Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000047

    <GroupDescription></GroupDescription>
    Group
  • The operating system must shut down by default upon audit failure (unless availability is an overriding concern).

    &lt;VulnDiscussion&gt;It is critical that when the operating system is at risk of failing to process audit logs as required, it takes action to mit...
    Rule Medium Severity
  • SRG-OS-000051

    <GroupDescription></GroupDescription>
    Group
  • The operating system must provide the capability to centrally review and analyze audit records from multiple components within the system.

    &lt;VulnDiscussion&gt;Successful incident response and auditing relies on timely, accurate system information and analysis in order to allow the or...
    Rule Medium Severity
  • SRG-OS-000054

    <GroupDescription></GroupDescription>
    Group
  • The operating system must provide the capability to filter audit records for events of interest based upon all audit fields within audit records.

    &lt;VulnDiscussion&gt;The ability to specify the event criteria that are of interest provides the individuals reviewing the logs with the ability t...
    Rule Medium Severity
  • SRG-OS-000055

    <GroupDescription></GroupDescription>
    Group
  • The operating system must use internal system clocks to generate time stamps for audit records.

    &lt;VulnDiscussion&gt;Without an internal clock used as the reference for the time stored on each event to provide a trusted common reference for t...
    Rule Medium Severity
  • SRG-OS-000057

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect audit information from unauthorized read access.

    &lt;VulnDiscussion&gt;Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...
    Rule Medium Severity
  • SRG-OS-000058

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect audit information from unauthorized modification.

    &lt;VulnDiscussion&gt;If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malic...
    Rule Medium Severity
  • SRG-OS-000059

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect audit information from unauthorized deletion.

    &lt;VulnDiscussion&gt;If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malic...
    Rule Medium Severity
  • SRG-OS-000062

    <GroupDescription></GroupDescription>
    Group
  • The operating system must provide audit record generation capability for DoD-defined auditable events for all operating system components.

    &lt;VulnDiscussion&gt;Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...
    Rule Medium Severity
  • SRG-OS-000063

    <GroupDescription></GroupDescription>
    Group
  • The operating system must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-OS-000064

    <GroupDescription></GroupDescription>
    Group
  • The operating system must generate audit records when successful/unsuccessful attempts to access privileges occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules