Skip to content

General Purpose Operating System Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The operating system must accept Personal Identity Verification (PIV) credentials.

    <VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...
    Rule Medium Severity
  • SRG-OS-000377

    <GroupDescription></GroupDescription>
    Group
  • The operating system must electronically verify Personal Identity Verification (PIV) credentials.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...
    Rule Medium Severity
  • SRG-OS-000378

    <GroupDescription></GroupDescription>
    Group
  • The operating system must authenticate peripherals before establishing a connection.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...
    Rule Medium Severity
  • SRG-OS-000379

    <GroupDescription></GroupDescription>
    Group
  • The operating system must produce audit records containing the individual identities of group account users.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000046

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000078

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000104

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000279

    <GroupDescription></GroupDescription>
    Group
  • The operating system must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.

    &lt;VulnDiscussion&gt;Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary acce...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must not allow an unattended or automatic logon to the system.

    &lt;VulnDiscussion&gt;Failure to restrict system access to authenticated users negatively impacts operating system security.&lt;/VulnDiscussion&gt;...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000366

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000021

    <GroupDescription></GroupDescription>
    Group
  • The operating system must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.

    &lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-OS-000023

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000038

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000070

    <GroupDescription></GroupDescription>
    Group
  • The operating system must limit the ability of non-privileged users to grant other users direct access to the contents of their home directories/folders.

    &lt;VulnDiscussion&gt;Users' home directories/folders may contain information of a sensitive nature. Non-privileged users should coordinate any sha...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must enable an application firewall, if available.

    &lt;VulnDiscussion&gt;Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Application firewalls ...
    Rule Medium Severity
  • SRG-OS-000481

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000002

    <GroupDescription></GroupDescription>
    Group
  • The operating system must automatically remove or disable temporary user accounts after 72 hours.

    &lt;VulnDiscussion&gt;If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...
    Rule Medium Severity
  • SRG-OS-000004

    <GroupDescription></GroupDescription>
    Group
  • The operating system must audit all account creations.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • The operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the operating system ensures privacy and se...
    Rule Medium Severity
  • SRG-OS-000024

    <GroupDescription></GroupDescription>
    Group
  • The operating system must display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access.

    &lt;VulnDiscussion&gt;The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assuranc...
    Rule Medium Severity
  • SRG-OS-000027

    <GroupDescription></GroupDescription>
    Group
  • The operating system must limit the number of concurrent sessions to ten for all accounts and/or account types.

    &lt;VulnDiscussion&gt;Operating system management includes the ability to control the number of users and user sessions that utilize an operating s...
    Rule Low Severity
  • SRG-OS-000028

    <GroupDescription></GroupDescription>
    Group
  • The operating system must retain a users session lock until that user reestablishes access using established identification and authentication procedures.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000029

    <GroupDescription></GroupDescription>
    Group
  • The operating system must initiate a session lock after a 15-minute period of inactivity for all connection types.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • SRG-OS-000030

    <GroupDescription></GroupDescription>
    Group
  • The operating system must provide the capability for users to directly initiate a session lock for all connection types.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000031

    <GroupDescription></GroupDescription>
    Group
  • The operating system must conceal, via the session lock, information previously visible on the display with a publicly viewable image.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000032

    <GroupDescription></GroupDescription>
    Group
  • The operating system must monitor remote access methods.

    &lt;VulnDiscussion&gt;Remote access services, such as those providing remote access to network devices and information systems, which lack automate...
    Rule Medium Severity
  • SRG-OS-000033

    <GroupDescription></GroupDescription>
    Group
  • The operating system must implement DoD-approved encryption to protect the confidentiality of remote access sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-OS-000037

    <GroupDescription></GroupDescription>
    Group
  • The operating system must produce audit records containing information to establish what type of events occurred.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events ...
    Rule Medium Severity
  • The operating system must produce audit records containing information to establish when (date and time) the events occurred.

    &lt;VulnDiscussion&gt;Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events leading up to...
    Rule Medium Severity
  • SRG-OS-000039

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules