Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The root account must be the only account with GID of 0.

    &lt;VulnDiscussion&gt;All accounts with a GID of 0 have root group privileges and must be limited to the group account only.&lt;/VulnDiscussion&gt;...
    Rule Medium Severity
  • SRG-OS-000206

    <GroupDescription></GroupDescription>
    Group
  • The operating system must reveal error messages only to authorized personnel.

    &lt;VulnDiscussion&gt;Proper file permissions and ownership ensures that only designated personnel in the organization can access error messages.&l...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operator must document all file system objects that have non-standard access control list settings.

    &lt;VulnDiscussion&gt;Access Control Lists allow an object owner to expand permissions on an object to specific users and groups in addition to the...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must be a supported release.

    &lt;VulnDiscussion&gt;An operating system release is considered supported if the vendor continues to provide security patches for the product. With...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must implement non-executable program stacks.

    &lt;VulnDiscussion&gt;A common type of exploit is the stack buffer overflow. An application receives, from an attacker, more data than it is prepar...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Address Space Layout Randomization (ASLR) must be enabled.

    &lt;VulnDiscussion&gt;Modification of memory area can result in executable code vulnerabilities. ASLR can reduce the likelihood of these attacks. A...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Process core dumps must be disabled unless needed.

    &lt;VulnDiscussion&gt;Process core dumps contain the memory in use by the process when it crashed. Process core dump files can be of significant si...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must be configured to store any process core dumps in a specific, centralized directory.

    &lt;VulnDiscussion&gt;Specifying a centralized location for core file creation allows for the centralized protection of core files. Process core du...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The centralized process core dump data directory must be owned by root.

    &lt;VulnDiscussion&gt;Process core dumps contain the memory in use by the process when it crashed. Any data the process was handling may be contain...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The centralized process core dump data directory must be group-owned by root, bin, or sys.

    &lt;VulnDiscussion&gt;Process core dumps contain the memory in use by the process when it crashed. Any data the process was handling may be contain...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The centralized process core dump data directory must have mode 0700 or less permissive.

    &lt;VulnDiscussion&gt;Process core dumps contain the memory in use by the process when it crashed. Any data the process was handling may be contain...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Kernel core dumps must be disabled unless needed.

    &lt;VulnDiscussion&gt;Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a co...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The kernel core dump data directory must be owned by root.

    &lt;VulnDiscussion&gt;Kernel core dumps may contain the full contents of system memory at the time of the crash. As the system memory may contain s...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The kernel core dump data directory must be group-owned by root.

    &lt;VulnDiscussion&gt;Kernel core dumps may contain the full contents of system memory at the time of the crash. As the system memory may contain s...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The kernel core dump data directory must have mode 0700 or less permissive.

    &lt;VulnDiscussion&gt;Kernel core dumps may contain the full contents of system memory at the time of the crash. As the system memory may contain s...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others. (Intel)

    &lt;VulnDiscussion&gt;A system's BIOS or system controller handles the initial startup of a system and its configuration must be protected from una...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must require authentication before allowing modification of the boot devices or menus. Secure the GRUB Menu (Intel).

    &lt;VulnDiscussion&gt;The flexibility that GRUB provides creates a security risk if its configuration is modified by an unauthorized user. The fail...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must implement transaction recovery for transaction-based systems.

    &lt;VulnDiscussion&gt;Recovery and reconstitution constitutes executing an operating system contingency plan comprised of activities to restore ess...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • SNMP communities, users, and passphrases must be changed from the default.

    &lt;VulnDiscussion&gt;Whether active or not, default SNMP passwords, users, and passphrases must be changed to maintain security. If the service is...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • A file integrity baseline must be created, maintained, and reviewed at least weekly to determine if unauthorized changes have been made to important system files located in the root file system.

    &lt;VulnDiscussion&gt;A file integrity baseline is a collection of file metadata used to evaluate the integrity of the system. A minimal baseline m...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Direct logins must not be permitted to shared, default, application, or utility accounts.

    &lt;VulnDiscussion&gt;Shared accounts (accounts where two or more people log in with the same user identification) do not provide identification an...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not have any unnecessary accounts.

    &lt;VulnDiscussion&gt;Accounts providing no operational purpose provide additional opportunities for system compromise. Unnecessary accounts includ...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must conduct backups of user-level information contained in the operating system per organization-defined frequency to conduct backups consistent with recovery time and recovery point objectives.

    &lt;VulnDiscussion&gt;Operating system backup is a critical step in maintaining data assurance and availability. User-level information is data g...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must conduct backups of system-level information contained in the information system per organization-defined frequency to conduct backups that are consistent with recovery time and recovery point objectives.

    &lt;VulnDiscussion&gt;Operating system backup is a critical step in maintaining data assurance and availability. System-level information is data...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must conduct backups of operating system documentation including security-related documentation per organization-defined frequency to conduct backups that is consistent with recovery time and recovery point objectives.

    &lt;VulnDiscussion&gt;Operating system backup is a critical step in maintaining data assurance and availability. System documentation is data gen...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules