Check: APSC-DV-003000
Application Security and Development STIG:
APSC-DV-003000
(in versions v5 r3 through v4 r2)
Title
Access privileges to the Configuration Management (CM) repository must be reviewed every three months. (Cat II impact)
Discussion
A Configuration Management (CM) repository is used to manage application code versions and to securely store application code. Incorrect access privileges to the CM repository can lead to malicious code or unintentional code being introduced into the application. This requirement is intended to be applied to application developers or organizations responsible for code management or who have and operate an application CM repository.
Check Content
Review the application system documentation. Interview the application administrator. Identify if development of the application is done in house and if application configuration management repository exists. If application development is not done in house and if a code configuration management repository does not exist, the requirement is not applicable. Review CM management processes and procedures. Verify the CM repository access permissions are reviewed at least every three months. Ask the application administrator or the CM administrator when the last time the CM access privileges were reviewed. If CM access privileges have not been reviewed within the last three months, this is a finding.
Fix Text
Review access privileges to the CM repository at least every three months.
Additional Identifiers
Rule ID: SV-222631r879887_rule
Vulnerability ID: V-222631
Group Title: SRG-APP-000516
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
CCI-001795 |
The organization implements a configuration management plan for the information system that establishes a process for managing the configuration of the configuration items. |