Skip to content

SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SLEM 5 must employ user passwords with a minimum lifetime of 24 hours (one day).

    <VulnDiscussion>Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforce...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must employ user passwords with a maximum lifetime of 60 days.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If SLEM...
    Rule Medium Severity
  • SRG-OS-000077-GPOS-00045

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must employ a password history file.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must employ FIPS 140-2/140-3-approved cryptographic hashing algorithms for system authentication.

    &lt;VulnDiscussion&gt;The system must use a strong hashing algorithm to store the password. The system must use a sufficient number of hashing roun...
    Rule High Severity
  • SRG-OS-000073-GPOS-00041

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 shadow password suite must be configured to use a sufficient number of hashing rounds.

    &lt;VulnDiscussion&gt;The system must use a strong hashing algorithm to store the password. The system must use a sufficient number of hashing roun...
    Rule High Severity
  • SRG-OS-000120-GPOS-00061

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must employ FIPS 140-2/140-3 approved cryptographic hashing algorithm for system authentication (login.defs).

    &lt;VulnDiscussion&gt;Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be r...
    Rule Medium Severity
  • SRG-OS-000075-GPOS-00043

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must be configured to create or update passwords with a minimum lifetime of 24 hours (one day).

    &lt;VulnDiscussion&gt;Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforce...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must be configured to create or update passwords with a maximum lifetime of 60 days.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If SLEM...
    Rule Medium Severity
  • SRG-OS-000375-GPOS-00160

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must have the packages required for multifactor authentication to be installed.

    &lt;VulnDiscussion&gt;Using an authentication device, such as a Common Access Card (CAC) or token separate from the information system, ensures tha...
    Rule Medium Severity
  • SRG-OS-000068-GPOS-00036

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must implement multifactor authentication for access to privileged accounts via pluggable authentication modules (PAM).

    &lt;VulnDiscussion&gt;Using an authentication device, such as a Common Access Card (CAC) or token that is separate from the information system, ens...
    Rule Medium Severity
  • SLEM 5 must implement certificate status checking for multifactor authentication.

    &lt;VulnDiscussion&gt;Using an authentication device, such as a Common Access Card (CAC) or token separate from the information system, ensures cre...
    Rule Medium Severity
  • SRG-OS-000383-GPOS-00166

    <GroupDescription></GroupDescription>
    Group
  • If Network Security Services (NSS) is being used by SLEM 5 it must prohibit the use of cached authentications after one day.

    &lt;VulnDiscussion&gt;If cached authentication information is out of date, the validity of the authentication information may be questionable.&lt;/...
    Rule Medium Severity
  • SRG-OS-000383-GPOS-00166

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must configure the Linux Pluggable Authentication Modules (PAM) to prohibit the use of cached offline authentications after one day.

    &lt;VulnDiscussion&gt;If cached authentication information is out of date, the validity of the authentication information may be questionable.&lt;/...
    Rule Medium Severity
  • SRG-OS-000066-GPOS-00034

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

    &lt;VulnDiscussion&gt;Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.

    &lt;VulnDiscussion&gt;The "pam-config" command line utility automatically generates a system PAM configuration as packages are installed, updated, ...
    Rule Medium Severity
  • SRG-OS-000363-GPOS-00150

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must use a file integrity tool to verify correct operation of all security functions.

    &lt;VulnDiscussion&gt;Without verification of the security functions, security functions may not operate correctly, and the failure may go unnotice...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 file integrity tool must be configured to verify Access Control Lists (ACLs).

    &lt;VulnDiscussion&gt;ACLs can provide permissions beyond those permitted through the file mode and must be verified by file integrity tools.&lt;/V...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 file integrity tool must be configured to verify extended attributes.

    &lt;VulnDiscussion&gt;Extended attributes in file systems are used to contain arbitrary data and file metadata with security implications.&lt;/Vuln...
    Rule Medium Severity
  • SRG-OS-000278-GPOS-00108

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 file integrity tool must be configured to protect the integrity of the audit tools.

    &lt;VulnDiscussion&gt;Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit in...
    Rule Medium Severity
  • SRG-OS-000363-GPOS-00150

    <GroupDescription></GroupDescription>
    Group
  • Advanced Intrusion Detection Environment (AIDE) must verify the baseline SLEM 5 configuration at least weekly.

    &lt;VulnDiscussion&gt;Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized ...
    Rule Medium Severity
  • SRG-OS-000447-GPOS-00201

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must notify the system administrator (SA) when Advanced Intrusion Detection Environment (AIDE) discovers anomalies in the operation of any security functions.

    &lt;VulnDiscussion&gt;If anomalies are not acted on, security functions may fail to secure the system. Security function is defined as the hardwar...
    Rule Medium Severity
  • SRG-OS-000479-GPOS-00224

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must offload rsyslog messages for networked systems in real time and offload standalone systems at least weekly.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...
    Rule Medium Severity
  • SRG-OS-000337-GPOS-00129

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must have the auditing package installed.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • The audit-audispd-plugins package must be installed on SLEM 5.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must allocate audit record storage capacity to store at least one week of audit records when audit records are not immediately sent to a central audit record storage facility.

    &lt;VulnDiscussion&gt;To ensure SLEM 5 has a sufficient storage capacity in which to write the audit logs, SLEM 5 must be able to allocate audit re...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules