Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000363-GPOS-00150

    Group
  • The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner.

    Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized access to the operating system. Changes to operating system configuratio...
    Rule Medium Severity
  • SRG-OS-000366-GPOS-00153

    Group
  • The Oracle Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.

    Changes to any software components can have significant effects on the overall security of the operating system. This requirement ensures the software has not been tampered with and that it has bee...
    Rule High Severity
  • SRG-OS-000366-GPOS-00153

    Group
  • The Oracle Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.

    Changes to any software components can have significant effects on the overall security of the operating system. This requirement ensures the software has not been tampered with and that it has bee...
    Rule High Severity
  • SRG-OS-000114-GPOS-00059

    Group
  • The Oracle Linux operating system must be configured to disable USB mass storage.

    USB mass storage permits easy introduction of unknown devices, thereby facilitating malicious activity. Satisfies: SRG-OS-000114-GPOS-00059, SRG-OS-000378-GPOS-00163, SRG-OS-000480-GPOS-00227
    Rule Medium Severity
  • SRG-OS-000378-GPOS-00163

    Group
  • The Oracle Linux operating system must be configured so that the Datagram Congestion Control Protocol (DCCP) kernel module is disabled unless required.

    Disabling DCCP protects the system against exploitation of any flaws in the protocol implementation.
    Rule Medium Severity
  • SRG-OS-000114-GPOS-00059

    Group
  • The Oracle Linux operating system must disable the file system automounter unless required.

    Automatically mounting file systems permits easy introduction of unknown devices, thereby facilitating malicious activity. Satisfies: SRG-OS-000114-GPOS-00059, SRG-OS-000378-GPOS-00163, SRG-OS-000...
    Rule Medium Severity
  • SRG-OS-000437-GPOS-00194

    Group
  • The Oracle Linux operating system must remove all software components after updated versions have been installed.

    Previous versions of software components that are not removed from the information system after updates have been installed may be exploited by adversaries. Some information technology products may...
    Rule Low Severity
  • SRG-OS-000445-GPOS-00199

    Group
  • The Oracle Linux operating system must enable SELinux.

    Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled on the command line.

    A locally logged-on user who presses Ctrl-Alt-Delete when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the ...
    Rule High Severity
  • SRG-OS-000480-GPOS-00228

    Group
  • The Oracle Linux operating system must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.

    Setting the most restrictive default permissions ensures that when new accounts are created, they do not have unnecessary access.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must be a vendor supported release.

    An operating system release is considered "supported" if the vendor continues to provide security patches for the product. With an unsupported release, it will not be possible to resolve security i...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system security patches and updates must be installed and up to date.

    Timely patching is critical for maintaining the operational availability, confidentiality, and integrity of information technology (IT) systems. However, failure to keep operating system and applic...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must not have unnecessary accounts.

    Accounts providing no operational purpose provide additional opportunities for system compromise. Unnecessary accounts include user accounts for individuals not requiring access to the system and a...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • The Oracle Linux operating system must be configured so that all Group Identifiers (GIDs) referenced in the /etc/passwd file are defined in the /etc/group file.

    If a user is assigned the GID of a group not existing on the system, and a group with the GID is subsequently created, the user may have unintended rights to any files associated with the group.
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must be configured so that the root account must be the only account having unrestricted access to the system.

    If an account other than root also has a User Identifier (UID) of "0", it has root authority, giving that account unrestricted access to the entire operating system. Multiple accounts with a UID of...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must be configured so that all files and directories have a valid owner.

    Unowned files and directories may be unintentionally inherited if a user is assigned the same User Identifier (UID) as the UID of the un-owned files.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must be configured so that all files and directories have a valid group owner.

    Files without a valid group owner may be unintentionally inherited if a group is assigned the same Group Identifier (GID) as the GID of the files without a valid group owner.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must be configured so that all local interactive user accounts, upon creation, are assigned a home directory.

    If local interactive users are not assigned a valid home directory, there is no place for the storage and control of owned files.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must be configured so that all local interactive users have a home directory assigned and defined in the /etc/passwd file.

    If local interactive users are not assigned a valid home directory, there is no place for the storage and control of files they should own. In addition, if a local interactive user has a home direc...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must be configured so that all local interactive user home directories have mode 0750 or less permissive.

    Excessive permissions on local interactive user home directories may allow unauthorized access to user files by other users.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must be configured so that all local interactive user home directories are owned by their respective users.

    If a local interactive user does not own their home directory, unauthorized users could access or modify the user's files, and the users may not be able to access their own files.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must be configured so that all local interactive user home directories are group-owned by the home directory owners primary group.

    If the Group Identifier (GID) of a local interactive user's home directory is not the same as the primary GID of the user, this would allow unauthorized access to the user's files, and users that s...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a valid owner.

    Unowned files and directories may be unintentionally inherited if a user is assigned the same User Identifier "UID" as the UID of the un-owned files.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.

    If a local interactive user's files are group-owned by a group of which the user is not a member, unintended users may be able to access them.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a mode of 0750 or less permissive.

    If a local interactive user files have excessive permissions, unintended users may be able to access or modify them.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules