Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000075-GPOS-00043

    Group
  • SLEM 5 must be configured to create or update passwords with a minimum lifetime of 24 hours (one day).

    Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually ch...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • SLEM 5 must be configured to create or update passwords with a maximum lifetime of 60 days.

    Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If SLEM 5 does not limit the lifetime of passwords and force users to change th...
    Rule Medium Severity
  • SRG-OS-000375-GPOS-00160

    Group
  • SLEM 5 must have the packages required for multifactor authentication to be installed.

    Using an authentication device, such as a Common Access Card (CAC) or token separate from the information system, ensures that even if the information system is compromised, that compromise will no...
    Rule Medium Severity
  • SRG-OS-000068-GPOS-00036

    Group
  • SLEM 5 must implement multifactor authentication for access to privileged accounts via pluggable authentication modules (PAM).

    Using an authentication device, such as a Common Access Card (CAC) or token that is separate from the information system, ensures that even if the information system is compromised, that compromise...
    Rule Medium Severity
  • SRG-OS-000375-GPOS-00160

    Group
  • SLEM 5 must implement certificate status checking for multifactor authentication.

    Using an authentication device, such as a Common Access Card (CAC) or token separate from the information system, ensures credentials stored on the authentication device will not be affected if the...
    Rule Medium Severity
  • SRG-OS-000383-GPOS-00166

    Group
  • If Network Security Services (NSS) is being used by SLEM 5 it must prohibit the use of cached authentications after one day.

    If cached authentication information is out of date, the validity of the authentication information may be questionable.
    Rule Medium Severity
  • SRG-OS-000383-GPOS-00166

    Group
  • SLEM 5 must configure the Linux Pluggable Authentication Modules (PAM) to prohibit the use of cached offline authentications after one day.

    If cached authentication information is out of date, the validity of the authentication information may be questionable.
    Rule Medium Severity
  • SRG-OS-000066-GPOS-00034

    Group
  • SLEM 5, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

    Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.

    The "pam-config" command line utility automatically generates a system PAM configuration as packages are installed, updated, or removed from the system. "pam-config" removes configurations for PAM ...
    Rule Medium Severity
  • SRG-OS-000363-GPOS-00150

    Group
  • SLEM 5 must use a file integrity tool to verify correct operation of all security functions.

    Without verification of the security functions, security functions may not operate correctly, and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwa...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules