I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
The Photon operating system must automatically lock an account when three unsuccessful logon attempts occur.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
<GroupDescription></GroupDescription>Group -
The Photon operating system must display the Standard Mandatory DOD Notice and Consent Banner before granting Secure Shell (SSH) access.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the operating system ensures privacy and se...Rule Medium Severity -
SRG-OS-000027-GPOS-00008
<GroupDescription></GroupDescription>Group -
The Photon operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.
<VulnDiscussion>Operating system management includes the ability to control the number of users and user sessions that utilize an operating s...Rule Medium Severity -
SRG-OS-000029-GPOS-00010
<GroupDescription></GroupDescription>Group -
The Photon operating system must set a session inactivity timeout of 15 minutes or less.
<VulnDiscussion>A session timeout is an action taken when a session goes idle for any reason. Rather than relying on the user to manually dis...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
<GroupDescription></GroupDescription>Group -
The Photon operating system must have the sshd SyslogFacility set to "authpriv".
<VulnDiscussion>Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
<GroupDescription></GroupDescription>Group -
The Photon operating system must have sshd authentication logging enabled.
<VulnDiscussion>Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
<GroupDescription></GroupDescription>Group -
The Photon operating system must have the sshd LogLevel set to "INFO".
<VulnDiscussion>Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
The Photon operating system must configure sshd to use approved encryption algorithms.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule Low Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The Photon operating system must configure auditd to log to disk.
<VulnDiscussion>Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events ...Rule Medium Severity -
SRG-OS-000038-GPOS-00016
<GroupDescription></GroupDescription>Group -
The Photon operating system must configure auditd to use the correct log format.
<VulnDiscussion>To compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know exact, u...Rule Medium Severity -
SRG-OS-000042-GPOS-00020
<GroupDescription></GroupDescription>Group -
The Photon operating system must be configured to audit the execution of privileged functions.
<VulnDiscussion>Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external enti...Rule Medium Severity -
SRG-OS-000042-GPOS-00021
<GroupDescription></GroupDescription>Group -
The Photon operating system must have the auditd service running.
<VulnDiscussion>Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the...Rule Medium Severity -
SRG-OS-000046-GPOS-00022
<GroupDescription></GroupDescription>Group -
The Photon operating system audit log must log space limit problems to syslog.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000047-GPOS-00023
<GroupDescription></GroupDescription>Group -
The Photon operating system audit log must attempt to log audit failures to syslog.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The Photon operating system audit log must have correct permissions.
<VulnDiscussion>Audit information includes all information (e.g., audit records, audit settings, audit reports) needed to successfully audit ...Rule Medium Severity -
SRG-OS-000058-GPOS-00028
<GroupDescription></GroupDescription>Group -
The Photon operating system audit log must be owned by root.
<VulnDiscussion>Audit information includes all information (e.g., audit records, audit settings, audit reports) needed to successfully audit ...Rule Medium Severity -
SRG-OS-000059-GPOS-00029
<GroupDescription></GroupDescription>Group -
The Photon operating system audit log must be group-owned by root.
<VulnDiscussion>Audit information includes all information (e.g., audit records, audit settings, audit reports) needed to successfully audit ...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
<GroupDescription></GroupDescription>Group -
The Photon operating system must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
<VulnDiscussion>Without the capability to restrict the roles and individuals that can select which events are audited, unauthorized personnel...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Photon operating system must generate audit records when successful/unsuccessful attempts to access privileges occur.
<VulnDiscussion>Audit records can be generated from various components within the information system (e.g., module or policy filter). Satisf...Rule Medium Severity -
SRG-OS-000069-GPOS-00037
<GroupDescription></GroupDescription>Group -
The Photon operating system must enforce password complexity by requiring that at least one uppercase character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-OS-000070-GPOS-00038
<GroupDescription></GroupDescription>Group -
The Photon operating system must enforce password complexity by requiring that at least one lowercase character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-OS-000071-GPOS-00039
<GroupDescription></GroupDescription>Group -
The Photon operating system must enforce password complexity by requiring that at least one numeric character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-OS-000072-GPOS-00040
<GroupDescription></GroupDescription>Group -
The Photon operating system must require that new passwords are at least four characters different from the old password.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
<GroupDescription></GroupDescription>Group -
The Photon operating system must store only encrypted representations of passwords.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule Medium Severity -
SRG-OS-000074-GPOS-00042
<GroupDescription></GroupDescription>Group -
The Photon operating system must use an OpenSSH server version that does not support protocol 1.
<VulnDiscussion>A replay attack may enable an unauthorized user to gain access to the operating system. Authentication sessions between the a...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.