General Purpose Operating System Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000472
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records showing starting and ending time for user access to the system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000473
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records when concurrent logons to the same account occur from different sources.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000474
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records when successful/unsuccessful accesses to objects occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000475
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records for all direct access to the information system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000476
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records for all account creations, modifications, disabling, and termination events.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000477
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records for all kernel module load, unload, and restart actions, and also for all program initiations.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000478
<GroupDescription></GroupDescription>Group -
The operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating ...Rule High Severity -
SRG-OS-000479
<GroupDescription></GroupDescription>Group -
The operating system must, at a minimum, off-load audit data from interconnected systems in real time and off-load audit data from standalone systems weekly.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must prevent the use of dictionary words for passwords.
<VulnDiscussion>If the operating system allows the user to select passwords based on dictionary words, then this increases the chances of pas...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.
<VulnDiscussion>Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain acc...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
<VulnDiscussion>Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
<VulnDiscussion>Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary acce...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must not allow an unattended or automatic logon to the system.
<VulnDiscussion>Failure to restrict system access to authenticated users negatively impacts operating system security.</VulnDiscussion>...Rule High Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must limit the ability of non-privileged users to grant other users direct access to the contents of their home directories/folders.
<VulnDiscussion>Users' home directories/folders may contain information of a sensitive nature. Non-privileged users should coordinate any sha...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must enable an application firewall, if available.
<VulnDiscussion>Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Application firewalls ...Rule Medium Severity -
SRG-OS-000481
<GroupDescription></GroupDescription>Group -
The operating system must protect the confidentiality and integrity of communications with wireless peripherals.
<VulnDiscussion>Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unpr...Rule High Severity -
SRG-OS-000439
<GroupDescription></GroupDescription>Group -
The operating system must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
<VulnDiscussion>Security flaws with operating systems are discovered daily. Vendors are constantly updating and patching their products to ad...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.