II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
Group -
All SLEM 5 files and directories must have a valid group owner.
Files without a valid group owner may be unintentionally inherited if a group is assigned the same Group Identifier (GID) as the GID of the files without a valid group owner.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
All SLEM 5 local interactive user home directories must be group-owned by the home directory owner's primary group.
If the Group Identifier (GID) of a local interactive user's home directory is not the same as the primary GID of the user, this would allow unauthorized access to the user's files, and users that s...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
All SLEM 5 world-writable directories must be group-owned by root, sys, bin, or an application group.
If a world-writable directory has the sticky bit set and is not group-owned by a privileged Group Identifier (GID), unauthorized users may be able to modify files created by others. The only autho...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
Group -
The sticky bit must be set on all SLEM 5 world-writable directories.
Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of ...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
SLEM 5 must prevent unauthorized users from accessing system error messages.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify SLEM 5 or platform. Additio...Rule Medium Severity -
SRG-OS-000205-GPOS-00083
Group -
SLEM 5 must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
Any operating system providing too much information in error messages risks compromising the data and security of the structure, and content of error messages needs to be carefully considered by th...Rule Medium Severity -
SRG-OS-000096-GPOS-00050
Group -
SLEM 5 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.
To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restr...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
Group -
SLEM 5 clock must, for networked systems, be synchronized to an authoritative DOD time source at least every 24 hours.
Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when condu...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 must not have network interfaces in promiscuous mode unless approved and documented.
Network interfaces in promiscuous mode allow for the capture of all network traffic visible to the system. If unauthorized individuals can access these applications, it may allow then to collect in...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 must not forward Internet Protocol version 4 (IPv4) source-routed packets.
Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security me...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.