III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000134-GPOS-00068
<GroupDescription></GroupDescription>Group -
OL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must not let Meltdown and Spectre exploit critical vulnerabilities in modern processors.
<VulnDiscussion>Hardware vulnerabilities allow programs to steal data that is currently processed on the computer. While programs are typical...Rule Medium Severity -
SRG-OS-000433-GPOS-00193
<GroupDescription></GroupDescription>Group -
OL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...Rule Medium Severity -
SRG-OS-000437-GPOS-00194
<GroupDescription></GroupDescription>Group -
YUM must remove all software components after updated versions have been installed on OL 8.
<VulnDiscussion>Previous versions of software components that are not removed from the information system after updates have been installed m...Rule Low Severity -
SRG-OS-000445-GPOS-00199
<GroupDescription></GroupDescription>Group -
OL 8 must enable the SELinux targeted policy.
<VulnDiscussion>Without verification of the security functions, they may not operate correctly and the failure may go unnoticed. Security fun...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
There must be no "shosts.equiv" files on the OL 8 operating system.
<VulnDiscussion>The "shosts.equiv" files are used to configure host-based authentication for the system via SSH. Host-based authentication is...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
There must be no ".shosts" files on the OL 8 operating system.
<VulnDiscussion>The ".shosts" files are used to configure host-based authentication for individual users or the system via SSH. Host-based au...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must enable the hardware random number generator entropy gatherer service.
<VulnDiscussion>The most important characteristic of a random number generator is its randomness, namely its ability to deliver random number...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must have the packages required to use the hardware random number generator entropy gatherer service.
<VulnDiscussion>The most important characteristic of a random number generator is its randomness, namely its ability to deliver random number...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The OL 8 SSH public host key files must have mode "0644" or less permissive.
<VulnDiscussion>If a public host key file is modified by an unauthorized user, the SSH service may be compromised.</VulnDiscussion><...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.