Solaris 11 X86 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000062
<GroupDescription></GroupDescription>Group -
The operating system must support the capability to compile audit records from multiple components within the system into a system-wide (logical or physical) audit trail that is time-correlated to within organization-defined level of tolerance.
<VulnDiscussion>Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...Rule Medium Severity -
SRG-OS-000062
<GroupDescription></GroupDescription>Group -
The audit system must be configured to audit all discretionary access control permission modifications.
<VulnDiscussion>Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...Rule Medium Severity -
SRG-OS-000062
<GroupDescription></GroupDescription>Group -
The audit system must be configured to audit the loading and unloading of dynamic kernel modules.
<VulnDiscussion>Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...Rule Medium Severity -
SRG-OS-000343
<GroupDescription></GroupDescription>Group -
The audit system must alert the System Administrator (SA) if there is any type of audit failure.
<VulnDiscussion>Proper alerts to system administrators and Information Assurance (IA) officials of audit failures ensure a timely response to...Rule High Severity -
SRG-OS-000341
<GroupDescription></GroupDescription>Group -
The operating system must allocate audit record storage capacity.
<VulnDiscussion>Proper audit storage capacity is crucial to ensuring the ongoing logging of critical events.</VulnDiscussion><FalseP...Rule Medium Severity -
SRG-OS-000341
<GroupDescription></GroupDescription>Group -
The operating system must configure auditing to reduce the likelihood of storage capacity being exceeded.
<VulnDiscussion>Overflowing the audit storage area can result in a denial of service or system outage.</VulnDiscussion><FalsePositiv...Rule High Severity -
SRG-OS-000366
<GroupDescription></GroupDescription>Group -
The system must verify that package updates are digitally signed.
<VulnDiscussion>Digitally signed packages ensure that the source of the package can be identified.</VulnDiscussion><FalsePositives&g...Rule Medium Severity -
SRG-OS-000363
<GroupDescription></GroupDescription>Group -
The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.
<VulnDiscussion>Addition of unauthorized code or packages may result in data corruption or theft.</VulnDiscussion><FalsePositives>...Rule Medium Severity -
SRG-OS-000368
<GroupDescription></GroupDescription>Group -
The operating system must employ automated mechanisms to prevent program execution in accordance with the organization-defined specifications.
<VulnDiscussion>Operating systems are capable of providing a wide variety of functions and services. Execution must be disabled based on orga...Rule Medium Severity -
SRG-OS-000183
<GroupDescription></GroupDescription>Group -
The operating system must disable information system functionality that provides the capability for automatic execution of code on mobile devices without user direction.
<VulnDiscussion>Mobile devices include portable storage media (e.g., USB memory sticks, external hard disk drives) and portable computing and...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.