III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000021-GPOS-00005
Group -
SLEM 5 must lock an account after three consecutive invalid access attempts.
By limiting the number of failed access attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the ...Rule Medium Severity -
SRG-OS-000480-GPOS-00226
Group -
SLEM 5 must enforce a delay of at least five seconds between logon prompts following a failed logon attempt via pluggable authentication modules (PAM).
Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.Rule Medium Severity -
SRG-OS-000021-GPOS-00005
Group -
SLEM 5 must use the default pam_tally2 tally directory.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...Rule Medium Severity -
SRG-OS-000027-GPOS-00008
Group -
SLEM 5 must limit the number of concurrent sessions to 10 for all accounts and/or account types.
SLEM 5 management includes the ability to control the number of users and user sessions that use a SLEM 5. Limiting the number of allowed users and sessions per user is helpful in reducing the risk...Rule Low Severity -
SRG-OS-000134-GPOS-00068
Group -
SLEM 5 must have policycoreutils package installed.
Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...Rule Low Severity -
SRG-OS-000134-GPOS-00068
Group -
SLEM 5 must use a Linux Security Module configured to enforce limits on system services.
Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...Rule High Severity -
SRG-OS-000445-GPOS-00199
Group -
SLEM 5 must enable the SELinux targeted policy.
Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
SLEM 5 must prevent nonprivileged users from executing privileged functions, including disabling, circumventing, or altering implemented security safeguards/countermeasures.
Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privilege...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 must use the invoking user's password for privilege escalation when using "sudo".
The sudoers security policy requires that users authenticate themselves before they can use sudo. When sudoers requires authentication, it validates the invoking user's credentials. If the rootpw, ...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
Group -
SLEM 5 must reauthenticate users when changing authenticators, roles, or escalating privileges.
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When SLEM 5 provides the capability to change user authenticators, change security r...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
Group -
SLEM 5 must require reauthentication when using the "sudo" command.
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, i...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 must restrict privilege elevation to authorized personnel.
The sudo command allows a user to execute programs with elevated (administrator) privileges. It prompts the user for their password and confirms the request to execute a command by checking a file,...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 must specify the default "include" directory for the /etc/sudoers file.
The "sudo" command allows authorized users to run programs (including shells) as other users, system users, and root. The "/etc/sudoers" file is used to configure authorized "sudo" users as well as...Rule Medium Severity -
SRG-OS-000069-GPOS-00037
Group -
SLEM 5 must enforce passwords that contain at least one uppercase character.
Use of a complex password helps increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting a...Rule Medium Severity -
SRG-OS-000070-GPOS-00038
Group -
SLEM 5 must enforce passwords that contain at least one lowercase character.
Use of a complex password helps increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting a...Rule Medium Severity -
SRG-OS-000071-GPOS-00039
Group -
SLEM 5 must enforce passwords that contain at least one numeric character.
Use of a complex password helps increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting a...Rule Medium Severity -
SRG-OS-000266-GPOS-00101
Group -
SLEM 5 must enforce passwords that contain at least one special character.
Use of a complex password helps increase the time and resources required to compromise the password. Password complexity or strength is a measure of the effectiveness of a password in resisting att...Rule Medium Severity -
SRG-OS-000480-GPOS-00225
Group -
SLEM 5 must prevent the use of dictionary words for passwords.
If SLEM 5 allows the user to select passwords based on dictionary words, this increases the chances of password compromise by increasing the opportunity for successful guesses and brute-force attacks.Rule Medium Severity -
SRG-OS-000078-GPOS-00046
Group -
SLEM 5 must employ passwords with a minimum of 15 characters.
The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...Rule Medium Severity -
SRG-OS-000072-GPOS-00040
Group -
SLEM 5 must require the change of at least eight of the total number of characters when passwords are changed.
If SLEM 5 allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at guessing ...Rule Medium Severity -
SRG-OS-000077-GPOS-00045
Group -
SLEM 5 must not allow passwords to be reused for a minimum of five generations.
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
Group -
SLEM 5 must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords.
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 must not be configured to allow blank or null passwords.
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 must not have accounts configured with blank or null passwords.
If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments.Rule High Severity -
SRG-OS-000075-GPOS-00043
Group -
SLEM 5 must employ user passwords with a minimum lifetime of 24 hours (one day).
Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually ch...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.