I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000002
<GroupDescription></GroupDescription>Group -
The operating system must automatically remove or disable temporary user accounts after 72 hours.
<VulnDiscussion>If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...Rule Medium Severity -
SRG-OS-000004
<GroupDescription></GroupDescription>Group -
The operating system must audit all account creations.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000021
<GroupDescription></GroupDescription>Group -
The operating system must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-OS-000023
<GroupDescription></GroupDescription>Group -
The operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the operating system ensures privacy and se...Rule Medium Severity -
SRG-OS-000024
<GroupDescription></GroupDescription>Group -
The operating system must display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access.
<VulnDiscussion>The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assuranc...Rule Medium Severity -
SRG-OS-000027
<GroupDescription></GroupDescription>Group -
The operating system must limit the number of concurrent sessions to ten for all accounts and/or account types.
<VulnDiscussion>Operating system management includes the ability to control the number of users and user sessions that utilize an operating s...Rule Low Severity -
SRG-OS-000028
<GroupDescription></GroupDescription>Group -
The operating system must retain a users session lock until that user reestablishes access using established identification and authentication procedures.
<VulnDiscussion>A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...Rule Medium Severity -
SRG-OS-000029
<GroupDescription></GroupDescription>Group -
The operating system must initiate a session lock after a 15-minute period of inactivity for all connection types.
<VulnDiscussion>A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...Rule Medium Severity -
SRG-OS-000030
<GroupDescription></GroupDescription>Group -
The operating system must provide the capability for users to directly initiate a session lock for all connection types.
<VulnDiscussion>A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...Rule Medium Severity -
SRG-OS-000031
<GroupDescription></GroupDescription>Group -
The operating system must conceal, via the session lock, information previously visible on the display with a publicly viewable image.
<VulnDiscussion>A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...Rule Medium Severity -
SRG-OS-000032
<GroupDescription></GroupDescription>Group -
The operating system must monitor remote access methods.
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and information systems, which lack automate...Rule Medium Severity -
SRG-OS-000033
<GroupDescription></GroupDescription>Group -
The operating system must implement DoD-approved encryption to protect the confidentiality of remote access sessions.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule High Severity -
SRG-OS-000037
<GroupDescription></GroupDescription>Group -
The operating system must produce audit records containing information to establish what type of events occurred.
<VulnDiscussion>Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events ...Rule Medium Severity -
SRG-OS-000038
<GroupDescription></GroupDescription>Group -
The operating system must produce audit records containing information to establish when (date and time) the events occurred.
<VulnDiscussion>Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events leading up to...Rule Medium Severity -
SRG-OS-000039
<GroupDescription></GroupDescription>Group -
The operating system must produce audit records containing information to establish where the events occurred.
<VulnDiscussion>Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up t...Rule Medium Severity -
SRG-OS-000040
<GroupDescription></GroupDescription>Group -
The operating system must produce audit records containing information to establish the source of the events.
<VulnDiscussion>Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up...Rule Medium Severity -
SRG-OS-000041
<GroupDescription></GroupDescription>Group -
The operating system must produce audit records containing information to establish the outcome of the events.
<VulnDiscussion>Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attac...Rule Medium Severity -
SRG-OS-000042
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records containing the full-text recording of privileged commands.
<VulnDiscussion>Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...Rule Medium Severity -
SRG-OS-000042
<GroupDescription></GroupDescription>Group -
The operating system must produce audit records containing the individual identities of group account users.
<VulnDiscussion>Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...Rule Medium Severity -
SRG-OS-000046
<GroupDescription></GroupDescription>Group -
The operating system must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000047
<GroupDescription></GroupDescription>Group -
The operating system must shut down by default upon audit failure (unless availability is an overriding concern).
<VulnDiscussion>It is critical that when the operating system is at risk of failing to process audit logs as required, it takes action to mit...Rule Medium Severity -
SRG-OS-000051
<GroupDescription></GroupDescription>Group -
The operating system must provide the capability to centrally review and analyze audit records from multiple components within the system.
<VulnDiscussion>Successful incident response and auditing relies on timely, accurate system information and analysis in order to allow the or...Rule Medium Severity -
SRG-OS-000054
<GroupDescription></GroupDescription>Group -
The operating system must provide the capability to filter audit records for events of interest based upon all audit fields within audit records.
<VulnDiscussion>The ability to specify the event criteria that are of interest provides the individuals reviewing the logs with the ability t...Rule Medium Severity -
SRG-OS-000055
<GroupDescription></GroupDescription>Group -
The operating system must use internal system clocks to generate time stamps for audit records.
<VulnDiscussion>Without an internal clock used as the reference for the time stored on each event to provide a trusted common reference for t...Rule Medium Severity -
SRG-OS-000057
<GroupDescription></GroupDescription>Group -
The operating system must protect audit information from unauthorized read access.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.