III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000433-GPOS-00192
<GroupDescription></GroupDescription>Group -
The SUSE operating system must implement kptr-restrict to prevent the leaking of internal kernel addresses.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations t...Rule Medium Severity -
SRG-OS-000433-GPOS-00193
<GroupDescription></GroupDescription>Group -
Address space layout randomization (ASLR) must be implemented by the SUSE operating system to protect memory from unauthorized code execution.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations t...Rule Medium Severity -
SRG-OS-000437-GPOS-00194
<GroupDescription></GroupDescription>Group -
The SUSE operating system must remove all outdated software components after updated versions have been installed.
<VulnDiscussion>Previous versions of software components that are not removed from the information system after updates have been installed m...Rule Medium Severity -
SRG-OS-000447-GPOS-00201
<GroupDescription></GroupDescription>Group -
The SUSE operating system must notify the System Administrator (SA) when Advanced Intrusion Detection Environment (AIDE) discovers anomalies in the operation of any security functions.
<VulnDiscussion>If anomalies are not acted on, security functions may fail to secure the system. Security function is defined as the hardwa...Rule Medium Severity -
SRG-OS-000479-GPOS-00224
<GroupDescription></GroupDescription>Group -
The SUSE operating system must off-load rsyslog messages for networked systems in real time and off-load standalone systems at least weekly.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-OS-000002-GPOS-00002
<GroupDescription></GroupDescription>Group -
The SUSE operating system must provision temporary accounts with an expiration date for 72 hours.
<VulnDiscussion>If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
The SUSE operating system must lock an account after three consecutive invalid access attempts.
<VulnDiscussion>By limiting the number of failed access attempts, the risk of unauthorized system access via user password guessing, otherwis...Rule Medium Severity -
SRG-OS-000027-GPOS-00008
<GroupDescription></GroupDescription>Group -
The SUSE operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.
<VulnDiscussion>SUSE operating system management includes the ability to control the number of users and user sessions that utilize a SUSE op...Rule Low Severity -
SRG-OS-000068-GPOS-00036
<GroupDescription></GroupDescription>Group -
The SUSE operating system must implement multifactor authentication for access to privileged accounts via pluggable authentication modules (PAM).
<VulnDiscussion>Using an authentication device, such as a Common Access Card (CAC) or token that is separate from the information system, ens...Rule Medium Severity -
SRG-OS-000109-GPOS-00056
<GroupDescription></GroupDescription>Group -
The SUSE operating system must deny direct logons to the root account using remote access via SSH.
<VulnDiscussion>To ensure individual accountability and prevent unauthorized access, organizational users must be individually identified and...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.