Skip to content

Solaris 11 SPARC Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The root account must be the only account with GID of 0.

    &lt;VulnDiscussion&gt;All accounts with a GID of 0 have root group privileges and must be limited to the group account only.&lt;/VulnDiscussion&gt;...
    Rule Medium Severity
  • SRG-OS-000206

    <GroupDescription></GroupDescription>
    Group
  • The operating system must reveal error messages only to authorized personnel.

    &lt;VulnDiscussion&gt;Proper file permissions and ownership ensures that only designated personnel in the organization can access error messages.&l...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operator must document all file system objects that have non-standard access control list settings.

    &lt;VulnDiscussion&gt;Access Control Lists allow an object owner to expand permissions on an object to specific users and groups in addition to the...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must be a supported release.

    &lt;VulnDiscussion&gt;An operating system release is considered supported if the vendor continues to provide security patches for the product. With...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must implement non-executable program stacks.

    &lt;VulnDiscussion&gt;A common type of exploit is the stack buffer overflow. An application receives, from an attacker, more data than it is prepar...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules