General Purpose Operating System Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000163
<GroupDescription></GroupDescription>Group -
The operating system must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, except to fulfill documented and validated mission requirements.
<VulnDiscussion>Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...Rule Medium Severity -
SRG-OS-000184
<GroupDescription></GroupDescription>Group -
The operating system must protect the confidentiality and integrity of all information at rest.
<VulnDiscussion>Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and...Rule Medium Severity -
SRG-OS-000205
<GroupDescription></GroupDescription>Group -
The operating system must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
<VulnDiscussion> Any operating system providing too much information in error messages risks compromising the data and security of the struct...Rule Medium Severity -
SRG-OS-000206
<GroupDescription></GroupDescription>Group -
The operating system must reveal error messages only to authorized users.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000228
<GroupDescription></GroupDescription>Group -
Any publically accessible connection to the operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the publicly accessible operating system en...Rule Medium Severity -
SRG-OS-000239
<GroupDescription></GroupDescription>Group -
The operating system must audit all account modifications.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
The operating system must audit all account disabling actions.
<VulnDiscussion>When operating system accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual...Rule Medium Severity -
SRG-OS-000241
<GroupDescription></GroupDescription>Group -
The operating system must audit all account removal actions.
<VulnDiscussion>When operating system accounts are removed, user accessibility is affected. Accounts are utilized for identifying individual ...Rule Medium Severity -
SRG-OS-000250
<GroupDescription></GroupDescription>Group -
The operating system must implement cryptography to protect the integrity of remote access sessions.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule High Severity -
SRG-OS-000254
<GroupDescription></GroupDescription>Group -
The operating system must initiate session audits at system start-up.
<VulnDiscussion>If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit sy...Rule Medium Severity -
SRG-OS-000255
<GroupDescription></GroupDescription>Group -
The operating system must produce audit records containing information to establish the identity of any individual or process associated with the event.
<VulnDiscussion>Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associ...Rule Medium Severity -
SRG-OS-000256
<GroupDescription></GroupDescription>Group -
The operating system must protect audit tools from unauthorized access.
<VulnDiscussion>Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...Rule Medium Severity -
SRG-OS-000257
<GroupDescription></GroupDescription>Group -
The operating system must protect audit tools from unauthorized modification.
<VulnDiscussion>Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...Rule Medium Severity -
SRG-OS-000258
<GroupDescription></GroupDescription>Group -
The operating system must protect audit tools from unauthorized deletion.
<VulnDiscussion>Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...Rule Medium Severity -
SRG-OS-000259
<GroupDescription></GroupDescription>Group -
The operating system must limit privileges to change software resident within software libraries.
<VulnDiscussion> If the operating system were to allow any user to make changes to software libraries, then those changes might be implemente...Rule Medium Severity -
SRG-OS-000266
<GroupDescription></GroupDescription>Group -
The operating system must enforce password complexity by requiring that at least one special character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity o...Rule Medium Severity -
SRG-OS-000269
<GroupDescription></GroupDescription>Group -
In the event of a system failure, the operating system must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.
<VulnDiscussion>Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...Rule Medium Severity -
SRG-OS-000274
<GroupDescription></GroupDescription>Group -
The operating system must notify system administrators and ISSOs when accounts are created.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000275
<GroupDescription></GroupDescription>Group -
The operating system must notify system administrators and ISSOs when accounts are modified.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000276
<GroupDescription></GroupDescription>Group -
The operating system must notify system administrators and ISSOs when accounts are disabled.
<VulnDiscussion>When operating system accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual...Rule Medium Severity -
SRG-OS-000277
<GroupDescription></GroupDescription>Group -
The operating system must notify system administrators and ISSOs when accounts are removed.
<VulnDiscussion>When operating system accounts are removed, user accessibility is affected. Accounts are utilized for identifying individual ...Rule Medium Severity -
The operating system must use cryptographic mechanisms to protect the integrity of audit tools.
<VulnDiscussion>Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit in...Rule High Severity -
The operating system must automatically terminate a user session after inactivity time-outs have expired or at shutdown.
<VulnDiscussion>Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...Rule Medium Severity -
SRG-OS-000280
<GroupDescription></GroupDescription>Group -
The operating system must provide a logoff capability for user-initiated communications sessions when requiring user access authentication.
<VulnDiscussion>If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...Rule Medium Severity -
SRG-OS-000281
<GroupDescription></GroupDescription>Group -
The operating system must display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.
<VulnDiscussion>If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...Rule Medium Severity -
SRG-OS-000297
<GroupDescription></GroupDescription>Group -
The operating system must control remote access methods.
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and information systems, which lack automate...Rule Medium Severity -
SRG-OS-000298
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.