Skip to content

Solaris 11 SPARC Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480

    Group
  • SRG-OS-000480

    Group
  • SRG-OS-000480

    Group
  • SRG-OS-000480

    Group
  • The system must set maximum number of incoming connections to 1024.

    This setting controls the maximum number of incoming connections that can be accepted on a TCP port limiting exposure to denial of service attacks.
    Rule Low Severity
  • SRG-OS-000480

    Group
  • The system must disable network routing unless required.

    The network routing daemon, in.routed, manages network routing tables. If enabled, it periodically supplies copies of the system's routing tables to any directly connected hosts and networks and pi...
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • SRG-OS-000480

    Group
  • The boundary protection system (firewall) must be configured to deny network traffic by default and must allow network traffic by exception (i.e., deny all, permit by exception).

    A firewall that relies on a deny all, permit by exception strategy requires all traffic to have explicit permission before traversing an interface on the host. The firewall must incorporate statefu...
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • The system must prevent local applications from generating source-routed packets.

    Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security me...
    Rule Low Severity
  • SRG-OS-000023

    Group
  • The operating system must display the DoD approved system use notification message or banner before granting access to the system for general system logons.

    Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must include the name of the organization that owns the system and any monito...
    Rule Low Severity
  • SRG-OS-000023

    Group
  • The operating system must display the DoD approved system use notification message or banner for SSH connections.

    Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must include the name of the organization that owns the system and any monito...
    Rule Low Severity
  • SRG-OS-000023

    Group
  • The GNOME service must display the DoD approved system use notification message or banner before granting access to the system.

    Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must include the name of the organization that owns the system and any monito...
    Rule Low Severity
  • SRG-OS-000023

    Group
  • The FTP service must display the DoD approved system use notification message or banner before granting access to the system.

    Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must include the name of the organization that owns the system and any monito...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules