Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 file integrity tool must be configured to verify Access Control Lists (ACLs).

    ACLs can provide permissions beyond those permitted through the file mode and must be verified by file integrity tools.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 file integrity tool must be configured to verify extended attributes.

    Extended attributes in file systems are used to contain arbitrary data and file metadata with security implications.
    Rule Medium Severity
  • SRG-OS-000278-GPOS-00108

    Group
  • SLEM 5 file integrity tool must be configured to protect the integrity of the audit tools.

    Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit information. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000363-GPOS-00150

    Group
  • Advanced Intrusion Detection Environment (AIDE) must verify the baseline SLEM 5 configuration at least weekly.

    Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized access to SLEM 5. Changes to SLEM 5 configurations can have unintended s...
    Rule Medium Severity
  • SRG-OS-000447-GPOS-00201

    Group
  • SLEM 5 must notify the system administrator (SA) when Advanced Intrusion Detection Environment (AIDE) discovers anomalies in the operation of any security functions.

    If anomalies are not acted on, security functions may fail to secure the system. Security function is defined as the hardware, software, and/or firmware of the information system responsible for e...
    Rule Medium Severity
  • SRG-OS-000479-GPOS-00224

    Group
  • SLEM 5 must offload rsyslog messages for networked systems in real time and offload standalone systems at least weekly.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity.
    Rule Medium Severity
  • SRG-OS-000337-GPOS-00129

    Group
  • SLEM 5 must have the auditing package installed.

    Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it would be difficult to establish, correlate, and investigate the events ...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    Group
  • SLEM 5 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.

    Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it would be difficult to establish, correlate, and investigate the events ...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    Group
  • The audit-audispd-plugins package must be installed on SLEM 5.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity. Th...
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    Group
  • SLEM 5 must allocate audit record storage capacity to store at least one week of audit records when audit records are not immediately sent to a central audit record storage facility.

    To ensure SLEM 5 has a sufficient storage capacity in which to write the audit logs, SLEM 5 must be able to allocate audit record storage capacity. The task of allocating audit record storage capa...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules