Skip to content

General Purpose Operating System Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000113

    Group
  • SRG-OS-000114

    Group
  • SRG-OS-000118

    Group
  • The operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.

    Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts...
    Rule Medium Severity
  • SRG-OS-000120

    Group
  • SRG-OS-000121

    Group
  • SRG-OS-000122

    Group
  • SRG-OS-000123

    Group
  • SRG-OS-000125

    Group
  • The operating system must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.

    If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the system. The act of managing systems and applications includes the ability to...
    Rule High Severity
  • SRG-OS-000132

    Group
  • SRG-OS-000134

    Group
  • The operating system must isolate security functions from nonsecurity functions.

    An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Security functions are the hardware, software, and...
    Rule Medium Severity
  • SRG-OS-000138

    Group
  • Operating systems must prevent unauthorized and unintended information transfer via shared system resources.

    Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of ...
    Rule Medium Severity
  • SRG-OS-000142

    Group
  • SRG-OS-000163

    Group
  • The operating system must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, except to fulfill documented and validated mission requirements.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule Medium Severity
  • SRG-OS-000184

    Group
  • The operating system must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.

    Failure to a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized access to system resources. Operating systems that fail suddenly and with no ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules