Skip to content

General Purpose Operating System Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000185

    Group
  • The operating system must protect the confidentiality and integrity of all information at rest.

    Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive, when used for backups) within an operating system. This re...
    Rule Medium Severity
  • SRG-OS-000205

    Group
  • SRG-OS-000206

    Group
  • The operating system must reveal error messages only to authorized users.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...
    Rule Medium Severity
  • SRG-OS-000228

    Group
  • SRG-OS-000239

    Group
  • SRG-OS-000240

    Group
  • SRG-OS-000241

    Group
  • The operating system must audit all account removal actions.

    When operating system accounts are removed, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the operating system processes themselves. In o...
    Rule Medium Severity
  • SRG-OS-000250

    Group
  • The operating system must implement cryptography to protect the integrity of remote access sessions.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an auth...
    Rule High Severity
  • SRG-OS-000254

    Group
  • The operating system must initiate session audits at system start-up.

    If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enab...
    Rule Medium Severity
  • SRG-OS-000255

    Group
  • SRG-OS-000256

    Group
  • SRG-OS-000257

    Group
  • SRG-OS-000258

    Group
  • The operating system must protect audit tools from unauthorized deletion.

    Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...
    Rule Medium Severity
  • SRG-OS-000259

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules