Skip to content

DISA STIG for SUSE Linux Enterprise 15

Rules and Groups employed by this XCCDF Profile

  • Verify Permissions on Important Files and Directories Are Configured in /etc/permissions.local

    Permissions for many files on a system must be set restrictively to ensure sensitive information is properly protected. This section discusses the ...
    Group
  • Verify that local /var/log/messages is not world-readable

    Files containing sensitive informations should be protected by restrictive permissions. Most of the time, there is no need that these files need to...
    Rule Medium Severity
  • Verify Permissions of Local Logs of audit Tools

    The SUSE operating system audit tools must have the proper permissions configured to protect against unauthorized access. Check that "permissions....
    Rule Medium Severity
  • Verify that Local Logs of the audit Daemon are not World-Readable

    Files containing sensitive informations should be protected by restrictive permissions. Most of the time, there is no need that these files need to...
    Rule Medium Severity
  • Restrict Programs from Dangerous Execution Patterns

    The recommendations in this section are designed to ensure that the system's features to protect against potentially dangerous program execution ar...
    Group
  • Restrict Access to Kernel Message Buffer

    To set the runtime status of the <code>kernel.dmesg_restrict</code> kernel parameter, run the following command: <pre>$ sudo sysctl -w kernel.dmesg...
    Rule Low Severity
  • Enable ExecShield

    ExecShield describes kernel features that provide protection against exploitation of memory corruption errors such as buffer overflows. These featu...
    Group
  • Restrict Exposed Kernel Pointer Addresses Access

    To set the runtime status of the <code>kernel.kptr_restrict</code> kernel parameter, run the following command: <pre>$ sudo sysctl -w kernel.kptr_r...
    Rule Medium Severity
  • Enable Randomized Layout of Virtual Address Space

    To set the runtime status of the <code>kernel.randomize_va_space</code> kernel parameter, run the following command: <pre>$ sudo sysctl -w kernel.r...
    Rule Medium Severity
  • Services

    The best protection against vulnerable software is running less software. This section describes how to review the software which SUSE Linux Enterp...
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules