Skip to content

Solaris 11 SPARC Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480

    Group
  • The rpcbind service must be configured for local only services unless organizationally defined.

    The portmap and rpcbind services increase the attack surface of the system and should only be used when needed. The portmap or rpcbind services are used by a variety of services using remote proced...
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • The VNC server package must not be installed unless required.

    The VNC service uses weak authentication capabilities and provides the user complete graphical system access.
    Rule Medium Severity
  • SRG-OS-000095

    Group
  • SRG-OS-000480

    Group
  • All run control scripts must have mode 0755 or less permissive.

    If the startup files are writable by other users, these users could modify the startup files to insert malicious commands into the startup files.
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • SRG-OS-000480

    Group
  • SRG-OS-000480

    Group
  • Run control scripts library search paths must contain only authorized paths.

    The library search path environment variable(s) contain a list of directories for the dynamic linker to search to find libraries. If this path includes the current working directory or other relati...
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • Run control scripts lists of preloaded libraries must contain only authorized paths.

    The library preload list environment variable contains a list of libraries for the dynamic linker to load before loading the libraries required by the binary. If this list contains paths to librari...
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • SRG-OS-000480

    Group
  • SRG-OS-000480

    Group
  • SRG-OS-000480

    Group
  • SRG-OS-000480

    Group
  • Any X Windows host must write .Xauthority files.

    .Xauthority files ensure the user is authorized to access the specific X Windows host. If .Xauthority files are not used, it may be possible to obtain unauthorized access to the X Windows host.
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • SRG-OS-000480

    Group
  • The .Xauthority files must not have extended ACLs.

    .Xauthority files ensure the user is authorized to access the specific X Windows host. Extended ACLs may permit unauthorized modification of these files, which could lead to Denial of Service to au...
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • X displays must not be exported to the world.

    Open X displays allow an attacker to capture keystrokes and to execute commands remotely. Many users have their X Server set to xhost +, permitting access to the X Server by anyone, from anywhere.
    Rule High Severity
  • SRG-OS-000480

    Group
  • .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server.

    If access to the X server is not restricted, a user's X session may be compromised.
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • The .Xauthority utility must only permit access to authorized hosts.

    If unauthorized clients are permitted access to the X server, a user's X session may be compromised.
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • SRG-OS-000480

    Group
  • The graphical login service provides the capability of logging into the system using an X-Windows type interface from the console. If graphical login access for the console is required, the service must be in local-only mode.

    Externally accessible graphical desktop software may open the system to remote attacks.
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • Generic Security Services (GSS) must be disabled.

    This service should be disabled if it is not required.
    Rule Low Severity
  • SRG-OS-000480

    Group
  • Systems services that are not required must be disabled.

    Services that are enabled but not required by the mission may provide excessive access or additional attack vectors to penetrate the system.
    Rule Low Severity
  • SRG-OS-000480

    Group
  • TCP Wrappers must be enabled and configured per site policy to only allow access by approved hosts and services.

    TCP Wrappers are a host-based access control system that allows administrators to control who has access to various network services based on the IP address of the remote end of the connection. TCP...
    Rule Medium Severity
  • SRG-OS-000076

    Group
  • User passwords must be changed at least every 60 days.

    Limiting the lifespan of authenticators limits the period of time an unauthorized user has access to the system while using compromised credentials and reduces the period of time available for pass...
    Rule Medium Severity
  • SRG-OS-000002

    Group
  • The operating system must automatically terminate temporary accounts within 72 hours.

    If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain unauthorized access. To mitigate this risk, automated termination of al...
    Rule Low Severity
  • SRG-OS-000075

    Group
  • SRG-OS-000078

    Group
  • SRG-OS-000072

    Group
  • The system must require at least eight characters be changed between the old and new passwords during a password change.

    To ensure password changes are effective in their goals, the system must ensure old and new passwords have significant differences. Without significant changes, new passwords may be easily guessed ...
    Rule Medium Severity
  • SRG-OS-000069

    Group
  • The system must require passwords to contain at least one uppercase alphabetic character.

    Complex passwords can reduce the likelihood of success of automated password-guessing attacks.
    Rule Medium Severity
  • SRG-OS-000070

    Group
  • SRG-OS-000071

    Group
  • The system must require passwords to contain at least one numeric character.

    Complex passwords can reduce the likelihood of success of automated password-guessing attacks.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules