Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000033-GPOS-00014

    Group
  • SLEM 5 must implement DOD-approved encryption to protect the confidentiality of SSH remote connections.

    Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DOD nonpublic information s...
    Rule High Severity
  • SRG-OS-000125-GPOS-00065

    Group
  • SLEM 5 SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2/140-3 approved cryptographic hash algorithms.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DOD nonpublic information systems by an auth...
    Rule High Severity
  • SRG-OS-000250-GPOS-00093

    Group
  • SLEM 5 SSH server must be configured to use only FIPS 140-2/140-3 validated key exchange algorithms.

    Without cryptographic integrity protections provided by FIPS 140-2/140-3 validated cryptographic algorithms, information can be viewed and altered by unauthorized users without detection. The syst...
    Rule High Severity
  • SRG-OS-000109-GPOS-00056

    Group
  • SLEM 5 must deny direct logons to the root account using remote access via SSH.

    To ensure individual accountability and prevent unauthorized access, organizational users must be individually identified and authenticated. A group authenticator is a generic account used by mult...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    Group
  • SLEM 5 must log SSH connection attempts and failures to the server.

    Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access man...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 must display the date and time of the last successful account logon upon an SSH logon.

    Providing users with feedback on when account accesses via SSH last occurred facilitates user recognition and reporting of unauthorized account use.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 SSH daemon must be configured to not allow authentication using known hosts authentication.

    Configuring this setting for the SSH daemon provides additional assurance that remote logon via SSH will require a password, even in the event of misconfiguration elsewhere.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 SSH daemon must perform strict mode checking of home directory configuration files.

    If other users have access to modify user-specific SSH configuration files, they may be able to log on to the system as another user.
    Rule Medium Severity
  • SRG-OS-000067-GPOS-00035

    Group
  • SLEM 5, for PKI-based authentication, must enforce authorized access to the corresponding private key.

    If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key use...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • There must be no .shosts files on SLEM 5.

    The .shosts files are used to configure host-based authentication for individual users or the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the s...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules