SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000067-GPOS-00035
<GroupDescription></GroupDescription>Group -
SLEM 5, for PKI-based authentication, must enforce authorized access to the corresponding private key.
<VulnDiscussion>If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
There must be no .shosts files on SLEM 5.
<VulnDiscussion>The .shosts files are used to configure host-based authentication for individual users or the system via SSH. Host-based auth...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
There must be no shosts.equiv files on SLEM 5.
<VulnDiscussion>The shosts.equiv files are used to configure host-based authentication for the system via SSH. Host-based authentication is n...Rule High Severity -
SRG-OS-000480-GPOS-00229
<GroupDescription></GroupDescription>Group -
SLEM 5 must not allow unattended or automatic logon via the graphical user interface (GUI).
<VulnDiscussion>Failure to restrict system access to authenticated users negatively impacts SLEM 5 security.</VulnDiscussion><FalseP...Rule High Severity -
SRG-OS-000299-GPOS-00117
<GroupDescription></GroupDescription>Group -
SLEM 5 wireless network adapters must be disabled unless approved and documented.
<VulnDiscussion>Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unpr...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.