Solaris 11 SPARC Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000027
<GroupDescription></GroupDescription>Group -
The operating system must limit the number of concurrent sessions for each account to an organization-defined number of sessions.
<VulnDiscussion>Limiting the number of allowed users and sessions per user can limit risks related to denial of service attacks. The organiza...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must disable directed broadcast packet forwarding.
<VulnDiscussion>This parameter must be disabled to reduce the risk of denial of service attacks.</VulnDiscussion><FalsePositives>...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must not respond to ICMP timestamp requests.
<VulnDiscussion>By accurately determining the system's clock state, an attacker can more effectively attack certain time-based pseudorandom n...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must not respond to ICMP broadcast timestamp requests.
<VulnDiscussion>By accurately determining the system's clock state, an attacker can more effectively attack certain time-based pseudorandom n...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must not respond to ICMP broadcast netmask requests.
<VulnDiscussion>By determining the netmasks of various computers in your network, an attacker can better map your subnet structure and infer ...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must not respond to broadcast ICMP echo requests.
<VulnDiscussion>ICMP echo requests can be useful for reconnaissance of systems and for denial of service attacks.</VulnDiscussion><F...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must not respond to multicast echo requests.
<VulnDiscussion>Multicast echo requests can be useful for reconnaissance of systems and for denial of service attacks.</VulnDiscussion>...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must ignore ICMP redirect messages.
<VulnDiscussion>Ignoring ICMP redirect messages reduces the likelihood of denial of service attacks.</VulnDiscussion><FalsePositives...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must set strict multihoming.
<VulnDiscussion>These settings control whether a packet arriving on a non-forwarding interface can be accepted for an IP address that is not ...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must disable ICMP redirect messages.
<VulnDiscussion>A malicious user can exploit the ability of the system to send ICMP redirects by continually sending packets to the system, f...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.