Skip to content

The operating system must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial of service attacks.

An XCCDF Rule

Description

In the case of denial of service attacks, care must be taken when designing the operating system so as to ensure that the operating system makes the best use of system resources.

ID
SV-216473r958528_rule
Version
SOL-11.1-090280
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

The Network Management profile is required.

Set each link's speed-duplex protection to an appropriate value based on each configured network interface's POSSIBLE settings.

Determine the OS version that is being secured: