Skip to content

Solaris 11 X86 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All valid SUID/SGID files must be documented.

    &lt;VulnDiscussion&gt;There are valid reasons for SUID/SGID programs, but it is important to identify and review such programs to ensure they are l...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must have no unowned files.

    &lt;VulnDiscussion&gt;A new user who is assigned a deleted user's user ID or group ID may then end up owning these files, and thus have more access...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must have no files with extended attributes.

    &lt;VulnDiscussion&gt;Attackers or malicious users could hide information, exploits, etc. in extended attribute areas. Since extended attributes ar...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000344

    <GroupDescription></GroupDescription>
    Group
  • The operator must document all file system objects that have non-standard access control list settings.

    &lt;VulnDiscussion&gt;Access Control Lists allow an object owner to expand permissions on an object to specific users and groups in addition to the...
    Rule Medium Severity
  • The system must not have any unnecessary accounts.

    &lt;VulnDiscussion&gt;Accounts providing no operational purpose provide additional opportunities for system compromise. Unnecessary accounts includ...
    Rule Low Severity
  • The operating system must be a supported release.

    &lt;VulnDiscussion&gt;An operating system release is considered supported if the vendor continues to provide security patches for the product. With...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must implement non-executable program stacks.

    &lt;VulnDiscussion&gt;A common type of exploit is the stack buffer overflow. An application receives, from an attacker, more data than it is prepar...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Address Space Layout Randomization (ASLR) must be enabled.

    &lt;VulnDiscussion&gt;Modification of memory area can result in executable code vulnerabilities. ASLR can reduce the likelihood of these attacks. A...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Process core dumps must be disabled unless needed.

    &lt;VulnDiscussion&gt;Process core dumps contain the memory in use by the process when it crashed. Process core dump files can be of significant si...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must be configured to store any process core dumps in a specific, centralized directory.

    &lt;VulnDiscussion&gt;Specifying a centralized location for core file creation allows for the centralized protection of core files. Process core du...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules