Skip to content

SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SLEM 5 kernel core dumps must be disabled unless needed.

    <VulnDiscussion>Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a co...
    Rule Medium Severity
  • Address space layout randomization (ASLR) must be implemented by SLEM 5 to protect memory from unauthorized code execution.

    <VulnDiscussion>Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations t...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00192

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must implement kptr-restrict to prevent the leaking of internal kernel addresses.

    &lt;VulnDiscussion&gt;Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations t...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Vendor-packaged SLEM 5 security patches and updates must be installed and up to date.

    &lt;VulnDiscussion&gt;Timely patching is critical for maintaining the operational availability, confidentiality, and integrity of information techn...
    Rule Medium Severity
  • SRG-OS-000366-GPOS-00153

    <GroupDescription></GroupDescription>
    Group
  • The SLEM 5 tool zypper must have gpgcheck enabled.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of SLEM 5. This requirement ensures t...
    Rule High Severity
  • SRG-OS-000437-GPOS-00194

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must remove all outdated software components after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of software components that are not removed from the information system after updates have been installed m...
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must use vlock to allow for session locking.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000074-GPOS-00042

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must not have the telnet-server package installed.

    &lt;VulnDiscussion&gt;It is detrimental for SLEM 5 to provide, or install by default, functionality exceeding requirements or mission objectives. T...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • A separate file system must be used for SLEM 5 user home directories (such as /home or an equivalent).

    &lt;VulnDiscussion&gt;The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must use a separate file system for /var.

    &lt;VulnDiscussion&gt;The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must use a separate file system for the system audit data path.

    &lt;VulnDiscussion&gt;The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules