Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000366-GPOS-00153

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system tool zypper must have gpgcheck enabled.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the SUSE operating system. This re...
    Rule Medium Severity
  • SRG-OS-000437-GPOS-00194

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must remove all outdated software components after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of software components that are not removed from the information system after updates have been installed m...
    Rule Medium Severity
  • SRG-OS-000378-GPOS-00163

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must disable the USB mass storage kernel module.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Per...
    Rule Medium Severity
  • SRG-OS-000114-GPOS-00059

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must disable the file system automounter unless required.

    &lt;VulnDiscussion&gt;Automatically mounting file systems permits easy introduction of unknown devices, thereby facilitating malicious activity. S...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00122

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system Apparmor tool must be configured to control whitelisted applications and user home directory access control.

    &lt;VulnDiscussion&gt;Using a whitelist provides a configuration management method for allowing the execution of only authorized software. Using on...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence.

    &lt;VulnDiscussion&gt;A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence for Graphical User Interfaces.

    &lt;VulnDiscussion&gt;A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as...
    Rule High Severity
  • SRG-OS-000480-GPOS-00228

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system default permissions must be defined in such a way that all authenticated users can only read and modify their own files.

    &lt;VulnDiscussion&gt;Setting the most restrictive default permissions ensures that when new accounts are created, they do not have unnecessary acc...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must not have unnecessary accounts.

    &lt;VulnDiscussion&gt;Accounts providing no operational purpose provide additional opportunities for system compromise. Unnecessary accounts includ...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must not have duplicate User IDs (UIDs) for interactive users.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, interactive users must be identified and authenticated to preven...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system root account must be the only account having unrestricted access to the system.

    &lt;VulnDiscussion&gt;If an account other than root also has a User Identifier (UID) of "0", it has root authority, giving that account unrestricte...
    Rule High Severity
  • SRG-OS-000383-GPOS-00166

    <GroupDescription></GroupDescription>
    Group
  • If Network Security Services (NSS) is being used by the SUSE operating system it must prohibit the use of cached authentications after one day.

    &lt;VulnDiscussion&gt;If cached authentication information is out of date, the validity of the authentication information may be questionable.&lt;/...
    Rule Medium Severity
  • SRG-OS-000383-GPOS-00166

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to prohibit the use of cached offline authentications after one day.

    &lt;VulnDiscussion&gt;If cached authentication information is out of date, the validity of the authentication information may be questionable.&lt;/...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SUSE operating system files and directories must have a valid owner.

    &lt;VulnDiscussion&gt;Unowned files and directories may be unintentionally inherited if a user is assigned the same User Identifier (UID) as the UI...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SUSE operating system files and directories must have a valid group owner.

    &lt;VulnDiscussion&gt;Files without a valid group owner may be unintentionally inherited if a group is assigned the same Group Identifier (GID) as ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SUSE operating system local interactive users must have a home directory assigned in the /etc/passwd file.

    &lt;VulnDiscussion&gt;If local interactive users are not assigned a valid home directory, there is no place for the storage and control of files th...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SUSE operating system local interactive user accounts, upon creation, must be assigned a home directory.

    &lt;VulnDiscussion&gt;If local interactive users are not assigned a valid home directory, there is no place for the storage and control of files th...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SUSE operating system local interactive user home directories defined in the /etc/passwd file must exist.

    &lt;VulnDiscussion&gt;If a local interactive user has a home directory defined that does not exist, the user may be given access to the / directory...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SUSE operating system local interactive user home directories must have mode 0750 or less permissive.

    &lt;VulnDiscussion&gt;Excessive permissions on local interactive user home directories may allow unauthorized access to user files by other users.&...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SUSE operating system local interactive user home directories must be group-owned by the home directory owners primary group.

    &lt;VulnDiscussion&gt;If the Group Identifier (GID) of a local interactive user’s home directory is not the same as the primary GID of the user, th...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SUSE operating system local initialization files must have mode 0740 or less permissive.

    &lt;VulnDiscussion&gt;Local initialization files are used to configure the user's shell environment upon logon. Malicious modification of these fil...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SUSE operating system local interactive user initialization files executable search paths must contain only paths that resolve to the users home directory.

    &lt;VulnDiscussion&gt;The executable search path (typically the PATH environment variable) contains a list of directories for the shell to search t...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SUSE operating system local initialization files must not execute world-writable programs.

    &lt;VulnDiscussion&gt;If user start-up files execute world-writable programs, especially in unprotected directories, they could be maliciously modi...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • SUSE operating system file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.

    &lt;VulnDiscussion&gt;The "nosuid" mount option causes the system to not execute setuid and setgid files with owner privileges. This option must be...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • SUSE operating system file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.

    &lt;VulnDiscussion&gt;The "nosuid" mount option causes the system to not execute "setuid" and "setgid" files with owner privileges. This option mus...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules