I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
OL 8 library files must be group-owned by root.
<VulnDiscussion>If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing t...Rule Medium Severity -
SRG-OS-000363-GPOS-00150
<GroupDescription></GroupDescription>Group -
The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency.
<VulnDiscussion>Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized ...Rule Medium Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
YUM must be configured to prevent the installation of patches, service packs, device drivers, or OL 8 system components that have not been digitally signed using a certificate that is recognized and approved by the organization.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the operating system. This require...Rule High Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
OL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the operating system. This require...Rule High Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
OL 8 must prevent the loading of a new kernel for later execution.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the operating system. This require...Rule Medium Severity -
SRG-OS-000312-GPOS-00122
<GroupDescription></GroupDescription>Group -
OL 8 must enable kernel parameters to enforce Discretionary Access Control (DAC) on symlinks.
<VulnDiscussion>DAC is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be aut...Rule Medium Severity -
SRG-OS-000312-GPOS-00122
<GroupDescription></GroupDescription>Group -
OL 8 must enable kernel parameters to enforce Discretionary Access Control (DAC) on hardlinks.
<VulnDiscussion>DAC is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be aut...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
<GroupDescription></GroupDescription>Group -
OL 8 must restrict access to the kernel message buffer.
<VulnDiscussion>Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...Rule Low Severity -
SRG-OS-000138-GPOS-00069
<GroupDescription></GroupDescription>Group -
OL 8 must prevent kernel profiling by unprivileged users.
<VulnDiscussion>Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...Rule Low Severity -
SRG-OS-000373-GPOS-00156
<GroupDescription></GroupDescription>Group -
OL 8 must require users to provide a password for privilege escalation.
<VulnDiscussion>Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operati...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
<GroupDescription></GroupDescription>Group -
OL 8 must require users to reauthenticate for privilege escalation and changing roles.
<VulnDiscussion>Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operati...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must restrict privilege elevation to authorized personnel.
<VulnDiscussion>The sudo command allows a user to execute programs with elevated (administrator) privileges. It prompts the user for their pa...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must use the invoking user's password for privilege escalation when using "sudo".
<VulnDiscussion>The sudoers security policy requires that users authenticate themselves before they can use sudo. When sudoers requires authe...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
<GroupDescription></GroupDescription>Group -
OL 8 must require re-authentication when using the "sudo" command.
<VulnDiscussion>Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When opera...Rule Medium Severity -
SRG-OS-000375-GPOS-00160
<GroupDescription></GroupDescription>Group -
OL 8 must have the package required for multifactor authentication installed.
<VulnDiscussion>Using an authentication device, such as a DoD Common Access Card (CAC) or token that is separate from the information system,...Rule Low Severity -
SRG-OS-000375-GPOS-00160
<GroupDescription></GroupDescription>Group -
OL 8 must implement certificate status checking for multifactor authentication.
<VulnDiscussion>Using an authentication device, such as a DoD Common Access Card (CAC) or token that is separate from the information system,...Rule Medium Severity -
SRG-OS-000376-GPOS-00161
<GroupDescription></GroupDescription>Group -
OL 8 must accept Personal Identity Verification (PIV) credentials.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. The DoD has mandated t...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
<GroupDescription></GroupDescription>Group -
OL 8 must implement non-executable data to protect its memory from unauthorized code execution.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
<GroupDescription></GroupDescription>Group -
OL 8 must clear the page allocator to prevent use-after-free attacks.
<VulnDiscussion>Adversaries may launch attacks with the intent of executing code in non-executable regions of memory or in memory locations t...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
<GroupDescription></GroupDescription>Group -
OL 8 must disable virtual syscalls.
<VulnDiscussion>Syscalls are special routines in the Linux kernel, which userspace applications ask to do privileged tasks. Invoking a system...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
<GroupDescription></GroupDescription>Group -
OL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must not let Meltdown and Spectre exploit critical vulnerabilities in modern processors.
<VulnDiscussion>Hardware vulnerabilities allow programs to steal data that is currently processed on the computer. While programs are typical...Rule Medium Severity -
SRG-OS-000433-GPOS-00193
<GroupDescription></GroupDescription>Group -
OL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...Rule Medium Severity -
SRG-OS-000437-GPOS-00194
<GroupDescription></GroupDescription>Group -
YUM must remove all software components after updated versions have been installed on OL 8.
<VulnDiscussion>Previous versions of software components that are not removed from the information system after updates have been installed m...Rule Low Severity -
SRG-OS-000445-GPOS-00199
<GroupDescription></GroupDescription>Group -
OL 8 must enable the SELinux targeted policy.
<VulnDiscussion>Without verification of the security functions, they may not operate correctly and the failure may go unnoticed. Security fun...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.