Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000364

    <GroupDescription></GroupDescription>
    Group
  • The VMM must enforce access restrictions associated with changes to the system.

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to system configuration may have significant effects o...
    Rule Medium Severity
  • SRG-OS-000365

    <GroupDescription></GroupDescription>
    Group
  • The VMM must audit the enforcement actions used to restrict access associated with changes to the system.

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to the VMM configuration, it will be difficult to ide...
    Rule Medium Severity
  • SRG-OS-000366

    <GroupDescription></GroupDescription>
    Group
  • The VMM must prevent the installation of guest VMs, patches, service packs, device drivers, or VMM components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the VMM. This requirement ensures ...
    Rule Medium Severity
  • SRG-OS-000368

    <GroupDescription></GroupDescription>
    Group
  • The VMM must prevent use of service and helper VMs not required to support proper VMM function.

    &lt;VulnDiscussion&gt;Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some VMMs may provide a capab...
    Rule Medium Severity
  • SRG-OS-000368

    <GroupDescription></GroupDescription>
    Group
  • The VMM must prevent inappropriate use of redundant guest VMs.

    &lt;VulnDiscussion&gt;Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some VMMs may provide a capab...
    Rule Medium Severity
  • SRG-OS-000370

    <GroupDescription></GroupDescription>
    Group
  • The VMM must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs and guest VMs.

    &lt;VulnDiscussion&gt;Utilizing a whitelist provides a configuration management method for allowing the execution of only authorized software and g...
    Rule Medium Severity
  • SRG-OS-000373

    <GroupDescription></GroupDescription>
    Group
  • The VMM must require users to re-authenticate for privilege escalation.

    &lt;VulnDiscussion&gt;Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When VMMs ...
    Rule Medium Severity
  • SRG-OS-000373

    <GroupDescription></GroupDescription>
    Group
  • The VMM must require users to re-authenticate when changing roles.

    &lt;VulnDiscussion&gt;Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When VMMs ...
    Rule Medium Severity
  • SRG-OS-000373

    <GroupDescription></GroupDescription>
    Group
  • The VMM must require users to re-authenticate when changing authenticators.

    &lt;VulnDiscussion&gt;Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When VMMs ...
    Rule Medium Severity
  • SRG-OS-000374

    <GroupDescription></GroupDescription>
    Group
  • The VMM must require devices to re-authenticate when changing authenticators.

    &lt;VulnDiscussion&gt;Without re-authentication, devices may access resources or perform tasks for which they do not have authorization. When VMM...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules