Skip to content

GPOS SRG: General Purpose Operating System Security Requirements Guide

This General Purpose Operating System (GPOS) Security Requirements Guide (SRG) provides the technical security policies and requirements for applying security concepts to systems. This SRG specifies security requirements for commercial-off-the-shelf (COTS) or government- off-the-shelf (GOTS) general purpose operating systems (GPOSs) in networked environments. An operating system conformant to this SRG may be operated as a server system within a data center or a client system used directly by one or more human users. This guide assumes operation within a single security domain. Cross-domain solution (CDS) and Multi-Level Security (MLS) requirements are beyond the scope of this guide.

Scheme
public.cyber.mil /stigs/downloads/
Published by
DoD Cyber Exchange (sponsored by DISA: Defense Information Systems Agency)
  • SRG-OS-000424-GPOS-00188

    The operating system must implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information...
  • SRG-OS-000425-GPOS-00189

    The operating system must maintain the confidentiality and integrity of information during preparation for transmission.
  • SRG-OS-000426-GPOS-00190

    The operating system must maintain the confidentiality and integrity of information during reception.
  • SRG-OS-000433-GPOS-00192

    The operating system must implement non-executable data to protect its memory from unauthorized code execution.
  • SRG-OS-000433-GPOS-00193

    The operating system must implement address space layout randomization to protect its memory from unauthorized code execution.
  • SRG-OS-000437-GPOS-00194

    The operating system must remove all software components after updated versions have been installed.
  • SRG-OS-000445-GPOS-00199

    The operating system must verify correct operation of all security functions.
  • SRG-OS-000446-GPOS-00200

    The operating system must perform verification of the correct operation of security functions: upon system start-up and/or restart; upon command by...
  • SRG-OS-000447-GPOS-00201

    The operating system must shut down the information system, restart the information system, and/or notify the system administrator when anomalies i...
  • SRG-OS-000458-GPOS-00203

    The operating system must generate audit records when successful/unsuccessful attempts to access security objects occur.

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules