Skip to content

SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • There must be no shosts.equiv files on SLEM 5.

    <VulnDiscussion>The shosts.equiv files are used to configure host-based authentication for the system via SSH. Host-based authentication is n...
    Rule High Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must not allow unattended or automatic logon via the graphical user interface (GUI).

    &lt;VulnDiscussion&gt;Failure to restrict system access to authenticated users negatively impacts SLEM 5 security.&lt;/VulnDiscussion&gt;&lt;FalseP...
    Rule High Severity
  • SRG-OS-000299-GPOS-00117

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 wireless network adapters must be disabled unless approved and documented.

    &lt;VulnDiscussion&gt;Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unpr...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules