Skip to content

Solaris 11 SPARC Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • A file integrity baseline must be created, maintained, and reviewed at least weekly to determine if unauthorized changes have been made to important system files located in the root file system.

    <VulnDiscussion>A file integrity baseline is a collection of file metadata used to evaluate the integrity of the system. A minimal baseline m...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Direct logins must not be permitted to shared, default, application, or utility accounts.

    &lt;VulnDiscussion&gt;Shared accounts (accounts where two or more people log in with the same user identification) do not provide identification an...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not have any unnecessary accounts.

    &lt;VulnDiscussion&gt;Accounts providing no operational purpose provide additional opportunities for system compromise. Unnecessary accounts includ...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must conduct backups of user-level information contained in the operating system per organization-defined frequency to conduct backups consistent with recovery time and recovery point objectives.

    &lt;VulnDiscussion&gt;Operating system backup is a critical step in maintaining data assurance and availability. User-level information is data g...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must conduct backups of system-level information contained in the information system per organization-defined frequency to conduct backups that are consistent with recovery time and recovery point objectives.

    &lt;VulnDiscussion&gt;Operating system backup is a critical step in maintaining data assurance and availability. System-level information is data...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must conduct backups of operating system documentation including security-related documentation per organization-defined frequency to conduct backups that is consistent with recovery time and recovery point objectives.

    &lt;VulnDiscussion&gt;Operating system backup is a critical step in maintaining data assurance and availability. System documentation is data gen...
    Rule Medium Severity
  • SRG-OS-000181

    <GroupDescription></GroupDescription>
    Group
  • The operating system must prevent the execution of prohibited mobile code.

    &lt;VulnDiscussion&gt;Decisions regarding the employment of mobile code within operating systems are based on the potential for the code to cause d...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ PKI solutions at workstations, servers, or mobile computing devices on the network to create, manage, distribute, use, store, and revoke digital certificates.

    &lt;VulnDiscussion&gt;Without the use of PKI systems to manage digital certificates, the operating system or other system components may be unable ...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means.

    &lt;VulnDiscussion&gt;In order to minimize potential negative impact to the organization caused by malicious code, it is imperative that malicious ...
    Rule Medium Severity
  • SRG-OS-000215

    <GroupDescription></GroupDescription>
    Group
  • The operating system must back up audit records at least every seven days onto a different system or system component than the system or component being audited.

    &lt;VulnDiscussion&gt;Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up audit records to a differen...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules