SRG-APP-000516 Controls

STIG IDVersionTitleProduct
SRG-APP-000516-API-001295V1R1The API must encode outputs.Security Requirements Guide - API
SRG-APP-000516-API-001300V1R1The API must use a static type of system.Security Requirements Guide - API
SRG-APP-000516-API-001305V1R1The API must use Web Application Firewall (WAF).Security Requirements Guide - API
SRG-APP-000516-CTR-000790V2R4The container platform must provide the configuration for organization-identified individuals or roles to change the auditing to be performed on all components, based on all selectable event criteria within organization-defined time thresholds.Security Requirements Guide - Container Platform
SRG-APP-000416-CTR-001015V2R4The container platform must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Security Requirements Guide - Container Platform
SRG-APP-000516-CTR-001325V2R4Container platform components must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.Security Requirements Guide - Container Platform
SRG-APP-000516-CTR-001330V2R4The container platform must be able to store and instantiate industry standard container images.Security Requirements Guide - Container Platform
SRG-APP-000516-CTR-001335V2R4The container platform must continuously scan components, containers, and images for vulnerabilities.Security Requirements Guide - Container Platform
SRG-APP-000516-DNS-000077V4R2The salt value for zones signed using NSEC3 RRs must be changed every time the zone is completely re-signed.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000078V4R2The validity period for the RRSIGs covering a zones DNSKEY RRSet must be no less than two days and no more than one week.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000085V4R2The DNS implementation must ensure each NS record in a zone file points to an active name server authoritative for the domain specified in that record.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000086V4R2The two files generated by the dnssec-keygen program must be made accessible only to the server administrator account, or deleted, after they have been copied to the key file in the name server.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000088V4R2All authoritative name servers for a zone must have the same version of zone information.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000090V4R2Digital signature algorithm used for DNSSEC-enabled zones must be FIPS-compatible.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000091V4R2For zones split between the external and internal sides of a network, the RRs for the external hosts must be separate from the RRs for the internal hosts.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000092V4R2In a split DNS configuration, where separate name servers are used between the external and internal networks, the external name server must be configured to not be reachable from inside resolvers.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000093V4R2In a split DNS configuration, where separate name servers are used between the external and internal networks, the internal name server must be configured to not be reachable from outside resolvers.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000095V4R2Primary authoritative name servers must be configured to only receive zone transfer requests from specified secondary name servers.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000101V4R2The DNS implementation must implement internal/external role separation.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000102V4R2The DNS must utilize valid root name servers in the local root zone file.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000108V4R2The IP address for hidden master authoritative name servers must not appear in the name servers set in the zone database.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000110V4R2The platform on which the name server software is hosted must be configured to send outgoing DNS messages from a random port.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000113V4R2A zone file must not include resource records that resolve to a fully qualified domain name residing in another zone.Security Requirements Guide - Domain Name Service
SRG-APP-000516-DNS-000500V4R2The DNS server implementation must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.Security Requirements Guide - Domain Name Service
SRG-APP-000516-MFP-000195V3R4The Mainframe Product must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.Security Requirements Guide - Mainframe Product
SRG-APP-000354-MFP-000136V3R4The Mainframe Product must provide the capability for authorized users to select a user session to capture/record or view/hear.Security Requirements Guide - Mainframe Product
SRG-APP-000355-MFP-000139V3R4The Mainframe Product must provide the capability for authorized users to remotely view/hear, in real time, all content related to an established user session from a component separate from the Mainframe Product being monitored.Security Requirements Guide - Mainframe Product
SRG-APP-000516-WSR-000079V4R4All accounts installed with the web server software and tools must have passwords assigned and default passwords changed.Security Requirements Guide - Web Server
SRG-APP-000516-WSR-000174V4R4The web server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.Security Requirements Guide - Web Server