II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "rm" command.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "rmmod" command.
Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit rec...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "setfacl" command.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "ssh-agent" command.
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "ssh-keysign" command.
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "su" command.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "sudo" command.
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "sudoedit" command.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "unix_chkpwd" or "unix2_chkpwd" commands.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "usermod" command.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
Group -
SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
Group -
SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
Group -
SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
Group -
SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "chmod", "fchmod" and "fchmodat" system calls.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "chown", "fchown", "fchownat", and "lchown" system calls.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "creat", "open", "openat", "open_by_handle_at", "truncate", and "ftruncate" system calls.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "delete_module" system call.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "init_module" and "finit_module" system calls.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "mount" system call.
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "umount" system call.
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...Rule Medium Severity -
SRG-OS-000468-GPOS-00212
Group -
SLEM 5 must generate audit records for all uses of the "unlink", "unlinkat", "rename", "renameat", and "rmdir" system calls.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
Group -
SLEM 5 must generate audit records for all uses of privileged functions.
Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all modifications to the "lastlog" file.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.