Skip to content

Solaris 11 SPARC Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Direct root account login must not be permitted for SSH access.

    &lt;VulnDiscussion&gt;The system should not allow users to log in as the root user directly, as audited actions would be non-attributable to a spec...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Login must not be permitted with empty/null passwords for SSH.

    &lt;VulnDiscussion&gt;Permitting login without a password is inherently risky.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule High Severity
  • SRG-OS-000163

    <GroupDescription></GroupDescription>
    Group
  • The system must ignore ICMP redirect messages.

    &lt;VulnDiscussion&gt;Ignoring ICMP redirect messages reduces the likelihood of denial of service attacks.&lt;/VulnDiscussion&gt;&lt;FalsePositives...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must reveal error messages only to authorized personnel.

    &lt;VulnDiscussion&gt;Proper file permissions and ownership ensures that only designated personnel in the organization can access error messages.&l...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit all administrative, privileged, and security actions.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules