Skip to content

General Purpose Operating System Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The operating system must map the authenticated identity to the user or group account for PKI-based authentication.

    Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis.
    Rule Medium Severity
  • SRG-OS-000069

    Group
  • The operating system must enforce password complexity by requiring that at least one uppercase character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000070

    Group
  • SRG-OS-000071

    Group
  • The operating system must enforce password complexity by requiring that at least one numeric character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000072

    Group
  • SRG-OS-000073

    Group
  • The operating system must store only encrypted representations of passwords.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...
    Rule High Severity
  • SRG-OS-000074

    Group
  • SRG-OS-000075

    Group
  • Operating systems must enforce 24 hours/1 day as the minimum password lifetime.

    Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually...
    Rule Medium Severity
  • SRG-OS-000076

    Group
  • SRG-OS-000078

    Group
  • The operating system must enforce a minimum 15-character password length.

    The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...
    Rule Medium Severity
  • SRG-OS-000079

    Group
  • SRG-OS-000080

    Group
  • The operating system must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000095

    Group
  • SRG-OS-000096

    Group
  • SRG-OS-000104

    Group
  • SRG-OS-000105

    Group
  • The operating system must use multifactor authentication for network access to privileged accounts.

    Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased. Multifactor authentication requires using two or more factors to achieve authenticat...
    Rule Medium Severity
  • SRG-OS-000106

    Group
  • SRG-OS-000107

    Group
  • The operating system must use multifactor authentication for local access to privileged accounts.

    To ensure accountability and prevent unauthenticated access, privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. Multifactor authenti...
    Rule Medium Severity
  • SRG-OS-000108

    Group
  • SRG-OS-000109

    Group
  • The operating system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.

    To ensure individual accountability and prevent unauthorized access, organizational users must be individually identified and authenticated. A group authenticator is a generic account used by mult...
    Rule Medium Severity
  • SRG-OS-000112

    Group
  • SRG-OS-000113

    Group
  • SRG-OS-000114

    Group
  • SRG-OS-000118

    Group
  • The operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.

    Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts...
    Rule Medium Severity
  • SRG-OS-000120

    Group
  • SRG-OS-000121

    Group
  • SRG-OS-000122

    Group
  • SRG-OS-000123

    Group
  • SRG-OS-000125

    Group
  • The operating system must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.

    If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the system. The act of managing systems and applications includes the ability to...
    Rule High Severity
  • SRG-OS-000132

    Group
  • SRG-OS-000134

    Group
  • The operating system must isolate security functions from nonsecurity functions.

    An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Security functions are the hardware, software, and...
    Rule Medium Severity
  • SRG-OS-000138

    Group
  • Operating systems must prevent unauthorized and unintended information transfer via shared system resources.

    Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of ...
    Rule Medium Severity
  • SRG-OS-000142

    Group
  • SRG-OS-000163

    Group
  • The operating system must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, except to fulfill documented and validated mission requirements.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule Medium Severity
  • SRG-OS-000184

    Group
  • The operating system must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.

    Failure to a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized access to system resources. Operating systems that fail suddenly and with no ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules