Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000404

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information at rest unless otherwise protected by alternative physical measures.

    &lt;VulnDiscussion&gt;When data is written to digital media, such as hard drives, mobile computers, external/removable hard drives, personal digita...
    Rule Low Severity
  • SRG-OS-000423

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect the integrity of transmitted information.

    &lt;VulnDiscussion&gt;Ensuring the integrity of transmitted information requires the operating system take feasible measures to employ transmission...
    Rule Medium Severity
  • SRG-OS-000327

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect the audit records resulting from non-local accesses to privileged accounts and the execution of privileged functions.

    &lt;VulnDiscussion&gt;Protection of audit records and audit data is of critical importance. Care must be taken to ensure privileged users cannot ci...
    Rule Medium Severity
  • SRG-OS-000356

    <GroupDescription></GroupDescription>
    Group
  • The operating system must synchronize internal information system clocks with a server that is synchronized to one of the redundant United States Naval Observatory (USNO) time servers or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).

    &lt;VulnDiscussion&gt;To assure the accuracy of the system clock, it must be synchronized with an authoritative time source within DoD. Many system...
    Rule Medium Severity
  • SRG-OS-000445

    <GroupDescription></GroupDescription>
    Group
  • The operating system must verify the correct operation of security functions in accordance with organization-defined conditions and in accordance with organization-defined frequency (if periodic verification).

    &lt;VulnDiscussion&gt;Security functional testing involves testing the operating system for conformance to the operating system security function s...
    Rule Medium Severity
  • SRG-OS-000324

    <GroupDescription></GroupDescription>
    Group
  • The operating system must prevent non-privileged users from circumventing malicious code protection capabilities.

    &lt;VulnDiscussion&gt;In order to minimize potential negative impact to the organization caused by malicious code, it is imperative that malicious ...
    Rule Medium Severity
  • SRG-OS-000445

    <GroupDescription></GroupDescription>
    Group
  • The operating system must identify potentially security-relevant error conditions.

    &lt;VulnDiscussion&gt;Security functional testing involves testing the operating system for conformance to the operating system security function s...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The sshd server must bind the X11 forwarding server to the loopback address.

    &lt;VulnDiscussion&gt;As enabling X11 Forwarding on the host can permit a malicious user to secretly open another X11 connection to another remote ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules