Skip to content

SLES 12 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000031-GPOS-00012

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000478-GPOS-00223

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000447-GPOS-00201

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Vendor-packaged SUSE operating system security patches and updates must be installed and up to date.

    &lt;VulnDiscussion&gt;Timely patching is critical for maintaining the operational availability, confidentiality, and integrity of information techn...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access to the local graphical user interface.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the SUSE operating system ensures privacy a...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting access via local console.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the SUSE operating system ensures privacy a...
    Rule Medium Severity
  • SRG-OS-000228-GPOS-00088

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must display a banner before granting local or remote access to the system via a graphical user logon.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the SUSE operating system ensures privacy a...
    Rule Medium Severity
  • SRG-OS-000228-GPOS-00088

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must display the approved Standard Mandatory DoD Notice before granting local or remote access to the system via a graphical user logon.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the SUSE operating system ensures privacy a...
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must be able to lock the graphical user interface (GUI).

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must utilize vlock to allow for session locking.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Low Severity
  • SRG-OS-000029-GPOS-00010

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must initiate a session lock after a 15-minute period of inactivity for the graphical user interface.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • SRG-OS-000029-GPOS-00010

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must initiate a session lock after a 10-minute period of inactivity.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • The SUSE operating system must conceal, via the session lock, information previously visible on the display with a publicly viewable image in the graphical user interface.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Low Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges.

    &lt;VulnDiscussion&gt;Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When SUSE o...
    Rule High Severity
  • SRG-OS-000027-GPOS-00008

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.

    &lt;VulnDiscussion&gt;SUSE operating system management includes the ability to control the number of users and user sessions that utilize a SUSE op...
    Rule Low Severity
  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must lock an account after three consecutive invalid access attempts.

    &lt;VulnDiscussion&gt;By limiting the number of failed access attempts, the risk of unauthorized system access via user password guessing, otherwis...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00226

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must enforce a delay of at least four (4) seconds between logon prompts following a failed logon attempt.

    &lt;VulnDiscussion&gt;Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain acc...
    Rule Medium Severity
  • SRG-OS-000069-GPOS-00037

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system default permissions must be defined in such a way that all authenticated users can only read and modify their own files.

    &lt;VulnDiscussion&gt;Setting the most restrictive default permissions ensures that when new accounts are created, they do not have unnecessary acc...
    Rule Medium Severity
  • The SUSE operating system must enforce passwords that contain at least one upper-case character.

    &lt;VulnDiscussion&gt;Use of a complex password helps increase the time and resources required to compromise the password. Password complexity, or ...
    Rule Medium Severity
  • SRG-OS-000070-GPOS-00038

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must enforce passwords that contain at least one lower-case character.

    &lt;VulnDiscussion&gt;Use of a complex password helps increase the time and resources required to compromise the password. Password complexity, or ...
    Rule Medium Severity
  • SRG-OS-000071-GPOS-00039

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must enforce passwords that contain at least one numeric character.

    &lt;VulnDiscussion&gt;Use of a complex password helps increase the time and resources required to compromise the password. Password complexity, or ...
    Rule Medium Severity
  • SRG-OS-000266-GPOS-00101

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must enforce passwords that contain at least one special character.

    &lt;VulnDiscussion&gt;Use of a complex password helps increase the time and resources required to compromise the password. Password complexity or s...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must require the change of at least eight (8) of the total number of characters when passwords are changed.

    &lt;VulnDiscussion&gt;If the SUSE operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chanc...
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must employ FIPS 140-2 approved cryptographic hashing algorithm for system authentication (login.defs).

    &lt;VulnDiscussion&gt;Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be r...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords.

    &lt;VulnDiscussion&gt;The system must use a strong hashing algorithm to store the password. The system must use a sufficient number of hashing roun...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords.

    &lt;VulnDiscussion&gt;Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must not be configured to allow blank or null passwords.

    &lt;VulnDiscussion&gt; Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords ar...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules