Skip to content

Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • TOSS must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    <VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-OS-000114-GPOS-00059

    <GroupDescription></GroupDescription>
    Group
  • TOSS must be configured so that all network connections associated with SSH traffic are terminated at the end of the session or after 10 minutes of inactivity, except to fulfill documented and validated mission requirements.

    &lt;VulnDiscussion&gt;Terminating an idle SSH session within a short time period reduces the window of opportunity for unauthorized personnel to ta...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    <GroupDescription></GroupDescription>
    Group
  • TOSS must have policycoreutils package installed.

    &lt;VulnDiscussion&gt;Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...
    Rule Low Severity
  • SRG-OS-000185-GPOS-00079

    <GroupDescription></GroupDescription>
    Group
  • All TOSS local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.

    &lt;VulnDiscussion&gt;TOSS systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • TOSS must limit privileges to change software resident within software libraries.

    &lt;VulnDiscussion&gt;If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented...
    Rule Medium Severity
  • SRG-OS-000266-GPOS-00101

    <GroupDescription></GroupDescription>
    Group
  • TOSS must enforce password complexity by requiring that at least one special character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity o...
    Rule Medium Severity
  • A firewall must be installed on TOSS.

    &lt;VulnDiscussion&gt;"Firewalld" provides an easy and effective way to block/limit remote access to the system via ports, services, and protocols....
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • TOSS must take appropriate action when the internal event queue is full.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...
    Rule Medium Severity
  • SRG-OS-000376-GPOS-00161

    <GroupDescription></GroupDescription>
    Group
  • TOSS must accept Personal Identity Verification (PIV) credentials.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. The DoD has mandated the...
    Rule Medium Severity
  • SRG-OS-000393-GPOS-00173

    <GroupDescription></GroupDescription>
    Group
  • TOSS must implement DoD-approved encryption in the OpenSSL package.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule Medium Severity
  • SRG-OS-000420-GPOS-00186

    <GroupDescription></GroupDescription>
    Group
  • All TOSS local files and directories must have a valid group owner.

    &lt;VulnDiscussion&gt;Files without a valid group owner may be unintentionally inherited if a group is assigned the same Group Identifier (GID) as ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • A firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring TOSS can implement rate-limiting measures on impacted network interfaces.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00192

    <GroupDescription></GroupDescription>
    Group
  • TOSS must implement non-executable data to protect its memory from unauthorized code execution.

    &lt;VulnDiscussion&gt;Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...
    Rule Medium Severity
  • SRG-OS-000437-GPOS-00194

    <GroupDescription></GroupDescription>
    Group
  • YUM must remove all software components after updated versions have been installed on TOSS.

    &lt;VulnDiscussion&gt;Previous versions of software components that are not removed from the information system after updates have been installed m...
    Rule Low Severity
  • SRG-OS-000445-GPOS-00199

    <GroupDescription></GroupDescription>
    Group
  • TOSS must enable the "SELinux" targeted policy.

    &lt;VulnDiscussion&gt;Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00225

    <GroupDescription></GroupDescription>
    Group
  • TOSS must prevent the use of dictionary words for passwords.

    &lt;VulnDiscussion&gt;If TOSS allows the user to select passwords based on dictionary words, then this increases the chances of password compromise...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00226

    <GroupDescription></GroupDescription>
    Group
  • TOSS must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.

    &lt;VulnDiscussion&gt;Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain acc...
    Rule Medium Severity
  • If the Trivial File Transfer Protocol (TFTP) server is required, the TOSS TFTP daemon must be configured to operate in secure mode.

    &lt;VulnDiscussion&gt;Restricting TFTP to a specific directory prevents remote users from copying, transferring, or overwriting system files.&lt;/V...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The graphical display manager must not be installed on TOSS unless approved.

    &lt;VulnDiscussion&gt;Internet services that are not required for system or application processes must not be active to decrease the attack surface...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The TOSS file integrity tool must be configured to verify Access Control Lists (ACLs).

    &lt;VulnDiscussion&gt;ACLs can provide permissions beyond those permitted through the file mode and must be verified by file integrity tools. TOSS...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The TOSS file integrity tool must be configured to verify extended attributes.

    &lt;VulnDiscussion&gt;Extended attributes in file systems are used to contain arbitrary data and file metadata with security implications. TOSS in...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The TOSS SSH daemon must perform strict mode checking of home directory configuration files.

    &lt;VulnDiscussion&gt;If other users have access to modify user-specific SSH configuration files, they may be able to log on to the system as anoth...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The TOSS SSH private host key files must have mode 0600 or less permissive.

    &lt;VulnDiscussion&gt;If an unauthorized user obtains the private SSH host key file, the host could be impersonated.&lt;/VulnDiscussion&gt;&lt;Fals...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The TOSS SSH public host key files must have mode 0644 or less permissive.

    &lt;VulnDiscussion&gt;If a public host key file is modified by an unauthorized user, the SSH service may be compromised.&lt;/VulnDiscussion&gt;&lt;...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The x86 Ctrl-Alt-Delete key sequence must be disabled on TOSS.

    &lt;VulnDiscussion&gt;A locally logged-on user, who presses Ctrl-Alt-Delete when at the console, can reboot the system. If accidentally pressed, as...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • TOSS must be a vendor-supported release.

    &lt;VulnDiscussion&gt;An operating system release is considered "supported" if the vendor continues to provide security patches for the product. Wi...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules