I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000138-GPOS-00069
Group -
SLEM 5 must restrict access to the kernel message buffer.
Restricting access to the kernel message buffer limits access only to root. This prevents attackers from gaining additional system information as a nonprivileged user.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 kernel core dumps must be disabled unless needed.
Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a considerable amount of disk space and may result in denial of service (DoS...Rule Medium Severity -
SRG-OS-000433-GPOS-00193
Group -
Address space layout randomization (ASLR) must be implemented by SLEM 5 to protect memory from unauthorized code execution.
Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory inclu...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
Group -
SLEM 5 must implement kptr-restrict to prevent the leaking of internal kernel addresses.
Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory inclu...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Vendor-packaged SLEM 5 security patches and updates must be installed and up to date.
Timely patching is critical for maintaining the operational availability, confidentiality, and integrity of information technology (IT) systems. However, failure to keep SLEM 5 and application soft...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.