Skip to content

General Purpose Operating System Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect the confidentiality and integrity of communications with wireless peripherals.

    &lt;VulnDiscussion&gt;Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unpr...
    Rule High Severity
  • SRG-OS-000439

    <GroupDescription></GroupDescription>
    Group
  • The operating system must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    &lt;VulnDiscussion&gt;Security flaws with operating systems are discovered daily. Vendors are constantly updating and patching their products to ad...
    Rule Medium Severity
  • SRG-OS-000590

    <GroupDescription></GroupDescription>
    Group
  • The operating system must disable accounts when the accounts are no longer associated to a user.

    &lt;VulnDiscussion&gt;Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality...
    Rule Medium Severity
  • SRG-OS-000690

    <GroupDescription></GroupDescription>
    Group
  • The operating system must prohibit the use or connection of unauthorized hardware components.

    &lt;VulnDiscussion&gt;Hardware components provide the foundation for organizational systems and the platform for the execution of authorized softwa...
    Rule Medium Severity
  • SRG-OS-000705

    <GroupDescription></GroupDescription>
    Group
  • The operating system must implement multifactor authentication for local, network, and/or remote access to privileged accounts and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.

    &lt;VulnDiscussion&gt;The purpose of requiring a device separate from the system to which the user is attempting to gain access for one of the fact...
    Rule Medium Severity
  • SRG-OS-000710

    <GroupDescription></GroupDescription>
    Group
  • The operating system must, for password-based authentication, verify when users create or update passwords the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity
  • SRG-OS-000720

    <GroupDescription></GroupDescription>
    Group
  • The operating system must for password-based authentication, require immediate selection of a new password upon account recovery.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity
  • SRG-OS-000725

    <GroupDescription></GroupDescription>
    Group
  • The operating system must for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity
  • SRG-OS-000730

    <GroupDescription></GroupDescription>
    Group
  • The operating system must, for password-based authentication, employ automated tools to assist the user in selecting strong password authenticators.

    &lt;VulnDiscussion&gt;Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules