STIG v2r5 | Unix | |
DISA_STIG_JBoss_EAP_6.3_v2r5.audit from DISA JBoss Enterprise Application Platform 6.3 v2r5 STIG | DISA JBoss EAP 6.3 STIG v2r5 | Unix | |
java.security.policy | DISA JBoss EAP 6.3 STIG v2r5 | Unix | |
JBOS-AS-000010 - HTTP management session traffic must be encrypted. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | ACCESS CONTROL |
JBOS-AS-000015 - HTTPS must be enabled for JBoss web interfaces. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | ACCESS CONTROL |
JBOS-AS-000030 - The Java Security Manager must be enabled for the JBoss application server. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | ACCESS CONTROL |
JBOS-AS-000040 - Users in JBoss Management Security Realms must be in the appropriate role. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | ACCESS CONTROL |
JBOS-AS-000045 - Silent Authentication must be removed from the Default Application Security Realm. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | ACCESS CONTROL |
JBOS-AS-000050 - Silent Authentication must be removed from the Default Management Security Realm. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | ACCESS CONTROL |
JBOS-AS-000075 - JBoss management interfaces must be secured. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | ACCESS CONTROL |
JBOS-AS-000080 - The JBoss server must generate log records for access and authentication events to the management interface. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
JBOS-AS-000105 - JBoss must be configured to log the IP address of the remote system connecting to the JBoss system/cluster. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
JBOS-AS-000135 - JBoss ROOT logger must be configured to utilize the appropriate logging level. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
JBOS-AS-000165 - File permissions must be configured to protect log information from any type of unauthorized read access. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
JBOS-AS-000170 - File permissions must be configured to protect log information from unauthorized modification. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
JBOS-AS-000175 - File permissions must be configured to protect log information from unauthorized deletion. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
JBOS-AS-000195 - JBoss log records must be off-loaded onto a different system or system component a minimum of every seven days. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
JBOS-AS-000210 - mgmt-users.properties file permissions must be set to allow access to authorized users only. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | CONFIGURATION MANAGEMENT |
JBOS-AS-000220 - JBoss process owner interactive access must be restricted. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | CONFIGURATION MANAGEMENT |
JBOS-AS-000225 - Google Analytics must be disabled in EAP Console. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | CONFIGURATION MANAGEMENT |
JBOS-AS-000230 - JBoss process owner execution permissions must be limited. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | CONFIGURATION MANAGEMENT |
JBOS-AS-000240 - Remote access to JMX subsystem must be disabled. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | CONFIGURATION MANAGEMENT |
JBOS-AS-000245 - Welcome Web Application must be disabled - Welcome Web Application must be disabled. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | CONFIGURATION MANAGEMENT |
JBOS-AS-000250 - Any unapproved applications must be removed - Any unapproved applications must be removed. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | CONFIGURATION MANAGEMENT |
JBOS-AS-000255 - JBoss application and management ports must be approved by the PPSM CAL. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | CONFIGURATION MANAGEMENT |
JBOS-AS-000260 - The JBoss Server must be configured to utilize a centralized authentication mechanism such as AD or LDAP. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | IDENTIFICATION AND AUTHENTICATION |
JBOS-AS-000285 - The JBoss server must be configured to bind the management interfaces to only management networks. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION |
JBOS-AS-000290 - JBoss management Interfaces must be integrated with a centralized authentication mechanism that is configured to manage accounts according to DoD policy. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | IDENTIFICATION AND AUTHENTICATION |
JBOS-AS-000295 - The JBoss Password Vault must be used for storing passwords or other sensitive configuration information. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | IDENTIFICATION AND AUTHENTICATION |
JBOS-AS-000300 - JBoss KeyStore and Truststore passwords must not be stored in clear text. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | IDENTIFICATION AND AUTHENTICATION |
JBOS-AS-000355 - The JBoss server must separate hosted application functionality from application server management functionality. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
JBOS-AS-000400 - JBoss file permissions must be configured to protect the confidentiality and integrity of application files. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
JBOS-AS-000425 - Access to JBoss log files must be restricted to authorized users. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | SYSTEM AND INFORMATION INTEGRITY |
JBOS-AS-000475 - The application server must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | ACCESS CONTROL |
JBOS-AS-000480 - The JBoss server must be configured to log all admin activity. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | ACCESS CONTROL |
JBOS-AS-000505 - The JBoss server must be configured to utilize syslog logging. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
JBOS-AS-000550 - Production JBoss servers must log when failed application deployments occur. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | CONFIGURATION MANAGEMENT |
JBOS-AS-000555 - Production JBoss servers must log when successful application deployments occur. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | CONFIGURATION MANAGEMENT |
JBOS-AS-000625 - JBoss must be configured to use DoD PKI-established certificate authorities for verification of the establishment of protected sessions. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
JBOS-AS-000650 - JBoss must be configured to use an approved TLS version. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
JBOS-AS-000655 - JBoss must be configured to use an approved cryptographic algorithm in conjunction with TLS. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
JBOS-AS-000695 - JBoss must be configured to generate log records when successful/unsuccessful attempts to delete privileges occur. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
JBOS-AS-000715 - JBoss must be configured to generate log records when concurrent logons from different workstations occur to the application server management interface. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
JBOS-AS-000730 - The JBoss server must be configured to use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
JBOS-AS-000735 - JBoss servers must be configured to roll over and transfer logs on a minimum weekly basis. | DISA JBoss EAP 6.3 STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
keystore file | DISA JBoss EAP 6.3 STIG v2r5 | Unix | |
RedHat/CentOS 5 is installed | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | |
ssh DenyUsers | DISA JBoss EAP 6.3 STIG v2r5 | Unix | |
WN19-00-000410 - Windows Server 2019 must not have Windows PowerShell 2.0 installed. | DISA Windows Server 2019 STIG v3r2 | Windows | CONFIGURATION MANAGEMENT |
WN22-00-000410 - Windows Server 2022 must not have Windows PowerShell 2.0 installed. | DISA Windows Server 2022 STIG v2r2 | Windows | CONFIGURATION MANAGEMENT |