Solaris 11 X86 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000480
Group -
The kernel core dump data directory must have mode 0700 or less permissive.
Kernel core dumps may contain the full contents of system memory at the time of the crash. As the system memory may contain sensitive information, it must be protected accordingly. If the mode of t...Rule Medium Severity -
SRG-OS-000480
Group -
System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others. (Intel)
A system's BIOS or system controller handles the initial startup of a system and its configuration must be protected from unauthorized modification. When the BIOS or system controller supports the ...Rule Low Severity -
SRG-OS-000480
Group -
The system must require authentication before allowing modification of the boot devices or menus. Secure the GRUB Menu (Intel).
The flexibility that GRUB provides creates a security risk if its configuration is modified by an unauthorized user. The failsafe menu entry needs to be secured in the same environments that requir...Rule Low Severity -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
SNMP communities, users, and passphrases must be changed from the default.
Whether active or not, default SNMP passwords, users, and passphrases must be changed to maintain security. If the service is running with the default authenticators, then anyone can gather data ab...Rule High Severity -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
The operating system must conduct backups of user-level information contained in the operating system per organization-defined frequency to conduct backups consistent with recovery time and recovery point objectives.
Operating system backup is a critical step in maintaining data assurance and availability. User-level information is data generated by information system and/or application users. Backups shall ...Rule Medium Severity -
SRG-OS-000480
Group -
SRG-OS-000181
Group -
SRG-OS-000027
Group -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
The system must ignore ICMP redirect messages.
Ignoring ICMP redirect messages reduces the likelihood of denial of service attacks.Rule Low Severity -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
The system must disable ICMP redirect messages.
A malicious user can exploit the ability of the system to send ICMP redirects by continually sending packets to the system, forcing the system to respond with ICMP redirect messages, resulting in a...Rule Low Severity -
SRG-OS-000480
Group -
The system must disable TCP reverse IP source routing.
If enabled, reverse IP source routing would allow an attacker to more easily complete a three-way TCP handshake and spoof new connections.Rule Low Severity -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
The system must disable network routing unless required.
The network routing daemon, in.routed, manages network routing tables. If enabled, it periodically supplies copies of the system's routing tables to any directly connected hosts and networks and pi...Rule Medium Severity -
SRG-OS-000480
Group -
The system must implement TCP Wrappers.
TCP Wrappers is a host-based access control system that allows administrators to control who has access to various network services based on the IP address of the remote end of the connection. TCP ...Rule Low Severity -
SRG-OS-000480
Group -
The boundary protection system (firewall) must be configured to deny network traffic by default and must allow network traffic by exception (i.e., deny all, permit by exception).
A firewall that relies on a deny all, permit by exception strategy requires all traffic to have explicit permission before traversing an interface on the host. The firewall must incorporate statefu...Rule Medium Severity -
SRG-OS-000480
Group -
The system must prevent local applications from generating source-routed packets.
Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security me...Rule Low Severity -
SRG-OS-000023
Group -
The operating system must display the DoD approved system use notification message or banner before granting access to the system for general system logons.
Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must include the name of the organization that owns the system and any monito...Rule Low Severity -
SRG-OS-000023
Group -
The operating system must display the DoD approved system use notification message or banner for SSH connections.
Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must include the name of the organization that owns the system and any monito...Rule Low Severity -
SRG-OS-000023
Group -
The GNOME service must display the DoD approved system use notification message or banner before granting access to the system.
Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must include the name of the organization that owns the system and any monito...Rule Low Severity -
SRG-OS-000023
Group -
SRG-OS-000126
Group -
SRG-OS-000480
Group -
The operating system must prevent internal users from sending out packets which attempt to manipulate or spoof invalid IP addresses.
Manipulation of IP addresses can allow untrusted systems to appear as trusted hosts, bypassing firewall and other security mechanism and resulting in system penetration.Rule Medium Severity -
SRG-OS-000481
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.