Skip to content

GPOS SRG: General Purpose Operating System Security Requirements Guide

This General Purpose Operating System (GPOS) Security Requirements Guide (SRG) provides the technical security policies and requirements for applying security concepts to systems. This SRG specifies security requirements for commercial-off-the-shelf (COTS) or government- off-the-shelf (GOTS) general purpose operating systems (GPOSs) in networked environments. An operating system conformant to this SRG may be operated as a server system within a data center or a client system used directly by one or more human users. This guide assumes operation within a single security domain. Cross-domain solution (CDS) and Multi-Level Security (MLS) requirements are beyond the scope of this guide.

Scheme
public.cyber.mil /stigs/downloads/
Published by
DoD Cyber Exchange (sponsored by DISA: Defense Information Systems Agency)
  • SRG-OS-000276-GPOS-00106

    The operating system must notify system administrators and ISSOs when accounts are disabled.
  • SRG-OS-000277-GPOS-00107

    The operating system must notify system administrators and ISSOs when accounts are removed.
  • SRG-OS-000278-GPOS-00108

    The operating system must use cryptographic mechanisms to protect the integrity of audit tools.
  • SRG-OS-000279-GPOS-00109

    The operating system must automatically terminate a user session after inactivity time-outs have expired or at shutdown.
  • SRG-OS-000297-GPOS-00115

    The operating system must control remote access methods.
  • SRG-OS-000298-GPOS-00116

    The operating system must provide the capability to immediately disconnect or disable remote access to the operating system.
  • SRG-OS-000299-GPOS-00117

    The operating system must protect wireless access to and from the system using encryption.
  • SRG-OS-000300-GPOS-00118

    The operating system must protect wireless access to the system using authentication of users and/or devices.
  • SRG-OS-000303-GPOS-00120

    The operating system must audit all account enabling actions.
  • SRG-OS-000304-GPOS-00121

    The operating system must notify system administrators (SAs) and information system security officers (ISSOs) of account enabling actions.

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules