Skip to content

General Purpose Operating System Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000037

    Group
  • SRG-OS-000038

    Group
  • The operating system must produce audit records containing information to establish when (date and time) the events occurred.

    Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In order to compile an accurate risk assessment a...
    Rule Medium Severity
  • SRG-OS-000039

    Group
  • SRG-OS-000040

    Group
  • The operating system must produce audit records containing information to establish the source of the events.

    Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In addition to logging where events occur with...
    Rule Medium Severity
  • SRG-OS-000041

    Group
  • SRG-OS-000042

    Group
  • The operating system must generate audit records containing the full-text recording of privileged commands.

    Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...
    Rule Medium Severity
  • SRG-OS-000042

    Group
  • SRG-OS-000046

    Group
  • The operating system must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...
    Rule Medium Severity
  • SRG-OS-000051

    Group
  • SRG-OS-000054

    Group
  • SRG-OS-000055

    Group
  • The operating system must use internal system clocks to generate time stamps for audit records.

    Without an internal clock used as the reference for the time stored on each event to provide a trusted common reference for the time, forensic analysis would be impeded. Determining the correct tim...
    Rule Medium Severity
  • SRG-OS-000057

    Group
  • SRG-OS-000058

    Group
  • The operating system must protect audit information from unauthorized modification.

    If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity o...
    Rule Medium Severity
  • SRG-OS-000059

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules