III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000078-GPOS-00046
<GroupDescription></GroupDescription>Group -
OL 8 passwords must have a minimum of 15 characters.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-OS-000078-GPOS-00046
<GroupDescription></GroupDescription>Group -
OL 8 passwords for new users must have a minimum of 15 characters.
<VulnDiscussion>The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...Rule Medium Severity -
SRG-OS-000042-GPOS-00020
<GroupDescription></GroupDescription>Group -
OL 8 duplicate User IDs (UIDs) must not exist for interactive users.
<VulnDiscussion>To ensure accountability and prevent unauthenticated access, interactive users must be identified and authenticated to preven...Rule Medium Severity -
SRG-OS-000105-GPOS-00052
<GroupDescription></GroupDescription>Group -
OL 8 must implement multifactor authentication for access to interactive accounts.
<VulnDiscussion>Using an authentication device, such as a Common Access Card (CAC) or token that is separate from the information system, ens...Rule Medium Severity -
SRG-OS-000118-GPOS-00060
<GroupDescription></GroupDescription>Group -
The OL 8 system-auth file must disable access to the system for account identifiers (individuals, groups, roles, and devices) with 35 days of inactivity.
<VulnDiscussion>Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potenti...Rule Medium Severity -
SRG-OS-000118-GPOS-00060
<GroupDescription></GroupDescription>Group -
The OL 8 password-auth file must disable access to the system for account identifiers (individuals, groups, roles, and devices) with 35 days of inactivity.
<VulnDiscussion>Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potenti...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The OL 8 lastlog command must have a mode of "0750" or less permissive.
<VulnDiscussion>Unauthorized disclosure of the contents of the /var/log/lastlog file can reveal system data to attackers, thus compromising i...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The OL 8 lastlog command must be owned by root.
<VulnDiscussion>Unauthorized disclosure of the contents of the /var/log/lastlog file can reveal system data to attackers, thus compromising i...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The OL 8 lastlog command must be group-owned by root.
<VulnDiscussion>Unauthorized disclosure of the contents of the /var/log/lastlog file can reveal system data to attackers, thus compromising i...Rule Medium Severity -
SRG-OS-000123-GPOS-00064
<GroupDescription></GroupDescription>Group -
OL 8 must automatically expire temporary accounts within 72 hours.
<VulnDiscussion>Temporary accounts are privileged or nonprivileged accounts that are established during pressing circumstances, such as new s...Rule Medium Severity -
SRG-OS-000266-GPOS-00101
<GroupDescription></GroupDescription>Group -
All OL 8 passwords must contain at least one special character.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Low Severity -
SRG-OS-000383-GPOS-00166
<GroupDescription></GroupDescription>Group -
OL 8 must prohibit the use of cached authentications after one day.
<VulnDiscussion>If cached authentication information is out of date, the validity of the authentication information may be questionable. O...Rule Medium Severity -
SRG-OS-000480-GPOS-00225
<GroupDescription></GroupDescription>Group -
OL 8 must prevent the use of dictionary words for passwords.
<VulnDiscussion>If OL 8 allows the user to select passwords based on dictionary words, this increases the chances of password compromise by i...Rule Medium Severity -
SRG-OS-000480-GPOS-00226
<GroupDescription></GroupDescription>Group -
OL 8 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
<VulnDiscussion>Configuring the operating system to implement organization-wide security implementation guides and security checklists verifi...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must not have unnecessary accounts.
<VulnDiscussion>Accounts providing no operational purpose provide additional opportunities for system compromise. Unnecessary accounts includ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must not allow accounts configured with blank or null passwords.
<VulnDiscussion>If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with ...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must not allow blank or null passwords in the system-auth file.
<VulnDiscussion>If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with ...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must not allow blank or null passwords in the password-auth file.
<VulnDiscussion>If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with ...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must display the date and time of the last successful account logon upon logon.
<VulnDiscussion>Providing users with feedback on when account accesses last occurred facilitates user recognition and reporting of unauthoriz...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must display the date and time of the last successful account logon upon an SSH logon.
<VulnDiscussion>Providing users with feedback on when account accesses via SSH last occurred facilitates user recognition and reporting of un...Rule Medium Severity -
SRG-OS-000480-GPOS-00228
<GroupDescription></GroupDescription>Group -
OL 8 default permissions must be defined in such a way that all authenticated users can read and modify only their own files.
<VulnDiscussion>Setting the most restrictive default permissions ensures that when new accounts are created, they do not have unnecessary acc...Rule Medium Severity -
SRG-OS-000480-GPOS-00228
<GroupDescription></GroupDescription>Group -
OL 8 must set the umask value to 077 for all local interactive user accounts.
<VulnDiscussion>The umask controls the default access mode assigned to newly created files. A umask of 077 limits new files to mode 600 or le...Rule Medium Severity -
SRG-OS-000480-GPOS-00228
<GroupDescription></GroupDescription>Group -
OL 8 must define default permissions for logon and non-logon shells.
<VulnDiscussion>The umask controls the default access mode assigned to newly created files. A umask of 077 limits new files to mode 600 or le...Rule Medium Severity -
SRG-OS-000326-GPOS-00126
<GroupDescription></GroupDescription>Group -
The OL 8 audit system must be configured to audit the execution of privileged functions and prevent all software from executing at higher privilege levels than users executing the software.
<VulnDiscussion>Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external enti...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Cron logging must be implemented in OL 8.
<VulnDiscussion>Cron logging can be used to trace the successful or unsuccessful execution of cron jobs. It can also be used to spot intrusio...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.