Skip to content

SUSE Linux Enterprise Server 15 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The SUSE operating system must generate audit records for all uses of the privileged functions.

    Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...
    Rule Low Severity
  • The SUSE operating system audit event multiplexor must be configured to use Kerberos.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Allowing devices and users to connect to or from the system without first authenticating them a...
    Rule Low Severity
  • The SUSE operating system must generate audit records for the /var/log/btmp file.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • Audispd must take appropriate action when the SUSE operating system audit storage is full.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
    Rule Medium Severity
  • The SUSE operating system must disable the systemd Ctrl-Alt-Delete burst key sequence.

    A locally logged-on user, who presses Ctrl-Alt-Delete when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the...
    Rule High Severity
  • All SUSE operating system local interactive user home directories must be group-owned by the home directory owner's primary group.

    If the Group Identifier (GID) of a local interactive user’s home directory is not the same as the primary GID of the user, this would allow unauthorized access to the user’s files, and users that s...
    Rule Medium Severity
  • All SUSE operating system local initialization files must have mode 0740 or less permissive.

    Local initialization files are used to configure the user's shell environment upon logon. Malicious modification of these files could compromise accounts upon logon.
    Rule Medium Severity
  • All SUSE operating system local interactive user initialization files executable search paths must contain only paths that resolve to the users home directory.

    The executable search path (typically the PATH environment variable) contains a list of directories for the shell to search to find executables. If this path includes the current working directory ...
    Rule Medium Severity
  • All SUSE operating system local initialization files must not execute world-writable programs.

    If user start-up files execute world-writable programs, especially in unprotected directories, they could be maliciously modified to destroy user files or otherwise compromise the system at the use...
    Rule Medium Severity
  • SUSE operating system file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.

    The "nosuid" mount option causes the system to not execute setuid and setgid files with owner privileges. This option must be used for mounting any file system not containing approved setuid and se...
    Rule Medium Severity
  • SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.

    The "noexec" mount option causes the system to not execute binary files. This option must be used for mounting any file system not containing approved binary files, as they may be incompatible. Exe...
    Rule Medium Severity
  • All SUSE operating system world-writable directories must be group-owned by root, sys, bin, or an application group.

    If a world-writable directory has the sticky bit set and is not group-owned by a privileged Group Identifier (GID), unauthorized users may be able to modify files created by others. The only autho...
    Rule Medium Severity
  • The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.

    The "pam-config" command line utility automatically generates a system PAM configuration as packages are installed, updated, or removed from the system. "pam-config" removes configurations for PAM ...
    Rule Medium Severity
  • The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.

    Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security me...
    Rule Medium Severity
  • The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets.

    Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security me...
    Rule Medium Severity
  • The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.

    Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security me...
    Rule Medium Severity
  • The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.

    Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security me...
    Rule Medium Severity
  • The SUSE operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.

    ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the host's route table and are unauthenticated. An ill...
    Rule Medium Severity
  • The SUSE operating system must not allow interfaces to accept Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.

    ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the host's route table and are unauthenticated. An ill...
    Rule Medium Severity
  • The SUSE operating system must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.

    ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the host's route table and are unauthenticated. An ill...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules