II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000368
<GroupDescription></GroupDescription>Group -
The operating system must prevent program execution in accordance with local policies regarding software program usage and restrictions and/or rules authorizing the terms and conditions of software program usage.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...Rule Medium Severity -
SRG-OS-000370
<GroupDescription></GroupDescription>Group -
The operating system must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
<VulnDiscussion>Utilizing a whitelist provides a configuration management method for allowing the execution of only authorized software. Usin...Rule Medium Severity -
SRG-OS-000373
<GroupDescription></GroupDescription>Group -
The operating system must require users to re-authenticate for privilege escalation.
<VulnDiscussion>Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When opera...Rule Medium Severity -
SRG-OS-000373
<GroupDescription></GroupDescription>Group -
The operating system must require users to re-authenticate when changing roles.
<VulnDiscussion>Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When opera...Rule Medium Severity -
SRG-OS-000373
<GroupDescription></GroupDescription>Group -
The operating system must require users to re-authenticate when changing authenticators.
<VulnDiscussion>Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When opera...Rule Medium Severity -
SRG-OS-000374
<GroupDescription></GroupDescription>Group -
The operating system must require devices to re-authenticate when changing authenticators.
<VulnDiscussion>Without re-authentication, devices may access resources or perform tasks for which they do not have authorization. When ope...Rule Medium Severity -
SRG-OS-000375
<GroupDescription></GroupDescription>Group -
The operating system must implement multifactor authentication for remote access to privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.
<VulnDiscussion>Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the...Rule Medium Severity -
SRG-OS-000376
<GroupDescription></GroupDescription>Group -
The operating system must accept Personal Identity Verification (PIV) credentials.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...Rule Medium Severity -
SRG-OS-000377
<GroupDescription></GroupDescription>Group -
The operating system must electronically verify Personal Identity Verification (PIV) credentials.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...Rule Medium Severity -
SRG-OS-000378
<GroupDescription></GroupDescription>Group -
The operating system must authenticate peripherals before establishing a connection.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.