Oracle Linux 8 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
OL 8 systems below version 8.2 must log user name information when unsuccessful logon attempts occur.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
<GroupDescription></GroupDescription>Group -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
OL 8 systems, versions 8.2 and above, must log user name information when unsuccessful logon attempts occur.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
A sticky bit must be set on all OL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.
<VulnDiscussion>Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...Rule Medium Severity -
SRG-OS-000126-GPOS-00066
<GroupDescription></GroupDescription>Group -
OL 8 systems below version 8.2 must include root when automatically locking an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
OL 8 systems, versions 8.2 and above, must include root when automatically locking an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-OS-000027-GPOS-00008
<GroupDescription></GroupDescription>Group -
OL 8 must limit the number of concurrent sessions to 10 for all accounts and/or account types.
<VulnDiscussion>Operating system management includes the ability to control the number of users and user sessions that use an operating syste...Rule Low Severity -
OL 8 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.
<VulnDiscussion>Terminating an unresponsive SSH session within a short time period reduces the window of opportunity for unauthorized personn...Rule Medium Severity -
SRG-OS-000126-GPOS-00066
<GroupDescription></GroupDescription>Group -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
OL 8 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive.
<VulnDiscussion>Terminating an unresponsive SSH session within a short time period reduces the window of opportunity for unauthorized personn...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
OL 8 must configure the use of the pam_faillock.so module in the /etc/pam.d/system-auth file.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
OL 8 must configure the use of the pam_faillock.so module in the /etc/pam.d/password-auth file.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.