Skip to content

Solaris 11 X86 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000030

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must provide the capability for users to directly initiate session lock mechanisms.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000031

    <GroupDescription></GroupDescription>
    Group
  • The operating system session lock mechanism, when activated on a device with a display screen, must place a publicly viewable pattern onto the associated display, hiding what was previously visible on the screen.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must not allow logins for users with blank passwords.

    &lt;VulnDiscussion&gt;If the password field is blank and the system does not enforce a policy that passwords are required, it could allow login wit...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must prevent remote devices that have established a non-remote connection with the system from communicating outside of the communication path with resources in external networks.

    &lt;VulnDiscussion&gt;This control enhancement is implemented within the remote device (e.g., notebook/laptop computer) via configuration settings ...
    Rule Medium Severity
  • SRG-OS-000027

    <GroupDescription></GroupDescription>
    Group
  • The operating system must limit the number of concurrent sessions for each account to an organization-defined number of sessions.

    &lt;VulnDiscussion&gt;Limiting the number of allowed users and sessions per user can limit risks related to denial of service attacks. The organiza...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must disable directed broadcast packet forwarding.

    &lt;VulnDiscussion&gt;This parameter must be disabled to reduce the risk of denial of service attacks.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;...
    Rule Low Severity
  • The system must not respond to ICMP timestamp requests.

    &lt;VulnDiscussion&gt;By accurately determining the system's clock state, an attacker can more effectively attack certain time-based pseudorandom n...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not respond to ICMP broadcast timestamp requests.

    &lt;VulnDiscussion&gt;By accurately determining the system's clock state, an attacker can more effectively attack certain time-based pseudorandom n...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not respond to ICMP broadcast netmask requests.

    &lt;VulnDiscussion&gt;By determining the netmasks of various computers in your network, an attacker can better map your subnet structure and infer ...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not respond to broadcast ICMP echo requests.

    &lt;VulnDiscussion&gt;ICMP echo requests can be useful for reconnaissance of systems and for denial of service attacks.&lt;/VulnDiscussion&gt;&lt;F...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules