Skip to content

Solaris 11 SPARC Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The system must restrict the ability of users to assume excessive privileges to members of a defined group and prevent unauthorized users from accessing administrative tools.

    <VulnDiscussion>Allowing any user to elevate their privileges can allow them excessive control of the system tools.</VulnDiscussion>&lt...
    Rule Medium Severity
  • SRG-OS-000396

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ FIPS-validate or NSA-approved cryptography to implement digital signatures.

    &lt;VulnDiscussion&gt;FIPS 140-2 is the current standard for validating cryptographic modules, and NSA Type-X (where X=1, 2, 3, 4) products are NSA...
    Rule Medium Severity
  • SRG-OS-000423

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect the integrity of transmitted information.

    &lt;VulnDiscussion&gt;Ensuring the integrity of transmitted information requires the operating system take feasible measures to employ transmission...
    Rule Medium Severity
  • SRG-OS-000424

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ cryptographic mechanisms to recognize changes to information during transmission unless otherwise protected by alternative physical measures.

    &lt;VulnDiscussion&gt;Ensuring that transmitted information is not altered during transmission requires the operating system take feasible measures...
    Rule Medium Severity
  • SRG-OS-000425

    <GroupDescription></GroupDescription>
    Group
  • The operating system must maintain the integrity of information during aggregation, packaging, and transformation in preparation for transmission.

    &lt;VulnDiscussion&gt;Ensuring the integrity of transmitted information requires the operating system take feasible measures to employ transmission...
    Rule Medium Severity
  • SRG-OS-000423

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect the confidentiality of transmitted information.

    &lt;VulnDiscussion&gt;Ensuring the confidentiality of transmitted information requires the operating system take feasible measures to employ transm...
    Rule Medium Severity
  • SRG-OS-000424

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical measures.

    &lt;VulnDiscussion&gt;Ensuring that transmitted information does not become disclosed to unauthorized entities requires the operating system take f...
    Rule Medium Severity
  • SRG-OS-000425

    <GroupDescription></GroupDescription>
    Group
  • The operating system must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission.

    &lt;VulnDiscussion&gt;Ensuring that transmitted information remains confidential during aggregation, packaging, and transformation requires the ope...
    Rule Medium Severity
  • SRG-OS-000404

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ cryptographic mechanisms to protect information in storage.

    &lt;VulnDiscussion&gt;When data is written to digital media, such as hard drives, mobile computers, external/removable hard drives, personal digita...
    Rule Low Severity
  • The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information at rest unless otherwise protected by alternative physical measures.

    &lt;VulnDiscussion&gt;When data is written to digital media, such as hard drives, mobile computers, external/removable hard drives, personal digita...
    Rule Low Severity
  • SRG-OS-000423

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect the integrity of transmitted information.

    &lt;VulnDiscussion&gt;Ensuring the integrity of transmitted information requires the operating system take feasible measures to employ transmission...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules