Skip to content

SLES 12 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • Vendor-packaged SUSE operating system security patches and updates must be installed and up to date.

    Timely patching is critical for maintaining the operational availability, confidentiality, and integrity of information technology (IT) systems. However, failure to keep SUSE operating system and a...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    Group
  • SRG-OS-000023-GPOS-00006

    Group
  • SRG-OS-000228-GPOS-00088

    Group
  • The SUSE operating system must display a banner before granting local or remote access to the system via a graphical user logon.

    Display of a standardized and approved use notification before granting access to the SUSE operating system ensures privacy and security notification verbiage used is consistent with applicable fed...
    Rule Medium Severity
  • SRG-OS-000228-GPOS-00088

    Group
  • The SUSE operating system must display the approved Standard Mandatory DoD Notice before granting local or remote access to the system via a graphical user logon.

    Display of a standardized and approved use notification before granting access to the SUSE operating system ensures privacy and security notification verbiage used is consistent with applicable fed...
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    Group
  • The SUSE operating system must be able to lock the graphical user interface (GUI).

    A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not want to log out because of the temporary...
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    Group
  • SRG-OS-000029-GPOS-00010

    Group
  • The SUSE operating system must initiate a session lock after a 15-minute period of inactivity for the graphical user interface.

    A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporar...
    Rule Medium Severity
  • SRG-OS-000029-GPOS-00010

    Group
  • The SUSE operating system must initiate a session lock after a 10-minute period of inactivity.

    A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporar...
    Rule Medium Severity
  • SRG-OS-000031-GPOS-00012

    Group
  • SRG-OS-000373-GPOS-00156

    Group
  • The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges.

    Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When SUSE operating system provide the capability to change user authenticators, ch...
    Rule High Severity
  • SRG-OS-000027-GPOS-00008

    Group
  • SRG-OS-000021-GPOS-00005

    Group
  • The SUSE operating system must lock an account after three consecutive invalid access attempts.

    By limiting the number of failed access attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by lockin...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00226

    Group
  • The SUSE operating system must enforce a delay of at least four (4) seconds between logon prompts following a failed logon attempt.

    Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.
    Rule Medium Severity
  • SRG-OS-000069-GPOS-00037

    Group
  • The SUSE operating system must enforce passwords that contain at least one upper-case character.

    Use of a complex password helps increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting a...
    Rule Medium Severity
  • SRG-OS-000070-GPOS-00038

    Group
  • The SUSE operating system must enforce passwords that contain at least one lower-case character.

    Use of a complex password helps increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting a...
    Rule Medium Severity
  • SRG-OS-000071-GPOS-00039

    Group
  • SRG-OS-000266-GPOS-00101

    Group
  • The SUSE operating system must enforce passwords that contain at least one special character.

    Use of a complex password helps increase the time and resources required to compromise the password. Password complexity or strength is a measure of the effectiveness of a password in resisting att...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    Group
  • The SUSE operating system must require the change of at least eight (8) of the total number of characters when passwords are changed.

    If the SUSE operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for at...
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    Group
  • The SUSE operating system must employ FIPS 140-2 approved cryptographic hashing algorithm for system authentication (login.defs).

    Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied on to provide confidentiality or integrity, and DoD data may be co...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords.

    The system must use a strong hashing algorithm to store the password. The system must use a sufficient number of hashing rounds to ensure the required level of entropy. Passwords need to be protec...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • The SUSE operating system must not be configured to allow blank or null passwords.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily ...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • The SUSE operating system must employ FIPS 140-3 approved cryptographic hashing algorithms for all stored passwords.

    The system must use a strong hashing algorithm to store the password. The system must use a sufficient number of hashing rounds to ensure the required level of entropy. Passwords need to be protec...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • The SUSE operating system must employ passwords with a minimum of 15 characters.

    The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...
    Rule Medium Severity
  • SRG-OS-000075-GPOS-00043

    Group
  • The SUSE operating system must be configured to create or update passwords with a minimum lifetime of 24 hours (one day).

    Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually ch...
    Rule Medium Severity
  • SRG-OS-000075-GPOS-00043

    Group
  • The SUSE operating system must employ user passwords with a minimum lifetime of 24 hours (one day).

    Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually ch...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • SRG-OS-000076-GPOS-00044

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules