Skip to content

SLES 12 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.

    &lt;VulnDiscussion&gt;"pam-config" is a command line utility that automatically generates a system PAM configuration as packages are installed, upd...
    Rule Medium Severity
  • SRG-OS-000337-GPOS-00129

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must have the auditing package installed.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • SUSE operating system audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it...
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must allocate audit record storage capacity to store at least one weeks worth of audit records when audit records are not immediately sent to a central audit record storage facility.

    &lt;VulnDiscussion&gt;To ensure SUSE operating systems have a sufficient storage capacity in which to write the audit logs, SUSE operating systems ...
    Rule Medium Severity
  • SRG-OS-000343-GPOS-00134

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system auditd service must notify the System Administrator (SA) and Information System Security Officer (ISSO) immediately when audit storage capacity is 75 percent full.

    &lt;VulnDiscussion&gt;If security personnel are not notified immediately when storage volume reaches 75 percent utilization, they are unable to pla...
    Rule Medium Severity
  • SRG-OS-000046-GPOS-00022

    <GroupDescription></GroupDescription>
    Group
  • The Information System Security Officer (ISSO) and System Administrator (SA), at a minimum, must be alerted of a SUSE operating system audit processing failure event.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-OS-000046-GPOS-00022

    <GroupDescription></GroupDescription>
    Group
  • The Information System Security Officer (ISSO) and System Administrator (SA), at a minimum, must have mail aliases to be notified of a SUSE operating system audit processing failure.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-OS-000047-GPOS-00023

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system audit system must take appropriate action when the audit storage volume is full.

    &lt;VulnDiscussion&gt;It is critical that when the SUSE operating system is at risk of failing to process audit logs as required, it takes action t...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • The audit-audispd-plugins must be installed on the SUSE operating system.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system audit event multiplexor must be configured to use Kerberos.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Allowing devices and us...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules