Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000363-GPOS-00150

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 system files must be monitored for unauthorized changes.

    &lt;VulnDiscussion&gt;Monitoring system files for changes against a baseline on a regular basis may help detect the possible introduction of malici...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 nonsystem-created file shares must limit access to groups that require it.

    &lt;VulnDiscussion&gt;Shares on a system provide network access. To prevent exposing sensitive information, where shares are necessary, permissions...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 must have software certificate installation files removed.

    &lt;VulnDiscussion&gt;Use of software certificates and their accompanying installation files for end users to access resources is less secure than ...
    Rule Medium Severity
  • SRG-OS-000185-GPOS-00079

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 systems requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.

    &lt;VulnDiscussion&gt;This requirement addresses protection of user-generated data as well as operating system-specific configuration data. Organiz...
    Rule Medium Severity
  • SRG-OS-000425-GPOS-00189

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 must implement protection methods such as TLS, encrypted VPNs, or IPsec if the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for examp...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 must have the roles and features required by the system documented.

    &lt;VulnDiscussion&gt;Unnecessary roles and features increase the attack surface of a system. Limiting roles and features of a system to only those...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 must have a host-based firewall installed and enabled.

    &lt;VulnDiscussion&gt;A firewall provides a line of defense against attack, allowing or blocking inbound and outbound connections based on a set of...
    Rule Medium Severity
  • SRG-OS-000191-GPOS-00080

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where Endpoint Security Solution (ESS) is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).

    &lt;VulnDiscussion&gt;Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the operating syste...
    Rule Medium Severity
  • SRG-OS-000002-GPOS-00002

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 must automatically remove or disable temporary user accounts after 72 hours.

    &lt;VulnDiscussion&gt;If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...
    Rule Medium Severity
  • SRG-OS-000123-GPOS-00064

    <GroupDescription></GroupDescription>
    Group
  • Windows Server 2022 must automatically remove or disable emergency accounts after the crisis is resolved or within 72 hours.

    &lt;VulnDiscussion&gt;Emergency administrator accounts are privileged accounts established in response to crisis situations where the need for rapi...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules