Skip to content

Solaris 11 SPARC Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The system must not respond to ICMP broadcast netmask requests.

    <VulnDiscussion>By determining the netmasks of various computers in your network, an attacker can better map your subnet structure and infer ...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not respond to broadcast ICMP echo requests.

    &lt;VulnDiscussion&gt;ICMP echo requests can be useful for reconnaissance of systems and for denial of service attacks.&lt;/VulnDiscussion&gt;&lt;F...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not respond to multicast echo requests.

    &lt;VulnDiscussion&gt;Multicast echo requests can be useful for reconnaissance of systems and for denial of service attacks.&lt;/VulnDiscussion&gt;...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must disable ICMP redirect messages.

    &lt;VulnDiscussion&gt;A malicious user can exploit the ability of the system to send ICMP redirects by continually sending packets to the system, f...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must disable TCP reverse IP source routing.

    &lt;VulnDiscussion&gt;If enabled, reverse IP source routing would allow an attacker to more easily complete a three-way TCP handshake and spoof new...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must set maximum number of half-open TCP connections to 4096.

    &lt;VulnDiscussion&gt;This setting controls how many half-open connections can exist for a TCP port. It is necessary to control the number of comp...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must set maximum number of incoming connections to 1024.

    &lt;VulnDiscussion&gt;This setting controls the maximum number of incoming connections that can be accepted on a TCP port limiting exposure to deni...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must disable network routing unless required.

    &lt;VulnDiscussion&gt;The network routing daemon, in.routed, manages network routing tables. If enabled, it periodically supplies copies of the sys...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must implement TCP Wrappers.

    &lt;VulnDiscussion&gt;TCP Wrappers is a host-based access control system that allows administrators to control who has access to various network se...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The boundary protection system (firewall) must be configured to deny network traffic by default and must allow network traffic by exception (i.e., deny all, permit by exception).

    &lt;VulnDiscussion&gt;A firewall that relies on a deny all, permit by exception strategy requires all traffic to have explicit permission before tr...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules