Skip to content

Solaris 11 SPARC Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The audit system must be configured to audit failed attempts to access files and programs.

    <VulnDiscussion>Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Low Severity
  • SRG-OS-000061

    <GroupDescription></GroupDescription>
    Group
  • X displays must not be exported to the world.

    &lt;VulnDiscussion&gt;Open X displays allow an attacker to capture keystrokes and to execute commands remotely. Many users have their X Server set ...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server.

    &lt;VulnDiscussion&gt;If access to the X server is not restricted, a user's X session may be compromised.&lt;/VulnDiscussion&gt;&lt;FalsePositives&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The .Xauthority utility must only permit access to authorized hosts.

    &lt;VulnDiscussion&gt;If unauthorized clients are permitted access to the X server, a user's X session may be compromised.&lt;/VulnDiscussion&gt;&l...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • X Window System connections that are not required must be disabled.

    &lt;VulnDiscussion&gt;If unauthorized clients are permitted access to the X server, a user's X session may be compromised.&lt;/VulnDiscussion&gt;&l...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • There must be no user .rhosts files.

    &lt;VulnDiscussion&gt;Even though the .rhosts files are ineffective if support is disabled in /etc/pam.conf, they may have been brought over from o...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Groups assigned to users must exist in the /etc/group file.

    &lt;VulnDiscussion&gt;Groups defined in passwd but not in group file pose a threat to system security since group permissions are not properly mana...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Users must have a valid home directory assignment.

    &lt;VulnDiscussion&gt;All users must be assigned a home directory in the passwd file. Failure to have a home directory may result in the user being...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All user accounts must be configured to use a home directory that exists.

    &lt;VulnDiscussion&gt;If the user's home directory does not exist, the user will be placed in "/" and will not be able to write any files or have l...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All home directories must be owned by the respective user assigned to it in /etc/passwd.

    &lt;VulnDiscussion&gt;Since the user is accountable for files stored in the user's home directory, the user must be the owner of the directory.&lt;...
    Rule Medium Severity
  • SRG-OS-000104

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules