Solaris 11 X86 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The centralized process core dump data directory must be owned by root.
Process core dumps contain the memory in use by the process when it crashed. Any data the process was handling may be contained in the core file, and it must be protected accordingly. If the centra...Rule Medium Severity -
SRG-OS-000480
Group -
The centralized process core dump data directory must be group-owned by root, bin, or sys.
Process core dumps contain the memory in use by the process when it crashed. Any data the process was handling may be contained in the core file, and it must be protected accordingly. If the centra...Rule Medium Severity -
SRG-OS-000480
Group -
The centralized process core dump data directory must have mode 0700 or less permissive.
Process core dumps contain the memory in use by the process when it crashed. Any data the process was handling may be contained in the core file, and it must be protected accordingly. If the proces...Rule Medium Severity -
SRG-OS-000480
Group -
Kernel core dumps must be disabled unless needed.
Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a considerable amount of disk space and may result in denial of service by e...Rule Medium Severity -
SRG-OS-000480
Group -
The kernel core dump data directory must be owned by root.
Kernel core dumps may contain the full contents of system memory at the time of the crash. As the system memory may contain sensitive information, it must be protected accordingly. If the kernel co...Rule Medium Severity -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
The kernel core dump data directory must have mode 0700 or less permissive.
Kernel core dumps may contain the full contents of system memory at the time of the crash. As the system memory may contain sensitive information, it must be protected accordingly. If the mode of t...Rule Medium Severity -
SRG-OS-000480
Group -
System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others. (Intel)
A system's BIOS or system controller handles the initial startup of a system and its configuration must be protected from unauthorized modification. When the BIOS or system controller supports the ...Rule Low Severity -
SRG-OS-000480
Group -
The system must require authentication before allowing modification of the boot devices or menus. Secure the GRUB Menu (Intel).
The flexibility that GRUB provides creates a security risk if its configuration is modified by an unauthorized user. The failsafe menu entry needs to be secured in the same environments that requir...Rule Low Severity -
SRG-OS-000480
Group -
SRG-OS-000480
Group -
SNMP communities, users, and passphrases must be changed from the default.
Whether active or not, default SNMP passwords, users, and passphrases must be changed to maintain security. If the service is running with the default authenticators, then anyone can gather data ab...Rule High Severity -
SRG-OS-000480
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.