Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must mount "/dev/shm" with the "noexec" option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must mount "/tmp" with the "nodev" option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must mount "/tmp" with the "nosuid" option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must mount "/tmp" with the "noexec" option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must mount "/var/log" with the "nodev" option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must mount "/var/log" with the "nosuid" option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must mount "/var/log" with the "noexec" option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must mount "/var/log/audit" with the "nodev" option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must mount "/var/log/audit" with the "nosuid" option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must mount "/var/log/audit" with the "noexec" option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must mount "/var/tmp" with the "nodev" option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must mount "/var/tmp" with the "nosuid" option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must mount "/var/tmp" with the "noexec" option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • The OL 8 "fapolicy" module must be installed.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • The OL 8 "fapolicy" module must be enabled.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • The OL 8 fapolicy module must be configured to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000378-GPOS-00163

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must have the USBGuard installed.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...
    Rule Medium Severity
  • SRG-OS-000378-GPOS-00163

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must block unauthorized peripherals before establishing a connection.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...
    Rule Medium Severity
  • SRG-OS-000378-GPOS-00163

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must enable the USBGuard.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...
    Rule Medium Severity
  • SRG-OS-000142-GPOS-00071

    <GroupDescription></GroupDescription>
    Group
  • A firewall must be able to protect against or limit the effects of denial-of-service (DoS) attacks by ensuring OL 8 can implement rate-limiting measures on impacted network interfaces.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • All OL 8 networked systems must have SSH installed.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected commu...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • All OL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected commu...
    Rule Medium Severity
  • SRG-OS-000033-GPOS-00014

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must force a frequent session key renegotiation for SSH connections to the server.

    &lt;VulnDiscussion&gt;Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be r...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The x86 Ctrl-Alt-Delete key sequence must be disabled on OL 8.

    &lt;VulnDiscussion&gt;A locally logged-on user, who presses Ctrl-Alt-Delete when at the console, can reboot the system. If accidentally pressed, as...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The x86 Ctrl-Alt-Delete key sequence in OL 8 must be disabled if a graphical user interface is installed.

    &lt;VulnDiscussion&gt;A locally logged-on user, who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, a...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules