Solaris 11 SPARC Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The system must set maximum number of half-open TCP connections to 4096.
<VulnDiscussion>This setting controls how many half-open connections can exist for a TCP port. It is necessary to control the number of comp...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must set maximum number of incoming connections to 1024.
<VulnDiscussion>This setting controls the maximum number of incoming connections that can be accepted on a TCP port limiting exposure to deni...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must disable network routing unless required.
<VulnDiscussion>The network routing daemon, in.routed, manages network routing tables. If enabled, it periodically supplies copies of the sys...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must implement TCP Wrappers.
<VulnDiscussion>TCP Wrappers is a host-based access control system that allows administrators to control who has access to various network se...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The boundary protection system (firewall) must be configured to deny network traffic by default and must allow network traffic by exception (i.e., deny all, permit by exception).
<VulnDiscussion>A firewall that relies on a deny all, permit by exception strategy requires all traffic to have explicit permission before tr...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must prevent local applications from generating source-routed packets.
<VulnDiscussion>Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than c...Rule Low Severity -
SRG-OS-000023
<GroupDescription></GroupDescription>Group -
The operating system must display the DoD approved system use notification message or banner before granting access to the system for general system logons.
<VulnDiscussion>Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must ...Rule Low Severity -
SRG-OS-000023
<GroupDescription></GroupDescription>Group -
The operating system must display the DoD approved system use notification message or banner for SSH connections.
<VulnDiscussion>Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must ...Rule Low Severity -
SRG-OS-000023
<GroupDescription></GroupDescription>Group -
The GNOME service must display the DoD approved system use notification message or banner before granting access to the system.
<VulnDiscussion>Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must ...Rule Low Severity -
SRG-OS-000023
<GroupDescription></GroupDescription>Group -
The FTP service must display the DoD approved system use notification message or banner before granting access to the system.
<VulnDiscussion>Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must ...Rule Low Severity -
SRG-OS-000126
<GroupDescription></GroupDescription>Group -
The operating system must terminate all sessions and network connections when nonlocal maintenance is completed.
<VulnDiscussion>Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network,...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must prevent internal users from sending out packets which attempt to manipulate or spoof invalid IP addresses.
<VulnDiscussion>Manipulation of IP addresses can allow untrusted systems to appear as trusted hosts, bypassing firewall and other security me...Rule Medium Severity -
SRG-OS-000481
<GroupDescription></GroupDescription>Group -
Wireless network adapters must be disabled.
<VulnDiscussion>The use of wireless networking can introduce many different attack vectors into the organization’s network. Common attack vec...Rule Medium Severity -
SRG-OS-000481
<GroupDescription></GroupDescription>Group -
The operating system must use mechanisms for authentication to a cryptographic module meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for such authentication.
<VulnDiscussion>Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified,...Rule Medium Severity -
SRG-OS-000033
<GroupDescription></GroupDescription>Group -
The operating system must implement DoD-approved encryption to protect the confidentiality of remote access sessions.
<VulnDiscussion>Remote access is any access to an organizational information system by a user (or an information system) communicating throug...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Permissions on user . (hidden) files must be 750 or less permissive.
<VulnDiscussion>Group-writable or world-writable user configuration files may enable malicious users to steal or modify other users' data or ...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must use cryptographic mechanisms to protect and restrict access to information on portable digital media.
<VulnDiscussion>When data is written to portable digital media, such as thumb drives, floppy diskettes, compact disks, and magnetic tape, etc...Rule Medium Severity -
SRG-OS-000185
<GroupDescription></GroupDescription>Group -
The operating system must protect the confidentiality and integrity of information at rest.
<VulnDiscussion>When data is written to digital media, such as hard drives, mobile computers, external/removable hard drives, personal digita...Rule Low Severity -
SRG-OS-000216
<GroupDescription></GroupDescription>Group -
The operating system must use cryptographic mechanisms to protect the integrity of audit information.
<VulnDiscussion>Protection of audit records and audit data is of critical importance. Cryptographic mechanisms are the industry established s...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The sticky bit must be set on all world writable directories.
<VulnDiscussion>Files in directories that have had the "sticky bit" enabled can only be deleted by users that have both write permissions for...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Permissions on user home directories must be 750 or less permissive.
<VulnDiscussion>Group-writable or world-writable user home directories may enable malicious users to steal or modify other users' data or to ...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Reserved UIDs 0-99 must only be used by system accounts.
<VulnDiscussion>If a user is assigned a UID that is in the reserved range, even if it is not presently in use, security exposures can arise i...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Duplicate group names must not exist.
<VulnDiscussion>If a group is assigned a duplicate group name, it will create and have access to files with the first GID for that group in g...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
User .netrc files must not exist.
<VulnDiscussion>The .netrc file presents a significant security risk since it stores passwords in unencrypted form.</VulnDiscussion><...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must not allow users to configure .forward files.
<VulnDiscussion>Use of the .forward file poses a security risk in that sensitive data may be inadvertently transferred outside the organizati...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.