Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All run control scripts must have no extended ACLs.

    &lt;VulnDiscussion&gt;If the startup files are writable by other users, these users could modify the startup files to insert malicious commands int...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Run control scripts executable search paths must contain only authorized paths.

    &lt;VulnDiscussion&gt;The executable search path (typically the PATH environment variable) contains a list of directories for the shell to search t...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Run control scripts library search paths must contain only authorized paths.

    &lt;VulnDiscussion&gt;The library search path environment variable(s) contain a list of directories for the dynamic linker to search to find librar...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Run control scripts lists of preloaded libraries must contain only authorized paths.

    &lt;VulnDiscussion&gt;The library preload list environment variable contains a list of libraries for the dynamic linker to load before loading the ...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Run control scripts must not execute world writable programs or scripts.

    &lt;VulnDiscussion&gt;World writable files could be modified accidentally or maliciously to compromise system integrity.&lt;/VulnDiscussion&gt;&lt;...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All system start-up files must be owned by root.

    &lt;VulnDiscussion&gt;System start-up files not owned by root could lead to system compromise by allowing malicious users or applications to modify...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All system start-up files must be group-owned by root, sys, or bin.

    &lt;VulnDiscussion&gt;If system start-up files do not have a group owner of root or a system group, the files may be modified by malicious users or...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • System start-up files must only execute programs owned by a privileged UID or an application.

    &lt;VulnDiscussion&gt;System start-up files executing programs owned by other than root (or another privileged user) or an application indicates th...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Any X Windows host must write .Xauthority files.

    &lt;VulnDiscussion&gt;.Xauthority files ensure the user is authorized to access the specific X Windows host. If .Xauthority files are not used, it ...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All .Xauthority files must have mode 0600 or less permissive.

    &lt;VulnDiscussion&gt;.Xauthority files ensure the user is authorized to access the specific X Windows host. Excessive permissions may permit unaut...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules