I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000433
<GroupDescription></GroupDescription>Group -
The operating system must implement address space layout randomization to protect its memory from unauthorized code execution.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...Rule Medium Severity -
SRG-OS-000437
<GroupDescription></GroupDescription>Group -
The operating system must remove all software components after updated versions have been installed.
<VulnDiscussion>Previous versions of software components that are not removed from the information system after updates have been installed m...Rule Medium Severity -
SRG-OS-000445
<GroupDescription></GroupDescription>Group -
The operating system must verify correct operation of all security functions.
<VulnDiscussion>Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...Rule Medium Severity -
SRG-OS-000446
<GroupDescription></GroupDescription>Group -
The operating system must perform verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days.
<VulnDiscussion>Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...Rule Medium Severity -
SRG-OS-000447
<GroupDescription></GroupDescription>Group -
The operating system must shut down the information system, restart the information system, and/or notify the system administrator when anomalies in the operation of any security functions are discovered.
<VulnDiscussion>If anomalies are not acted upon, security functions may fail to secure the system. Security function is defined as the hard...Rule Medium Severity -
SRG-OS-000458
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records when successful/unsuccessful attempts to access security objects occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000461
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000462
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records when successful/unsuccessful attempts to modify privileges occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000463
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records when successful/unsuccessful attempts to modify security objects occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000465
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000466
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records when successful/unsuccessful attempts to delete privileges occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000467
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records when successful/unsuccessful attempts to delete security levels occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000468
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records when successful/unsuccessful attempts to delete security objects occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000470
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records when successful/unsuccessful logon attempts occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000471
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records for privileged activities or other system-level access.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000471
<GroupDescription></GroupDescription>Group -
The audit system must be configured to audit the loading and unloading of dynamic kernel modules.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000472
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records showing starting and ending time for user access to the system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000473
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records when concurrent logons to the same account occur from different sources.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000474
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records when successful/unsuccessful accesses to objects occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000475
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records for all direct access to the information system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000476
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records for all account creations, modifications, disabling, and termination events.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000477
<GroupDescription></GroupDescription>Group -
The operating system must generate audit records for all kernel module load, unload, and restart actions, and also for all program initiations.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000478
<GroupDescription></GroupDescription>Group -
The operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating ...Rule High Severity -
SRG-OS-000479
<GroupDescription></GroupDescription>Group -
The operating system must, at a minimum, off-load audit data from interconnected systems in real time and off-load audit data from standalone systems weekly.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must prevent the use of dictionary words for passwords.
<VulnDiscussion>If the operating system allows the user to select passwords based on dictionary words, then this increases the chances of pas...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.