Skip to content

SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SLEM 5 audit tools must have the proper permissions configured to protect against unauthorized access.

    Protecting audit information includes identifying and protecting the tools used to view and manipulate log data. Protecting audit tools is necessary to prevent unauthorized operation on audit infor...
    Rule Medium Severity
  • The information system security officer (ISSO) and system administrator (SA), at a minimum, must be alerted of a SLEM 5 audit processing failure event.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...
    Rule Medium Severity
  • SLEM 5 must generate audit records for a uses of the "chsh" command.

    Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...
    Rule Medium Severity
  • SLEM 5 must generate audit records for all uses of the "crontab" command.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • SLEM 5 must generate audit records for all uses of the "insmod" command.

    Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit rec...
    Rule Medium Severity
  • SLEM 5 must generate audit records for all uses of the "modprobe" command.

    Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit rec...
    Rule Medium Severity
  • SLEM 5 must generate audit records for all uses of the "rmmod" command.

    Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit rec...
    Rule Medium Severity
  • SLEM 5 must generate audit records for all uses of the "sudoedit" command.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.

    Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply...
    Rule Medium Severity
  • SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.

    Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply...
    Rule Medium Severity
  • SLEM 5 must generate audit records for all uses of the "mount" system call.

    Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...
    Rule Medium Severity
  • SLEM 5 must generate audit records for all uses of the "unlink", "unlinkat", "rename", "renameat", and "rmdir" system calls.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • SLEM 5 must generate audit records for all modifications to the "lastlog" file.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • Successful/unsuccessful uses of "setfiles" in SLEM 5 must generate an audit record.

    Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...
    Rule Medium Severity
  • Successful/unsuccessful uses of "setsebool" in SLEM 5 must generate an audit record.

    Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...
    Rule Medium Severity
  • SLEM 5 must generate audit records for the "/var/log/btmp" file.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • FIPS 140-2/140-3 mode must be enabled on SLEM 5.

    Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. SLEM 5 must implement cryptographic modules adhering to the higher standards approved by t...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000375-GPOS-00160

    Group
  • All SLEM 5 local interactive users must have a home directory assigned in the /etc/passwd file.

    If local interactive users are not assigned a valid home directory, there is no place for the storage and control of files they should own.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000433-GPOS-00193

    Group
  • SLEM 5 SSH daemon private host key files must have mode 640 or less permissive.

    If an unauthorized user obtains the private SSH host key file, the host could be impersonated.
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • SRG-OS-000191-GPOS-00080

    Group
  • SLEM 5 must implement an endpoint security tool.

    Adding endpoint security tools can provide the capability to automatically take actions in response to malicious behavior, which can provide additional agility in reacting to network threats. These...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 must disable the x86 Ctrl-Alt-Delete key sequence.

    A locally logged-on user who presses Ctrl-Alt-Delete when at the console can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the r...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SLEM 5 with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-approved PKIs, all DOD systems (e.g., web servers and web portals) must be...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SLEM 5 with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.

    If the system allows a user to boot into single-user or maintenance mode without authentication, any user that invokes single-user or maintenance mode is granted privileged access to all system inf...
    Rule High Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 kernel core dumps must be disabled unless needed.

    Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a considerable amount of disk space and may result in denial of service (DoS...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00192

    Group
  • SLEM 5 must implement kptr-restrict to prevent the leaking of internal kernel addresses.

    Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory inclu...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000366-GPOS-00153

    Group
  • The SLEM 5 tool zypper must have gpgcheck enabled.

    Changes to any software components can have significant effects on the overall security of SLEM 5. This requirement ensures the software has not been tampered with and has been provided by a truste...
    Rule High Severity
  • SRG-OS-000437-GPOS-00194

    Group
  • SLEM 5 must remove all outdated software components after updated versions have been installed.

    Previous versions of software components that are not removed from the information system after updates have been installed may be exploited by adversaries. Some information technology products may...
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    Group
  • SRG-OS-000074-GPOS-00042

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • A separate file system must be used for SLEM 5 user home directories (such as /home or an equivalent).

    The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 must use a separate file system for /var.

    The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules