Skip to content

Solaris 11 X86 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Run control scripts executable search paths must contain only authorized paths.

    &lt;VulnDiscussion&gt;The executable search path (typically the PATH environment variable) contains a list of directories for the shell to search t...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All .Xauthority files must have mode 0600 or less permissive.

    &lt;VulnDiscussion&gt;.Xauthority files ensure the user is authorized to access the specific X Windows host. Excessive permissions may permit unaut...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Run control scripts library search paths must contain only authorized paths.

    &lt;VulnDiscussion&gt;The library search path environment variable(s) contain a list of directories for the dynamic linker to search to find librar...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Run control scripts lists of preloaded libraries must contain only authorized paths.

    &lt;VulnDiscussion&gt;The library preload list environment variable contains a list of libraries for the dynamic linker to load before loading the ...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Run control scripts must not execute world writable programs or scripts.

    &lt;VulnDiscussion&gt;World writable files could be modified accidentally or maliciously to compromise system integrity.&lt;/VulnDiscussion&gt;&lt;...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All system start-up files must be owned by root.

    &lt;VulnDiscussion&gt;System start-up files not owned by root could lead to system compromise by allowing malicious users or applications to modify...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All system start-up files must be group-owned by root, sys, or bin.

    &lt;VulnDiscussion&gt;If system start-up files do not have a group owner of root or a system group, the files may be modified by malicious users or...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • System start-up files must only execute programs owned by a privileged UID or an application.

    &lt;VulnDiscussion&gt;System start-up files executing programs owned by other than root (or another privileged user) or an application indicates th...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Any X Windows host must write .Xauthority files.

    &lt;VulnDiscussion&gt;.Xauthority files ensure the user is authorized to access the specific X Windows host. If .Xauthority files are not used, it ...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The .Xauthority files must not have extended ACLs.

    &lt;VulnDiscussion&gt;.Xauthority files ensure the user is authorized to access the specific X Windows host. Extended ACLs may permit unauthorized ...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • X displays must not be exported to the world.

    &lt;VulnDiscussion&gt;Open X displays allow an attacker to capture keystrokes and to execute commands remotely. Many users have their X Server set ...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server.

    &lt;VulnDiscussion&gt;If access to the X server is not restricted, a user's X session may be compromised.&lt;/VulnDiscussion&gt;&lt;FalsePositives&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The .Xauthority utility must only permit access to authorized hosts.

    &lt;VulnDiscussion&gt;If unauthorized clients are permitted access to the X server, a user's X session may be compromised.&lt;/VulnDiscussion&gt;&l...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • X Window System connections that are not required must be disabled.

    &lt;VulnDiscussion&gt;If unauthorized clients are permitted access to the X server, a user's X session may be compromised.&lt;/VulnDiscussion&gt;&l...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The graphical login service provides the capability of logging into the system using an X-Windows type interface from the console. If graphical login access for the console is required, the service must be in local-only mode.

    &lt;VulnDiscussion&gt;Externally accessible graphical desktop software may open the system to remote attacks.&lt;/VulnDiscussion&gt;&lt;FalsePositi...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Generic Security Services (GSS) must be disabled.

    &lt;VulnDiscussion&gt;This service should be disabled if it is not required.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Systems services that are not required must be disabled.

    &lt;VulnDiscussion&gt;Services that are enabled but not required by the mission may provide excessive access or additional attack vectors to penetr...
    Rule Low Severity
  • TCP Wrappers must be enabled and configured per site policy to only allow access by approved hosts and services.

    &lt;VulnDiscussion&gt;TCP Wrappers are a host-based access control system that allows administrators to control who has access to various network s...
    Rule Medium Severity
  • SRG-OS-000076

    <GroupDescription></GroupDescription>
    Group
  • User passwords must be changed at least every 60 days.

    &lt;VulnDiscussion&gt;Limiting the lifespan of authenticators limits the period of time an unauthorized user has access to the system while using c...
    Rule Medium Severity
  • SRG-OS-000002

    <GroupDescription></GroupDescription>
    Group
  • The operating system must automatically terminate temporary accounts within 72 hours.

    &lt;VulnDiscussion&gt;If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...
    Rule Low Severity
  • SRG-OS-000075

    <GroupDescription></GroupDescription>
    Group
  • The operating system must enforce minimum password lifetime restrictions.

    &lt;VulnDiscussion&gt;Passwords need to be changed at specific policy-based intervals; however, if the information system or application allows the...
    Rule Medium Severity
  • SRG-OS-000078

    <GroupDescription></GroupDescription>
    Group
  • User passwords must be at least 15 characters in length.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting guessing and brute-force attac...
    Rule Medium Severity
  • SRG-OS-000072

    <GroupDescription></GroupDescription>
    Group
  • The system must require at least eight characters be changed between the old and new passwords during a password change.

    &lt;VulnDiscussion&gt;To ensure password changes are effective in their goals, the system must ensure old and new passwords have significant differ...
    Rule Medium Severity
  • SRG-OS-000069

    <GroupDescription></GroupDescription>
    Group
  • The system must require passwords to contain at least one uppercase alphabetic character.

    &lt;VulnDiscussion&gt;Complex passwords can reduce the likelihood of success of automated password-guessing attacks.&lt;/VulnDiscussion&gt;&lt;Fals...
    Rule Medium Severity
  • SRG-OS-000070

    <GroupDescription></GroupDescription>
    Group
  • The operating system must enforce password complexity requiring that at least one lowercase character is used.

    &lt;VulnDiscussion&gt;Complex passwords can reduce the likelihood of success of automated password-guessing attacks.&lt;/VulnDiscussion&gt;&lt;Fals...
    Rule Medium Severity
  • SRG-OS-000071

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules