III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000355-GPOS-00143
<GroupDescription></GroupDescription>Group -
OL 8 must compare internal information system clocks at least every 24 hours with a server synchronized to an authoritative time source, such as the United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
OL 8 must disable the chrony daemon from acting as a server.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Low Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
OL 8 must disable network management of the chrony daemon.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Low Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
OL 8 must not have the telnet-server package installed.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule High Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
OL 8 must not have any automated bug reporting tools installed.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
OL 8 must not have the sendmail package installed.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
OL 8 must enable mitigations against processor-based vulnerabilities.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Low Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
OL 8 must not have the rsh-server package installed.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule High Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
OL 8 must cover or disable the built-in or attached camera when not in use.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must not have the asynchronous transfer mode (ATM) kernel module installed if not required for operational support.
<VulnDiscussion>The ATM is a transport layer protocol designed for digital transmission of multiple types of traffic, including telephony (v...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must not have the Controller Area Network (CAN) kernel module installed if not required for operational support.
<VulnDiscussion>The CAN protocol is a robust vehicle bus standard designed to allow microcontrollers and devices to communicate with each oth...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must not have the stream control transmission protocol (SCTP) kernel module installed if not required for operational support.
<VulnDiscussion>The SCTP is a transport layer protocol, designed to support the idea of message-oriented communication, with several streams ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
OL 8 must disable the transparent inter-process communication (TIPC) protocol.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Low Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
OL 8 must disable mounting of cramfs.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Low Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
OL 8 must disable IEEE 1394 (FireWire) Support.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Low Severity -
SRG-OS-000096-GPOS-00050
<GroupDescription></GroupDescription>Group -
OL 8 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.
<VulnDiscussion>To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...Rule Medium Severity -
SRG-OS-000114-GPOS-00059
<GroupDescription></GroupDescription>Group -
The OL 8 file system automounter must be disabled unless required.
<VulnDiscussion>Verify the operating system disables the ability to automount devices. Determine if automounter service is active with the...Rule Medium Severity -
SRG-OS-000114-GPOS-00059
<GroupDescription></GroupDescription>Group -
OL 8 must be configured to disable the ability to use USB mass storage devices.
<VulnDiscussion>USB mass storage permits easy introduction of unknown devices, thereby facilitating malicious activity.</VulnDiscussion>...Rule Medium Severity -
SRG-OS-000297-GPOS-00115
<GroupDescription></GroupDescription>Group -
An OL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.
<VulnDiscussion>Failure to restrict network connectivity only to authorized systems permits inbound connections from malicious systems. It al...Rule Medium Severity -
SRG-OS-000297-GPOS-00115
<GroupDescription></GroupDescription>Group -
A firewall must be installed on OL 8.
<VulnDiscussion>"Firewalld" provides an easy and effective way to block/limit remote access to the system via ports, services, and protocols....Rule Medium Severity -
SRG-OS-000297-GPOS-00115
<GroupDescription></GroupDescription>Group -
A firewall must be active on OL 8.
<VulnDiscussion>"Firewalld" provides an easy and effective way to block/limit remote access to the system via ports, services, and protocols....Rule Medium Severity -
SRG-OS-000299-GPOS-00117
<GroupDescription></GroupDescription>Group -
OL 8 wireless network adapters must be disabled.
<VulnDiscussion>Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unpr...Rule Medium Severity -
SRG-OS-000300-GPOS-00118
<GroupDescription></GroupDescription>Group -
OL 8 Bluetooth must be disabled.
<VulnDiscussion>Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unpr...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
OL 8 must mount "/dev/shm" with the "nodev" option.
<VulnDiscussion>The organization must identify authorized software programs and permit execution of authorized software. The process used to ...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
OL 8 must mount "/dev/shm" with the "nosuid" option.
<VulnDiscussion>The organization must identify authorized software programs and permit execution of authorized software. The process used to ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.