STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Application Server Security Requirements Guide

Version

V4R4

Benchmark ID

Application_Server_SRG

Total Checks

137

Tags

application
CAT I: 11CAT II: 126CAT III: 0

This Security Requirements Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSON

Checks (137)

V-204708MEDIUMThe application server must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.V-204709MEDIUMThe application server must use encryption strength in accordance with the categorization of the management data during remote access management sessions.V-204710MEDIUMThe application server must implement cryptography mechanisms to protect the integrity of the remote access session.V-204711MEDIUMThe application server must ensure remote sessions for accessing security functions and security-relevant information are logged.V-204712MEDIUMThe application server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.V-204713MEDIUMThe application server management interface must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.V-204714MEDIUMThe application server management interface must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.V-204715MEDIUMThe application server must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.V-204716MEDIUMFor application servers providing log record aggregation, the application server must compile log records from organization-defined information system components into a system-wide log trail that is time-correlated with an organization-defined level of tolerance for the relationship between time stamps of individual records in the log trail.V-204717MEDIUMThe application server must generate log records for access and authentication events.V-204718MEDIUMThe application server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which logable events are to be logged.V-204719MEDIUMThe application server must generate log records when successful/unsuccessful attempts to access subject privileges occur.V-204720MEDIUMThe application server must initiate session logging upon startup.V-204721MEDIUMThe application server must produce log records containing information to establish what type of events occurred.V-204722MEDIUMThe application server must produce log records containing sufficient information to establish when (date and time) the events occurred.V-204723MEDIUMThe application server must produce log records containing sufficient information to establish where the events occurred.V-204724MEDIUMThe application server must produce log records containing sufficient information to establish the sources of the events.V-204725MEDIUMThe application server must produce log records that contain sufficient information to establish the outcome of events.V-204726MEDIUMThe application server must generate log records containing information that establishes the identity of any individual or process associated with the event.V-204727MEDIUMThe application server must generate log records containing the full-text recording of privileged commands or the individual identities of group account users.V-204728MEDIUMThe application server must alert the SA and ISSO, at a minimum, in the event of a log processing failure.V-204731MEDIUMThe application server must use internal system clocks to generate time stamps for log records.V-204732MEDIUMThe application server must protect log information from any type of unauthorized read access.V-204733MEDIUMThe application server must protect log information from unauthorized modification.V-204734MEDIUMThe application server must protect log information from unauthorized deletion.V-204735MEDIUMThe application server must protect log tools from unauthorized access.V-204736MEDIUMThe application server must protect log tools from unauthorized modification.V-204737MEDIUMThe application server must protect log tools from unauthorized deletion.V-204738MEDIUMThe application server must back up log records at least every seven days onto a different system or system component than the system or component being logged.V-204739MEDIUMThe application server must use cryptographic mechanisms to protect the integrity of log information.V-204740MEDIUMThe application server must prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate recognized and approved by the organization.V-204741MEDIUMThe application server must limit privileges to change the software resident within software libraries.V-204742MEDIUMThe application server must be capable of reverting to the last known good configuration in the event of failed installations and upgrades.V-204743MEDIUMThe application server must adhere to the principles of least functionality by providing only essential capabilities.V-204744MEDIUMThe application server must prohibit or restrict the use of nonsecure ports, protocols, modules, and/or services as defined in the PPSM CAL and vulnerability assessments.V-204745MEDIUMThe application server must use an approved DOD enterprise identity, credential, and access management (ICAM) solution to uniquely identify and authenticate users (or processes acting on behalf of organizational users).V-204746HIGHThe application server must use multifactor authentication for network access to privileged accounts.V-204747HIGHThe application server must use multifactor authentication for local access to privileged accounts.V-204748MEDIUMThe application server must authenticate users individually prior to using a group authenticator.V-204749MEDIUMThe application server must provide security extensions to extend the SOAP protocol and provide secure authentication when accessing sensitive data.V-204750MEDIUMThe application server must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.V-204751MEDIUMThe application server must for password-based authentication, store passwords using an approved salted key derivation function, preferably using a keyed hash.V-204752MEDIUMThe application server