Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000122

    <GroupDescription></GroupDescription>
    Group
  • The operating system must provide an audit reduction capability that supports on-demand reporting requirements.

    &lt;VulnDiscussion&gt;The ability to generate on-demand reports, including after the audit data has been subjected to audit reduction, greatly faci...
    Rule Medium Severity
  • SRG-OS-000123

    <GroupDescription></GroupDescription>
    Group
  • The information system must automatically remove or disable emergency accounts after the crisis is resolved or 72 hours.

    &lt;VulnDiscussion&gt;Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid acc...
    Rule Medium Severity
  • SRG-OS-000125

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.

    &lt;VulnDiscussion&gt;If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the syst...
    Rule High Severity
  • SRG-OS-000126

    <GroupDescription></GroupDescription>
    Group
  • The operating system must terminate all sessions and network connections related to nonlocal maintenance when nonlocal maintenance is completed.

    &lt;VulnDiscussion&gt; If a maintenance session or connection remains open after maintenance is completed, it may be hijacked by an attacker and us...
    Rule Medium Severity
  • SRG-OS-000132

    <GroupDescription></GroupDescription>
    Group
  • The operating system must separate user functionality (including user interface services) from operating system management functionality.

    &lt;VulnDiscussion&gt;Operating system management functionality includes functions necessary for administration and requires privileged user access...
    Rule Medium Severity
  • SRG-OS-000134

    <GroupDescription></GroupDescription>
    Group
  • The operating system must isolate security functions from nonsecurity functions.

    &lt;VulnDiscussion&gt;An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform...
    Rule Medium Severity
  • SRG-OS-000138

    <GroupDescription></GroupDescription>
    Group
  • Operating systems must prevent unauthorized and unintended information transfer via shared system resources.

    &lt;VulnDiscussion&gt;Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...
    Rule Medium Severity
  • SRG-OS-000142

    <GroupDescription></GroupDescription>
    Group
  • The operating system must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of Denial of Service (DoS) attacks.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-OS-000163

    <GroupDescription></GroupDescription>
    Group
  • The operating system must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, except to fulfill documented and validated mission requirements.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-OS-000184

    <GroupDescription></GroupDescription>
    Group
  • The operating system must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.

    &lt;VulnDiscussion&gt;Failure to a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized acces...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules