GPOS SRG: General Purpose Operating System Security Requirements Guide
This General Purpose Operating System (GPOS) Security Requirements Guide (SRG) provides the technical security policies and requirements for applying security concepts to systems. This SRG specifies security requirements for commercial-off-the-shelf (COTS) or government- off-the-shelf (GOTS) general purpose operating systems (GPOSs) in networked environments. An operating system conformant to this SRG may be operated as a server system within a data center or a client system used directly by one or more human users. This guide assumes operation within a single security domain. Cross-domain solution (CDS) and Multi-Level Security (MLS) requirements are beyond the scope of this guide.
-
SRG-OS-000424-GPOS-00188
The operating system must implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information... -
SRG-OS-000425-GPOS-00189
The operating system must maintain the confidentiality and integrity of information during preparation for transmission. -
SRG-OS-000426-GPOS-00190
The operating system must maintain the confidentiality and integrity of information during reception. -
SRG-OS-000433-GPOS-00192
The operating system must implement non-executable data to protect its memory from unauthorized code execution. -
SRG-OS-000433-GPOS-00193
The operating system must implement address space layout randomization to protect its memory from unauthorized code execution. -
SRG-OS-000437-GPOS-00194
The operating system must remove all software components after updated versions have been installed. -
SRG-OS-000445-GPOS-00199
The operating system must verify correct operation of all security functions. -
SRG-OS-000446-GPOS-00200
The operating system must perform verification of the correct operation of security functions: upon system start-up and/or restart; upon command by... -
SRG-OS-000447-GPOS-00201
The operating system must shut down the information system, restart the information system, and/or notify the system administrator when anomalies i... -
SRG-OS-000458-GPOS-00203
The operating system must generate audit records when successful/unsuccessful attempts to access security objects occur.
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.