Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000095-GPOS-00049

    Group
  • The storage system in a hardened configuration must be configured to disable the Remote Copy feature, unless needed.

    It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooke...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The CIM service must be disabled, unless needed.

    It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooke...
    Rule Medium Severity
  • SRG-OS-000126-GPOS-00066

    Group
  • The storage system must terminate all network connections associated with a communications session at the end of the session, at shutdown, or after 10 minutes of inactivity.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • The CIM service must use DoD-approved encryption.

    Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected communications can be intercepted and either read or altered. Facilitating t...
    Rule High Severity
  • SRG-OS-000033-GPOS-00014

    Group
  • DoD-approved encryption must be implemented to protect the confidentiality and integrity of remote access sessions, information during preparation for transmission, information during reception, and information during transmission in addition to enforcing replay-resistant authentication mechanisms for network access to privileged accounts.

    Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected communications can be intercepted and either read or altered. Cryptographic...
    Rule High Severity
  • SRG-OS-000404-GPOS-00183

    Group
  • The storage system must implement cryptographic mechanisms to prevent unauthorized modification or disclosure of all information at rest on all storage system components.

    Operating systems handling data requiring “data at rest” protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest. Selection ...
    Rule Low Severity
  • SRG-OS-000046-GPOS-00022

    Group
  • SNMP must be changed from default settings and must be configured on the storage system to provide alerts of critical events that impact system security.

    Whether active or not, default SNMP passwords, users, and passphrases must be changed to maintain security. If the service is running with the default authenticators, anyone can gather data about t...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The SNMP service on the storage system must use only SNMPv3 or its successors.

    SNMP Versions 1 and 2 are not considered secure. Without the strong authentication and privacy provided by the SNMP Version 3 User-based Security Model (USM), an attacker or other unauthorized user...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The SNMP service on the storage system must require the use of a FIPS 140-2 approved cryptographic hash algorithm as part of its authentication and integrity methods.

    The SNMP service must use AES or a FIPS 140-2 approved successor algorithm for protecting the privacy of communications.
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    Group
  • The storage system must, for networked systems, compare internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).

    Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when condu...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules