III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000125-GPOS-00065
<GroupDescription></GroupDescription>Group -
The SUSE operating system SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule Medium Severity -
SRG-OS-000126-GPOS-00066
<GroupDescription></GroupDescription>Group -
The SUSE operating system SSH daemon must be configured with a timeout interval.
<VulnDiscussion>Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
<GroupDescription></GroupDescription>Group -
The sticky bit must be set on all SUSE operating system world-writable directories.
<VulnDiscussion>Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...Rule Medium Severity -
SRG-OS-000142-GPOS-00071
<GroupDescription></GroupDescription>Group -
The SUSE operating system must be configured to use TCP syncookies.
<VulnDiscussion>Denial of Service (DoS) is a condition in which a resource is not available for legitimate users. When this occurs, the organ...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
The SUSE operating system for all network connections associated with SSH traffic must immediately terminate at the end of the session or after 10 minutes of inactivity.
<VulnDiscussion>Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...Rule Medium Severity -
SRG-OS-000185-GPOS-00079
<GroupDescription></GroupDescription>Group -
All SUSE operating system persistent disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.
<VulnDiscussion>SUSE operating systems handling data requiring data-at-rest protections must employ cryptographic mechanisms to prevent unaut...Rule Medium Severity -
SRG-OS-000205-GPOS-00083
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
<VulnDiscussion>Any operating system providing too much information in error messages risks compromising the data and security of the structu...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The SUSE operating system must prevent unauthorized users from accessing system error messages.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The SUSE operating system library files must have mode 0755 or less permissive.
<VulnDiscussion>If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implem...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The SUSE operating system library directories must have mode 0755 or less permissive.
<VulnDiscussion>If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implem...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The SUSE operating system library files must be owned by root.
<VulnDiscussion>If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implem...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The SUSE operating system library directories must be owned by root.
<VulnDiscussion>If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implem...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The SUSE operating system library files must be group-owned by root.
<VulnDiscussion>If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implem...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The SUSE operating system library directories must be group-owned by root.
<VulnDiscussion>If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implem...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The SUSE operating system must have system commands set to a mode of 0755 or less permissive.
<VulnDiscussion>If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implem...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The SUSE operating system must have directories that contain system commands set to a mode of 0755 or less permissive.
<VulnDiscussion>If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implem...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The SUSE operating system must have system commands owned by root.
<VulnDiscussion>If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implem...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The SUSE operating system must have directories that contain system commands owned by root.
<VulnDiscussion>If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implem...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The SUSE operating system must have system commands group-owned by root or a system account.
<VulnDiscussion>If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implem...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The SUSE operating system must have directories that contain system commands group-owned by root.
<VulnDiscussion>If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implem...Rule Medium Severity -
SRG-OS-000298-GPOS-00116
<GroupDescription></GroupDescription>Group -
The SUSE operating system must have a firewall system installed to immediately disconnect or disable remote access to the whole operating system.
<VulnDiscussion>Operating system remote access functionality must have the capability to immediately disconnect current users remotely access...Rule Medium Severity -
SRG-OS-000299-GPOS-00117
<GroupDescription></GroupDescription>Group -
The SUSE operating system wireless network adapters must be disabled unless approved and documented.
<VulnDiscussion>Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unpr...Rule Medium Severity -
SRG-OS-000312-GPOS-00122
<GroupDescription></GroupDescription>Group -
SUSE operating system AppArmor tool must be configured to control whitelisted applications and user home directory access control.
<VulnDiscussion>Using a whitelist provides a configuration management method for allowing the execution of only authorized software. Using on...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
<GroupDescription></GroupDescription>Group -
The SUSE operating system clock must, for networked systems, be synchronized to an authoritative DoD time source at least every 24 hours.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Medium Severity -
SRG-OS-000359-GPOS-00146
<GroupDescription></GroupDescription>Group -
The SUSE operating system must be configured to use Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.