must transmit only encrypted representations of passwords.V-204753MEDIUMThe application server must utilize encryption when using LDAP for authentication.V-204754MEDIUMThe application server must perform RFC 5280-compliant certification path validation.V-204755MEDIUMOnly authenticated system administrators or the designated PKI Sponsor for the application server must have access to the web servers private key.V-204756MEDIUMThe application server must map the authenticated identity to the individual user or group account for PKI-based authentication.V-204757MEDIUMThe application server must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.V-204758HIGHThe application server must utilize FIPS 140-2 approved encryption modules when authenticating users and processes.V-204759MEDIUMThe application server must provide a log reduction capability that supports on-demand reporting requirements.V-204760MEDIUMThe application server must identify prohibited mobile code.V-204761MEDIUMThe application server must separate hosted application functionality from application server management functionality.V-204762MEDIUMThe application server must be configured to mutually authenticate connecting proxies, application servers or gateways.V-204763MEDIUMThe application server must invalidate session identifiers upon user logout or other session termination.V-204764MEDIUMThe application server must generate a unique session identifier for each session.V-204765MEDIUMThe application server must recognize only system-generated session identifiers.V-204766HIGHThe application server must generate a unique session identifier using a FIPS 140-2 approved random number generator.V-204767MEDIUMThe application server must be configured to perform complete application deployments.V-204768MEDIUMThe application server must provide a clustering capability.V-204769MEDIUMThe application server must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.V-204770MEDIUMThe application server must protect the confidentiality and integrity of all information at rest.V-204771MEDIUMThe application server must employ cryptographic mechanisms to ensure confidentiality and integrity of all information at rest when stored off-line.V-204772MEDIUMThe application server must check the validity of all data inputs to the management interface, except those specifically identified by the organization.V-204773MEDIUMThe application server must identify potentially security-relevant error conditions.V-204774MEDIUMThe application server must only generate error messages that provide information necessary for corrective actions without revealing sensitive or potentially harmful information in error logs and administrative messages.V-204775MEDIUMThe application server must restrict error messages only to authorized users.V-204776MEDIUMThe application server must use cryptographic mechanisms to protect the integrity of log tools.V-204777MEDIUMThe application server must automatically terminate a user session after organization-defined conditions or trigger events requiring a session disconnect.V-204778MEDIUMThe application server management interface must provide a logout capability for user-initiated communication session.V-204779MEDIUMThe application server management interface must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.V-204780MEDIUMThe application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in process.V-204781MEDIUMThe application server must associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission.V-204782MEDIUMThe application server must control remote access methods.V-204783MEDIUMThe application server must provide the capability to immediately disconnect or disable remote access to the management interface.V-204784MEDIUMThe application server must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.V-204785MEDIUMThe application server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.V-204788MEDIUMThe application server must allocate log record storage capacity in accordance with organization-defined log record storage requirements.V-204789MEDIUMThe application server must off-load log records onto a different system or media from the system being logged.V-204790MEDIUMThe application server must provide an immediate warning to the SA and ISSO, at a minimum, when allocated log record storage volume reaches 75% of maximum log record storage capacity.V-204791MEDIUMThe application server must provide an immediate real-time alert to authorized users of all log failure events requiring real-time alerts.V-204792MEDIUMThe application server must compare internal application server clocks at least every 24 hours with an authoritative time source.V-204793MEDIUMThe application server must synchronize internal application server clocks to an authoritative time source when the time difference is greater than the organization-defined time period.V-204794MEDIUMThe application server must record time stamps for log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).V-204795MEDIUMThe application server must record time stamps for log records that meet a granularity of one second for a minimum degree of precision.V-204796MEDIUMThe application server must enforce access restrictions associated with changes to application server configuration.V-204797MEDIUMThe application server must log the enforcement actions used to restrict access associated with changes to the application server.V-204798MEDIUMThe application server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.V-204800HIGHThe application server must accept Personal Identity Verification (PIV) credentials to access the management interface.V-204801HIGHThe application server must electronically verify Personal Identity Verification (PIV) credentials for access to the management interface.V-204804MEDIUMThe application server must prohibit the use of cached authenticators after an organization-defined time