Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000368

    <GroupDescription></GroupDescription>
    Group
  • For Impact Level 6, the Mission Owner must process connection approval to the SIPRNet through the DISA classified connection approval process.

    &lt;VulnDiscussion&gt;The DOD Mission Owner systems/applications instantiated in these Impact Level 6 CSO enclaves will be assessed and authorized ...
    Rule Medium Severity
  • SRG-OS-000368

    <GroupDescription></GroupDescription>
    Group
  • The Mission Owner of the Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) must remove orphaned or unused virtual machine (VM) instances.

    &lt;VulnDiscussion&gt;Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some VMs may provide a capabi...
    Rule Medium Severity
  • SRG-OS-000370

    <GroupDescription></GroupDescription>
    Group
  • The Infrastructure as a Service (IaaS)/Platform as a Service (PaaS)/Software as a Service (SaaS) must register the service/application with the DOD DMZ/IAP allowlist for internet-facing inbound and outbound traffic.

    &lt;VulnDiscussion&gt;Register the service/application with the DOD DMZ/IAP allowlist for both inbound and outbound traffic if traffic will cross t...
    Rule Medium Severity
  • SRG-OS-000404

    <GroupDescription></GroupDescription>
    Group
  • For storage service offerings, the Mission Owner must configure or ensure the cloud instance uses encryption to protect all DOD files housed in the cloud instance.

    &lt;VulnDiscussion&gt;Mission systems at all Impact Levels must have the capability for DOD data to be encrypted at rest with exclusive DOD control...
    Rule High Severity
  • SRG-OS-000438

    <GroupDescription></GroupDescription>
    Group
  • The Mission Owner of the Infrastructure as a Service (IaaS) or Platform as a Service (PaaS) must remove all upgraded or replaced software and firmware components that are no longer required for operation.

    &lt;VulnDiscussion&gt;Adversaries may exploit previous versions of software components that are not removed from the information system after updat...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules