Skip to content

SUSE Linux Enterprise Server 15 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The SUSE operating system must generate audit records for all uses of the privileged functions.

    Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...
    Rule Low Severity
  • The SUSE operating system audit event multiplexor must be configured to use Kerberos.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Allowing devices and users to connect to or from the system without first authenticating them a...
    Rule Low Severity
  • The SUSE operating system must generate audit records for the /var/log/btmp file.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • Audispd must take appropriate action when the SUSE operating system audit storage is full.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
    Rule Medium Severity
  • The SUSE operating system must disable the systemd Ctrl-Alt-Delete burst key sequence.

    A locally logged-on user, who presses Ctrl-Alt-Delete when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the...
    Rule High Severity
  • All SUSE operating system local interactive user home directories must be group-owned by the home directory owner's primary group.

    If the Group Identifier (GID) of a local interactive user’s home directory is not the same as the primary GID of the user, this would allow unauthorized access to the user’s files, and users that s...
    Rule Medium Severity
  • All SUSE operating system local initialization files must have mode 0740 or less permissive.

    Local initialization files are used to configure the user's shell environment upon logon. Malicious modification of these files could compromise accounts upon logon.
    Rule Medium Severity
  • All SUSE operating system local interactive user initialization files executable search paths must contain only paths that resolve to the users home directory.

    The executable search path (typically the PATH environment variable) contains a list of directories for the shell to search to find executables. If this path includes the current working directory ...
    Rule Medium Severity
  • All SUSE operating system local initialization files must not execute world-writable programs.

    If user start-up files execute world-writable programs, especially in unprotected directories, they could be maliciously modified to destroy user files or otherwise compromise the system at the use...
    Rule Medium Severity
  • SUSE operating system file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.

    The "nosuid" mount option causes the system to not execute setuid and setgid files with owner privileges. This option must be used for mounting any file system not containing approved setuid and se...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules