Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000363-GPOS-00150

    <GroupDescription></GroupDescription>
    Group
  • Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.

    &lt;VulnDiscussion&gt;Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized ...
    Rule Medium Severity
  • SRG-OS-000366-GPOS-00153

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system tool zypper must have gpgcheck enabled.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the SUSE operating system. This re...
    Rule High Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges.

    &lt;VulnDiscussion&gt;Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When the SU...
    Rule High Severity
  • SRG-OS-000375-GPOS-00160

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must have the packages required for multifactor authentication to be installed.

    &lt;VulnDiscussion&gt;Using an authentication device, such as a Common Access Card (CAC) or token separate from the information system, ensures tha...
    Rule Medium Severity
  • SRG-OS-000375-GPOS-00160

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must implement certificate status checking for multifactor authentication.

    &lt;VulnDiscussion&gt;Using an authentication device, such as a Common Access Card (CAC) or token separate from the information system, ensures cre...
    Rule Medium Severity
  • SRG-OS-000378-GPOS-00163

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must disable the USB mass storage kernel module.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Per...
    Rule Medium Severity
  • SRG-OS-000383-GPOS-00166

    <GroupDescription></GroupDescription>
    Group
  • If Network Security Services (NSS) is being used by the SUSE operating system it must prohibit the use of cached authentications after one day.

    &lt;VulnDiscussion&gt;If cached authentication information is out of date, the validity of the authentication information may be questionable.&lt;/...
    Rule Medium Severity
  • SRG-OS-000383-GPOS-00166

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to prohibit the use of cached offline authentications after one day.

    &lt;VulnDiscussion&gt;If cached authentication information is out of date, the validity of the authentication information may be questionable.&lt;/...
    Rule Medium Severity
  • SRG-OS-000396-GPOS-00176

    <GroupDescription></GroupDescription>
    Group
  • FIPS 140-2 mode must be enabled on the SUSE operating system.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The SUSE operating...
    Rule High Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • All networked SUSE operating systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected commu...
    Rule High Severity
  • SRG-OS-000433-GPOS-00192

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must implement kptr-restrict to prevent the leaking of internal kernel addresses.

    &lt;VulnDiscussion&gt;Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations t...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00193

    <GroupDescription></GroupDescription>
    Group
  • Address space layout randomization (ASLR) must be implemented by the SUSE operating system to protect memory from unauthorized code execution.

    &lt;VulnDiscussion&gt;Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations t...
    Rule Medium Severity
  • SRG-OS-000437-GPOS-00194

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must remove all outdated software components after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of software components that are not removed from the information system after updates have been installed m...
    Rule Medium Severity
  • SRG-OS-000447-GPOS-00201

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must notify the System Administrator (SA) when Advanced Intrusion Detection Environment (AIDE) discovers anomalies in the operation of any security functions.

    &lt;VulnDiscussion&gt;If anomalies are not acted on, security functions may fail to secure the system. Security function is defined as the hardwa...
    Rule Medium Severity
  • SRG-OS-000479-GPOS-00224

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must off-load rsyslog messages for networked systems in real time and off-load standalone systems at least weekly.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-OS-000002-GPOS-00002

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must provision temporary accounts with an expiration date for 72 hours.

    &lt;VulnDiscussion&gt;If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must lock an account after three consecutive invalid access attempts.

    &lt;VulnDiscussion&gt;By limiting the number of failed access attempts, the risk of unauthorized system access via user password guessing, otherwis...
    Rule Medium Severity
  • SRG-OS-000027-GPOS-00008

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.

    &lt;VulnDiscussion&gt;SUSE operating system management includes the ability to control the number of users and user sessions that utilize a SUSE op...
    Rule Low Severity
  • SRG-OS-000068-GPOS-00036

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must implement multifactor authentication for access to privileged accounts via pluggable authentication modules (PAM).

    &lt;VulnDiscussion&gt;Using an authentication device, such as a Common Access Card (CAC) or token that is separate from the information system, ens...
    Rule Medium Severity
  • SRG-OS-000109-GPOS-00056

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must deny direct logons to the root account using remote access via SSH.

    &lt;VulnDiscussion&gt;To ensure individual accountability and prevent unauthorized access, organizational users must be individually identified and...
    Rule Medium Severity
  • SRG-OS-000118-GPOS-00060

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity after password expiration.

    &lt;VulnDiscussion&gt;Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potenti...
    Rule Medium Severity
  • SRG-OS-000123-GPOS-00064

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must never automatically remove or disable emergency administrator accounts.

    &lt;VulnDiscussion&gt;Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid acc...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must display the date and time of the last successful account logon upon logon.

    &lt;VulnDiscussion&gt;Providing users with feedback on when account accesses last occurred facilitates user recognition and reporting of unauthoriz...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must not have unnecessary accounts.

    &lt;VulnDiscussion&gt;Accounts providing no operational purpose provide additional opportunities for system compromise. Unnecessary accounts includ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The SUSE operating system must not have unnecessary account capabilities.

    &lt;VulnDiscussion&gt;Accounts providing no operational purpose provide additional opportunities for system compromise. Therefore all necessary non...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules