Virtual Machine Manager Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000031
Group -
SRG-OS-000032
Group -
The VMM must monitor remote access methods automatically.
Remote access services, such as those providing remote access to network devices and VMMs, which lack automated capabilities, increase risk and make remote user access management difficult at best....Rule Medium Severity -
SRG-OS-000033
Group -
The VMM must use DoD-approved encryption to protect the confidentiality of remote access sessions.
Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD non-public VMMs by an a...Rule Medium Severity -
SRG-OS-000037
Group -
The VMM must produce audit records containing information to establish what type of events occurred.
Without establishing what types of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. Audit record content that may be n...Rule Medium Severity -
SRG-OS-000038
Group -
The VMM must produce audit records containing information to establish when (date and time) the events occurred.
Without establishing when events occurred, it is difficult to establish, correlate, and investigate the events leading up to an outage or attack. In order to compile an accurate risk assessment an...Rule Medium Severity -
SRG-OS-000039
Group -
SRG-OS-000040
Group -
The VMM must produce audit records containing information to establish the source of the events.
Without establishing the source of an event, it is difficult to establish, correlate, and investigate the events leading up to an outage or attack. In addition to logging where events occur within...Rule Medium Severity -
SRG-OS-000041
Group -
The VMM must produce audit records containing information to establish the outcome of the events.
Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if changes were made to the security state of the sy...Rule Medium Severity -
SRG-OS-000042
Group -
SRG-OS-000046
Group -
The VMM must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
It is critical for the appropriate personnel to be aware if a VMM is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an im...Rule Medium Severity -
SRG-OS-000051
Group -
SRG-OS-000054
Group -
The VMM must support the capability to filter audit records for events of interest based upon all audit fields within audit records.
The ability to specify the event criteria that are of interest provides the individuals reviewing the logs with the ability to quickly isolate and identify these events without having to review ent...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.