SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SLEM 5 must use a separate file system for the system audit data path.
The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.
The "nosuid" mount option causes the system to not execute "setuid" and "setgid" files with owner privileges. This option must be used for mounting any file system not containing approved "setuid" ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000185-GPOS-00079
Group -
All SLEM 5 persistent disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.
SLEM 5 handling data requiring data-at-rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest. Selection of a cryptogr...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000114-GPOS-00059
Group -
SLEM 5 must disable the file system automounter unless required.
Automatically mounting file systems permits easy introduction of unknown devices, thereby facilitating malicious activity.Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SLEM 5 must have directories that contain system commands set to a mode of 755 or less permissive.
If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SRG-OS-000259-GPOS-00100
Group -
SLEM 5 library directories must have mode 755 or less permissive.
If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SLEM 5 library files must have mode 755 or less permissive.
If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
All SLEM 5 local interactive user home directories must have mode 750 or less permissive.
Excessive permissions on local interactive user home directories may allow unauthorized access to user files by other users.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
All SLEM 5 local initialization files must have mode 740 or less permissive.
Local initialization files are used to configure the user's shell environment upon logon. Malicious modification of these files could compromise accounts upon logon.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 SSH daemon public host key files must have mode 644 or less permissive.
If a public host key file is modified by an unauthorized user, the SSH service may be compromised.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000259-GPOS-00100
Group -
SLEM 5 library files must be group-owned by root.
If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SLEM 5 library directories must be owned by root.
If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SLEM 5 library directories must be group-owned by root.
If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SLEM 5 must have system commands owned by root.
If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SRG-OS-000259-GPOS-00100
Group -
SLEM 5 must have directories that contain system commands owned by root.
If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SLEM 5 must have directories that contain system commands group-owned by root.
If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
All SLEM 5 files and directories must have a valid owner.
Unowned files and directories may be unintentionally inherited if a user is assigned the same User Identifier (UID) as the UID of the unowned files.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
All SLEM 5 files and directories must have a valid group owner.
Files without a valid group owner may be unintentionally inherited if a group is assigned the same Group Identifier (GID) as the GID of the files without a valid group owner.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
All SLEM 5 local interactive user home directories must be group-owned by the home directory owner's primary group.
If the Group Identifier (GID) of a local interactive user's home directory is not the same as the primary GID of the user, this would allow unauthorized access to the user's files, and users that s...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
All SLEM 5 world-writable directories must be group-owned by root, sys, bin, or an application group.
If a world-writable directory has the sticky bit set and is not group-owned by a privileged Group Identifier (GID), unauthorized users may be able to modify files created by others. The only autho...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
Group -
SRG-OS-000206-GPOS-00084
Group -
SLEM 5 must prevent unauthorized users from accessing system error messages.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify SLEM 5 or platform. Additio...Rule Medium Severity -
SRG-OS-000205-GPOS-00083
Group -
SRG-OS-000096-GPOS-00050
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.