Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000404

    <GroupDescription></GroupDescription>
    Group
  • The operating system must implement cryptographic mechanisms to prevent unauthorized modification of all information at rest on all operating system components.

    &lt;VulnDiscussion&gt;Operating systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthor...
    Rule High Severity
  • SRG-OS-000405

    <GroupDescription></GroupDescription>
    Group
  • The operating system must implement cryptographic mechanisms to prevent unauthorized disclosure of all information at rest on all operating system components.

    &lt;VulnDiscussion&gt;Operating systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthor...
    Rule High Severity
  • SRG-OS-000420

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect against or limit the effects of Denial of Service (DoS) attacks by ensuring the operating system is implementing rate-limiting measures on impacted network interfaces.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-OS-000423

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect the confidentiality and integrity of transmitted information.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected commu...
    Rule High Severity
  • SRG-OS-000424

    <GroupDescription></GroupDescription>
    Group
  • The operating system must implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).

    &lt;VulnDiscussion&gt;Encrypting information for transmission protects information from unauthorized disclosure and modification. Cryptographic mec...
    Rule High Severity
  • SRG-OS-000425

    <GroupDescription></GroupDescription>
    Group
  • The operating system must maintain the confidentiality and integrity of information during preparation for transmission.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for examp...
    Rule Medium Severity
  • SRG-OS-000426

    <GroupDescription></GroupDescription>
    Group
  • The operating system must maintain the confidentiality and integrity of information during reception.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, duri...
    Rule Medium Severity
  • SRG-OS-000432

    <GroupDescription></GroupDescription>
    Group
  • The operating system must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.

    &lt;VulnDiscussion&gt;A common vulnerability of operating system is unpredictable behavior when invalid inputs are received. This requirement guard...
    Rule Medium Severity
  • SRG-OS-000433

    <GroupDescription></GroupDescription>
    Group
  • The operating system must implement non-executable data to protect its memory from unauthorized code execution.

    &lt;VulnDiscussion&gt;Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...
    Rule Medium Severity
  • SRG-OS-000433

    <GroupDescription></GroupDescription>
    Group
  • The operating system must implement address space layout randomization to protect its memory from unauthorized code execution.

    &lt;VulnDiscussion&gt;Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules