III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000001
<GroupDescription></GroupDescription>Group -
The VMM must provide automated mechanisms for supporting account management functions.
<VulnDiscussion>Enterprise environments make account management challenging and complex. A manual process for account management functions ad...Rule Medium Severity -
SRG-OS-000002
<GroupDescription></GroupDescription>Group -
The VMM must automatically remove or disable local temporary user accounts after 72 hours.
<VulnDiscussion>If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...Rule Medium Severity -
SRG-OS-000003
<GroupDescription></GroupDescription>Group -
The VMM must automatically disable local accounts after a 35-day period of account inactivity.
<VulnDiscussion>Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an applicatio...Rule Medium Severity -
SRG-OS-000004
<GroupDescription></GroupDescription>Group -
The VMM must automatically audit account creation.
<VulnDiscussion>Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestab...Rule Medium Severity -
SRG-OS-000021
<GroupDescription></GroupDescription>Group -
The VMM must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
<VulnDiscussion>By limiting the number of failed login attempts, the risk of unauthorized VMM access via user password guessing, otherwise kn...Rule Medium Severity -
SRG-OS-000023
<GroupDescription></GroupDescription>Group -
The VMM must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the VMM ensures privacy and security notifi...Rule Medium Severity -
SRG-OS-000024
<GroupDescription></GroupDescription>Group -
The VMM must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
<VulnDiscussion>The banner must be acknowledged by the user prior to allowing the user access to the VMM. This provides assurance that the us...Rule Medium Severity -
SRG-OS-000027
<GroupDescription></GroupDescription>Group -
The VMM must limit the number of concurrent sessions to ten for all accounts and/or account types.
<VulnDiscussion> VMM management includes the ability to control the number of users and user sessions that utilize the VMM. Limiting the numb...Rule Medium Severity -
SRG-OS-000028
<GroupDescription></GroupDescription>Group -
The VMM must retain the session lock until the user reestablishes access using established identification and authentication procedures.
<VulnDiscussion> A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the...Rule Medium Severity -
SRG-OS-000029
<GroupDescription></GroupDescription>Group -
The VMM must initiate a session lock after a 15-minute period of inactivity.
<VulnDiscussion>A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...Rule Medium Severity -
SRG-OS-000030
<GroupDescription></GroupDescription>Group -
The VMM must provide the capability for users to directly initiate a session lock.
<VulnDiscussion>A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...Rule Medium Severity -
SRG-OS-000031
<GroupDescription></GroupDescription>Group -
The VMM must conceal, via the session lock, information previously visible on the display with a publicly viewable image.
<VulnDiscussion>A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...Rule Medium Severity -
SRG-OS-000032
<GroupDescription></GroupDescription>Group -
The VMM must monitor remote access methods automatically.
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and VMMs, which lack automated capabilities,...Rule Medium Severity -
SRG-OS-000033
<GroupDescription></GroupDescription>Group -
The VMM must use DoD-approved encryption to protect the confidentiality of remote access sessions.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule Medium Severity -
SRG-OS-000037
<GroupDescription></GroupDescription>Group -
The VMM must produce audit records containing information to establish what type of events occurred.
<VulnDiscussion>Without establishing what types of events occurred, it would be difficult to establish, correlate, and investigate the events...Rule Medium Severity -
SRG-OS-000038
<GroupDescription></GroupDescription>Group -
The VMM must produce audit records containing information to establish when (date and time) the events occurred.
<VulnDiscussion>Without establishing when events occurred, it is difficult to establish, correlate, and investigate the events leading up to ...Rule Medium Severity -
SRG-OS-000039
<GroupDescription></GroupDescription>Group -
The VMM must produce audit records containing information to establish where the events occurred.
<VulnDiscussion>Without establishing where events occurred, it is difficult to establish, correlate, and investigate the events leading up to...Rule Medium Severity -
SRG-OS-000040
<GroupDescription></GroupDescription>Group -
The VMM must produce audit records containing information to establish the source of the events.
<VulnDiscussion>Without establishing the source of an event, it is difficult to establish, correlate, and investigate the events leading up t...Rule Medium Severity -
SRG-OS-000041
<GroupDescription></GroupDescription>Group -
The VMM must produce audit records containing information to establish the outcome of the events.
<VulnDiscussion>Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attac...Rule Medium Severity -
SRG-OS-000042
<GroupDescription></GroupDescription>Group -
The VMM must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
<VulnDiscussion>Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. O...Rule Medium Severity -
SRG-OS-000046
<GroupDescription></GroupDescription>Group -
The VMM must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
<VulnDiscussion> It is critical for the appropriate personnel to be aware if a VMM is at risk of failing to process audit logs as required. W...Rule Medium Severity -
SRG-OS-000047
<GroupDescription></GroupDescription>Group -
The VMM must shut down by default upon audit failure (unless availability is an overriding concern).
<VulnDiscussion>It is critical that when the VMM is at risk of failing to process audit logs as required, it take action to mitigate the fail...Rule Medium Severity -
SRG-OS-000051
<GroupDescription></GroupDescription>Group -
The VMM must support the capability to centrally review and analyze audit records from multiple components within the system.
<VulnDiscussion> Successful incident response and auditing relies on timely, accurate system information and analysis in order to allow the o...Rule Medium Severity -
SRG-OS-000054
<GroupDescription></GroupDescription>Group -
The VMM must support the capability to filter audit records for events of interest based upon all audit fields within audit records.
<VulnDiscussion>The ability to specify the event criteria that are of interest provides the individuals reviewing the logs with the ability t...Rule Medium Severity -
SRG-OS-000055
<GroupDescription></GroupDescription>Group -
The VMM must use internal system clocks to generate time stamps for audit records.
<VulnDiscussion> Without an internal clock used as the reference for the time stored on each event to provide a trusted common reference for ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.