period.V-204805MEDIUMThe application server, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.V-204806MEDIUMThe application server must accept Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface.V-204807MEDIUMThe application server must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies to access the management interface.V-204808MEDIUMThe application server must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.V-204809MEDIUMThe application server must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.V-204811MEDIUMThe application server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.V-204812HIGHThe application server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components.V-204813HIGHThe application must implement cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components.V-204814MEDIUMThe application server, when a MAC I system, must be in a high-availability (HA) cluster.V-204815MEDIUMThe application server must protect against or limit the effects of all types of Denial of Service (DoS) attacks by employing organization-defined security safeguards.V-204816HIGHThe application server must protect the confidentiality and integrity of transmitted information through the use of an approved TLS version.V-204817HIGHThe application server must remove all export ciphers to protect the confidentiality and integrity of transmitted information.V-204818MEDIUMThe application server must employ approved cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.V-204819MEDIUMThe application server must maintain the confidentiality and integrity of information during preparation for transmission.V-204820MEDIUMThe application server must maintain the confidentiality and integrity of information during reception.V-204821MEDIUMThe application server must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.V-204822MEDIUMThe application server must remove organization-defined software components after updated versions have been installed.V-204823MEDIUMThe application server must install security-relevant software updates within 30 days unless the time period is directed by an authoritative source (e.g., IAVM, CTOs, DTMs, STIGs).V-204824MEDIUMThe application server must generate log records when successful/unsuccessful attempts to modify privileges occur.V-204825MEDIUMThe application server must generate log records when successful/unsuccessful attempts to delete privileges occur.V-204826MEDIUMThe application server must generate log records when successful/unsuccessful logon attempts occur.V-204827MEDIUMThe application server must generate log records for privileged activities.V-204828MEDIUMThe application must generate log records showing starting and ending times for user access to the application server management interface.V-204829MEDIUMThe application server must generate log records when concurrent logons from different workstations occur to the application server management interface.V-204830MEDIUMThe application server must generate log records for all account creations, modifications, disabling, and termination events.V-204831MEDIUMApplication servers must use NIST-approved or NSA-approved key management technology and processes.V-204832MEDIUMThe application server must use DOD- or CNSS-approved PKI Class 3 or Class 4 certificates.V-204833MEDIUMThe application server must, at a minimum, transfer the logs of interconnected systems in real time, and transfer the logs of standalone systems weekly.V-204834MEDIUMThe application server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.V-240925MEDIUMThe application server must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.V-263549MEDIUMThe application server must disable accounts when the accounts are no longer associated to a user.V-263550MEDIUMThe application server must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.V-263551MEDIUMThe application server must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.V-263552MEDIUMThe application server must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.V-263553MEDIUMThe application server must protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.V-263554MEDIUMThe application server must include only approved trust anchors in trust stores or certificate stores managed by the organization.V-263555MEDIUMThe application server must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.V-263556MEDIUMThe application server must synchronize system clocks within and between systems or system components.V-278959MEDIUMThe application server must dynamically associate security attributes with organization-defined subjects in accordance with organization-defined security policies as information is created and combined.V-278960MEDIUMThe application server must uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.V-278961MEDIUMThe application server must enforce attribute-based control access over defined subjects and objects based upon organization-defined attributes to assume access permissions.V-278962MEDIUMThe application server must attach data tags containing organization-defined authorized processing to organization-defined elements of personally identifiable information.V-278963MEDIUMThe application server must attach data tags containing organization-defined processing purposes to organization-defined elements of personally identifiable information.V-278964MEDIUMThe application server must employ automated mechanisms to integrate intrusion detection mechanisms into access control mechanisms.V-278965MEDIUMThe application server must dynamically associate security attributes with organization-defined objects in accordance with organization-defined security policies as information is created and combined.V-278966MEDIUMThe application server must enforce a role-based access control (RBAC) policy over defined subjects and objects.V-278967HIGHThe application server must be a version supported by the vendor.