Skip to content

Virtual Machine Manager Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000163

    <GroupDescription></GroupDescription>
    Group
  • The VMM must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, except to fulfill documented and validated mission requirements.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-OS-000184

    <GroupDescription></GroupDescription>
    Group
  • The VMM must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.

    &lt;VulnDiscussion&gt;Failure to a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized acces...
    Rule Medium Severity
  • SRG-OS-000185

    <GroupDescription></GroupDescription>
    Group
  • The VMM must protect the confidentiality and integrity of all information at rest.

    &lt;VulnDiscussion&gt;Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and...
    Rule Medium Severity
  • SRG-OS-000203

    <GroupDescription></GroupDescription>
    Group
  • The VMM must check the validity of all data inputs except those specifically identified by the organization.

    &lt;VulnDiscussion&gt;Invalid user input occurs when a user inserts data or characters into data entry fields and the VMM is unprepared to process ...
    Rule Medium Severity
  • SRG-OS-000205

    <GroupDescription></GroupDescription>
    Group
  • The VMM must automatically audit account removal actions.

    &lt;VulnDiscussion&gt;When VMM accounts are removed, user accessibility is affected. Once an attacker establishes access to a system, the attacker ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules