SV-213496r615939_rule
V-213496
SRG-APP-000033-AS-000024
JBOS-AS-000025
CAT I
10
Configure the Java security manager to enforce access restrictions to the host system resources in accordance with application design and resource requirements.
Obtain documentation from the admin that identifies the applications hosted on the JBoss server as well as the corresponding rights the application requires. For example, if the application requires network socket permissions and file write permissions, those requirements should be documented.
1. Identify the JBoss installation as either domain or standalone and review the relevant configuration file.
For domain installs: JBOSS_HOME/bin/domain.conf
For standalone installs: JBOSS_HOME/bin/standalone.conf
2. Identify the location and name of the security policy by reading the JAVA_OPTS flag -Djava.security.policy=<file name> where <file name> will indicate name and location of security policy. If the application uses a policy URL, obtain URL and policy file from system admin.
3. Review security policy and ensure hosted applications have the appropriate restrictions placed on them as per documented application functionality requirements.
If the security policy does not restrict application access to host resources as per documented requirements, this is a finding.
V-213496
False
JBOS-AS-000025
Obtain documentation from the admin that identifies the applications hosted on the JBoss server as well as the corresponding rights the application requires. For example, if the application requires network socket permissions and file write permissions, those requirements should be documented.
1. Identify the JBoss installation as either domain or standalone and review the relevant configuration file.
For domain installs: JBOSS_HOME/bin/domain.conf
For standalone installs: JBOSS_HOME/bin/standalone.conf
2. Identify the location and name of the security policy by reading the JAVA_OPTS flag -Djava.security.policy=<file name> where <file name> will indicate name and location of security policy. If the application uses a policy URL, obtain URL and policy file from system admin.
3. Review security policy and ensure hosted applications have the appropriate restrictions placed on them as per documented application functionality requirements.
If the security policy does not restrict application access to host resources as per documented requirements, this is a finding.
M
3987