Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000366-GPOS-00153

    Group
  • The SLEM 5 tool zypper must have gpgcheck enabled.

    Changes to any software components can have significant effects on the overall security of SLEM 5. This requirement ensures the software has not been tampered with and has been provided by a truste...
    Rule High Severity
  • SRG-OS-000437-GPOS-00194

    Group
  • SLEM 5 must remove all outdated software components after updated versions have been installed.

    Previous versions of software components that are not removed from the information system after updates have been installed may be exploited by adversaries. Some information technology products may...
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    Group
  • SLEM 5 must use vlock to allow for session locking.

    A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not want to log out because of the temporary...
    Rule Medium Severity
  • SRG-OS-000074-GPOS-00042

    Group
  • SLEM 5 must not have the telnet-server package installed.

    It is detrimental for SLEM 5 to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked, and ther...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • A separate file system must be used for SLEM 5 user home directories (such as /home or an equivalent).

    The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 must use a separate file system for /var.

    The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 must use a separate file system for the system audit data path.

    The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.

    The "nosuid" mount option causes the system to not execute "setuid" and "setgid" files with owner privileges. This option must be used for mounting any file system not containing approved "setuid" ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.

    The "noexec" mount option causes the system to not execute binary files. This option must be used for mounting any file system not containing approved binary files, as they may be incompatible. Exe...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.

    The "nosuid" mount option causes the system to not execute "setuid" and "setgid" files with owner privileges. This option must be used for mounting any file system not containing approved "setuid" ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules