Check: APSC-DV-002980
Application Security and Development STIG:
APSC-DV-002980
(in versions v5 r3 through v4 r2)
Title
New IP addresses, data services, and associated ports used by the application must be submitted to the appropriate approving authority for the organization, which in turn will be submitted through the DoD Ports, Protocols, and Services Management (DoD PPSM) (Cat II impact)
Discussion
Failure to comply with DoD Ports, Protocols, and Services (PPS) Vulnerability Analysis and associated PPS mitigations may result in compromise of enclave boundary protections and/or functionality of the application.
Check Content
All application ports, protocols, and services needed for application operation need to be in compliance with the DoD Ports and Protocols guidance. Check: http://iase.disa.mil/ppsm/Pages/index.aspx to verify the ports, protocols, and services are in compliance with the PPS CAL. Check all necessary ports and protocols needed for application operation (only those accessed from outside the local enclave) are checked against the DoD Ports and Protocols guidance to ensure compliance. Identify the ports needed for the application: - Look at System Security Plan/Accreditation documentation - Ask System Administrator - Go to Network Administrator - Go to Network Reviewer - If a network scan is available, use it - Use netstat/task manager - Check /etc./services If the application is not in compliance with DoD Ports and Protocols guidance, this is a finding.
Fix Text
Verify the accreditation documentation lists all interfaces and the ports, protocols, and services used. Verify that all ports, protocols, and services are used in accordance with the DoD PPSM.
Additional Identifiers
Rule ID: SV-222628r879887_rule
Vulnerability ID: V-222628
Group Title: SRG-APP-000516
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
CCI-000388 |
The organization ensures compliance with organization-defined registration requirements for functions, ports, protocols, and services. |