III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000021-GPOS-00005
Group -
SLEM 5 must lock an account after three consecutive invalid access attempts.
By limiting the number of failed access attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the ...Rule Medium Severity -
SRG-OS-000480-GPOS-00226
Group -
SLEM 5 must enforce a delay of at least five seconds between logon prompts following a failed logon attempt via pluggable authentication modules (PAM).
Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.Rule Medium Severity -
SRG-OS-000021-GPOS-00005
Group -
SLEM 5 must use the default pam_tally2 tally directory.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...Rule Medium Severity -
SRG-OS-000027-GPOS-00008
Group -
SLEM 5 must limit the number of concurrent sessions to 10 for all accounts and/or account types.
SLEM 5 management includes the ability to control the number of users and user sessions that use a SLEM 5. Limiting the number of allowed users and sessions per user is helpful in reducing the risk...Rule Low Severity -
SRG-OS-000134-GPOS-00068
Group -
SLEM 5 must have policycoreutils package installed.
Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...Rule Low Severity -
SRG-OS-000134-GPOS-00068
Group -
SLEM 5 must use a Linux Security Module configured to enforce limits on system services.
Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...Rule High Severity -
SRG-OS-000445-GPOS-00199
Group -
SLEM 5 must enable the SELinux targeted policy.
Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
SLEM 5 must prevent nonprivileged users from executing privileged functions, including disabling, circumventing, or altering implemented security safeguards/countermeasures.
Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privilege...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 must use the invoking user's password for privilege escalation when using "sudo".
The sudoers security policy requires that users authenticate themselves before they can use sudo. When sudoers requires authentication, it validates the invoking user's credentials. If the rootpw, ...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
Group -
SLEM 5 must reauthenticate users when changing authenticators, roles, or escalating privileges.
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When SLEM 5 provides the capability to change user authenticators, change security r...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.