STIGQter STIGQter: STIG Summary: Application Security and Development Security Technical Implementation Guide Version: 5 Release: 1 Benchmark Date: 23 Oct 2020:

The application must notify the ISSO and ISSM of failed security verification tests.

DISA Rule

SV-222617r508029_rule

Vulnerability Number

V-222617

Group Title

SRG-APP-000275

Rule Version

APSC-DV-002780

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the application to send notices to the ISSO and ISSM indicating the application failed a verification test.

Check Contents

Review the application documentation and interview the system administrator to determine if the application performs security function testing.

If the application is not designed or intended to perform security function testing, the requirement is not applicable.

Access the application design documents or have the system administrator provide proof the application is designed to verify the correct operation of security functions.

Review application logs and take note of log entries that indicate security function testing is being performed and verified on startup, restart, or on command by an authorized user.

Review logs to identify if the application has sent notifications to ISSO and ISSM when security verification tests fail.

Review application features and function to identify areas of the management interfaces that specify where failed security verifications tests are to be sent and validate the ISSO and ISSM are configured as recipients.

If the application is designed to perform security function testing and does not notify the ISSO and ISSM of failed verification tests, this is a finding.

Vulnerability Number

V-222617

Documentable

False

Rule Version

APSC-DV-002780

Severity Override Guidance

Review the application documentation and interview the system administrator to determine if the application performs security function testing.

If the application is not designed or intended to perform security function testing, the requirement is not applicable.

Access the application design documents or have the system administrator provide proof the application is designed to verify the correct operation of security functions.

Review application logs and take note of log entries that indicate security function testing is being performed and verified on startup, restart, or on command by an authorized user.

Review logs to identify if the application has sent notifications to ISSO and ISSM when security verification tests fail.

Review application features and function to identify areas of the management interfaces that specify where failed security verifications tests are to be sent and validate the ISSO and ISSM are configured as recipients.

If the application is designed to perform security function testing and does not notify the ISSO and ISSM of failed verification tests, this is a finding.

Check Content Reference

M

Target Key

4093

Comments