Skip to content

Solaris 11 X86 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The boundary protection system (firewall) must be configured to deny network traffic by default and must allow network traffic by exception (i.e., deny all, permit by exception).

    &lt;VulnDiscussion&gt;A firewall that relies on a deny all, permit by exception strategy requires all traffic to have explicit permission before tr...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must prevent local applications from generating source-routed packets.

    &lt;VulnDiscussion&gt;Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than c...
    Rule Low Severity
  • SRG-OS-000023

    <GroupDescription></GroupDescription>
    Group
  • The operating system must display the DoD approved system use notification message or banner before granting access to the system for general system logons.

    &lt;VulnDiscussion&gt;Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must ...
    Rule Low Severity
  • SRG-OS-000023

    <GroupDescription></GroupDescription>
    Group
  • The operating system must display the DoD approved system use notification message or banner for SSH connections.

    &lt;VulnDiscussion&gt;Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must ...
    Rule Low Severity
  • SRG-OS-000023

    <GroupDescription></GroupDescription>
    Group
  • The GNOME service must display the DoD approved system use notification message or banner before granting access to the system.

    &lt;VulnDiscussion&gt;Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must ...
    Rule Low Severity
  • SRG-OS-000023

    <GroupDescription></GroupDescription>
    Group
  • The FTP service must display the DoD approved system use notification message or banner before granting access to the system.

    &lt;VulnDiscussion&gt;Warning messages inform users who are attempting to log in to the system of their legal status regarding the system and must ...
    Rule Low Severity
  • SRG-OS-000126

    <GroupDescription></GroupDescription>
    Group
  • The operating system must terminate all sessions and network connections when nonlocal maintenance is completed.

    &lt;VulnDiscussion&gt;Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network,...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must prevent internal users from sending out packets which attempt to manipulate or spoof invalid IP addresses.

    &lt;VulnDiscussion&gt;Manipulation of IP addresses can allow untrusted systems to appear as trusted hosts, bypassing firewall and other security me...
    Rule Medium Severity
  • SRG-OS-000481

    <GroupDescription></GroupDescription>
    Group
  • Wireless network adapters must be disabled.

    &lt;VulnDiscussion&gt;The use of wireless networking can introduce many different attack vectors into the organization’s network. Common attack vec...
    Rule Medium Severity
  • SRG-OS-000481

    <GroupDescription></GroupDescription>
    Group
  • The operating system must use mechanisms for authentication to a cryptographic module meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for such authentication.

    &lt;VulnDiscussion&gt;Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified,...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules