Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000021-GPOS-00005

    Group
  • SLEM 5 must lock an account after three consecutive invalid access attempts.

    By limiting the number of failed access attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00226

    Group
  • SLEM 5 must enforce a delay of at least five seconds between logon prompts following a failed logon attempt via pluggable authentication modules (PAM).

    Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • SLEM 5 must use the default pam_tally2 tally directory.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...
    Rule Medium Severity
  • SRG-OS-000027-GPOS-00008

    Group
  • SLEM 5 must limit the number of concurrent sessions to 10 for all accounts and/or account types.

    SLEM 5 management includes the ability to control the number of users and user sessions that use a SLEM 5. Limiting the number of allowed users and sessions per user is helpful in reducing the risk...
    Rule Low Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • SLEM 5 must have policycoreutils package installed.

    Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...
    Rule Low Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • SLEM 5 must use a Linux Security Module configured to enforce limits on system services.

    Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...
    Rule High Severity
  • SRG-OS-000445-GPOS-00199

    Group
  • SLEM 5 must enable the SELinux targeted policy.

    Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • SLEM 5 must prevent nonprivileged users from executing privileged functions, including disabling, circumventing, or altering implemented security safeguards/countermeasures.

    Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privilege...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 must use the invoking user's password for privilege escalation when using "sudo".

    The sudoers security policy requires that users authenticate themselves before they can use sudo. When sudoers requires authentication, it validates the invoking user's credentials. If the rootpw, ...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    Group
  • SLEM 5 must reauthenticate users when changing authenticators, roles, or escalating privileges.

    Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When SLEM 5 provides the capability to change user authenticators, change security r...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules