II - Mission Support Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000342-GPOS-00133
<GroupDescription></GroupDescription>Group -
The SUSE operating system audit event multiplexor must be configured to use Kerberos.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Allowing devices and us...Rule Low Severity -
SRG-OS-000342-GPOS-00133
<GroupDescription></GroupDescription>Group -
Audispd must off-load audit records onto a different system or media from the SUSE operating system being audited.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Low Severity -
SRG-OS-000343-GPOS-00134
<GroupDescription></GroupDescription>Group -
The SUSE operating system auditd service must notify the System Administrator (SA) and Information System Security Officer (ISSO) immediately when audit storage capacity is 75 percent full.
<VulnDiscussion>If security personnel are not notified immediately when storage volume reaches 75 percent utilization, they are unable to pla...Rule Medium Severity -
SRG-OS-000468-GPOS-00212
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all uses of the unlink, unlinkat, rename, renameat, and rmdir system calls.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000472-GPOS-00217
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for the /run/utmp file.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000472-GPOS-00217
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for the /var/log/wtmp file.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000472-GPOS-00217
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for the /var/log/btmp file.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000479-GPOS-00224
<GroupDescription></GroupDescription>Group -
The SUSE operating system must off-load audit records onto a different system or media from the system being audited.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-OS-000479-GPOS-00224
<GroupDescription></GroupDescription>Group -
Audispd must take appropriate action when the SUSE operating system audit storage is full.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The SUSE operating system must use a separate file system for the system audit data path.
<VulnDiscussion>The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The SUSE operating system must not disable syscall auditing.
<VulnDiscussion>By default, the SUSE operating system includes the "-a task,never" audit rule as a default. This rule suppresses syscall audi...Rule Medium Severity -
SRG-OS-000480-GPOS-00226
<GroupDescription></GroupDescription>Group -
The SUSE operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
<VulnDiscussion>Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain acc...Rule Medium Severity -
SRG-OS-000480-GPOS-00226
<GroupDescription></GroupDescription>Group -
The SUSE operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
<VulnDiscussion>The SUSE operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attemp...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
There must be no .shosts files on the SUSE operating system.
<VulnDiscussion>The .shosts files are used to configure host-based authentication for individual users or the system via SSH. Host-based auth...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
There must be no shosts.equiv files on the SUSE operating system.
<VulnDiscussion>The shosts.equiv files are used to configure host-based authentication for the system via SSH. Host-based authentication is n...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The SUSE operating system file integrity tool must be configured to verify Access Control Lists (ACLs).
<VulnDiscussion>ACLs can provide permissions beyond those permitted through the file mode and must be verified by file integrity tools.</V...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The SUSE operating system file integrity tool must be configured to verify extended attributes.
<VulnDiscussion>Extended attributes in file systems are used to contain arbitrary data and file metadata with security implications.</Vuln...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence.
<VulnDiscussion>A locally logged-on user, who presses Ctrl-Alt-Delete when at the console, can reboot the system. If accidentally pressed, as...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence for Graphical User Interfaces.
<VulnDiscussion>A locally logged-on user, who presses Ctrl-Alt-Delete when at the console, can reboot the system. If accidentally pressed, as...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The SUSE operating system must disable the systemd Ctrl-Alt-Delete burst key sequence.
<VulnDiscussion>A locally logged-on user, who presses Ctrl-Alt-Delete when at the console, can reboot the system. If accidentally pressed, as...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
All SUSE operating system local interactive users must have a home directory assigned in the /etc/passwd file.
<VulnDiscussion>If local interactive users are not assigned a valid home directory, there is no place for the storage and control of files th...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
All SUSE operating system local interactive user home directories defined in the /etc/passwd file must exist.
<VulnDiscussion>If a local interactive user has a home directory defined that does not exist, the user may be given access to the / directory...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
All SUSE operating system local interactive user home directories must have mode 0750 or less permissive.
<VulnDiscussion>Excessive permissions on local interactive user home directories may allow unauthorized access to user files by other users.&...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
All SUSE operating system local interactive user home directories must be group-owned by the home directory owner's primary group.
<VulnDiscussion>If the Group Identifier (GID) of a local interactive user’s home directory is not the same as the primary GID of the user, th...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
All SUSE operating system local initialization files must have mode 0740 or less permissive.
<VulnDiscussion>Local initialization files are used to configure the user's shell environment upon logon. Malicious modification of these fil...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.