Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000029-GPOS-00010

    <GroupDescription></GroupDescription>
    Group
  • The terminal or workstation must lock out after a maximum of 15 minutes of inactivity, requiring the account password to resume.

    &lt;VulnDiscussion&gt;If the system, workstation, or terminal does not lock the session after more than15 minutes of inactivity, requiring a passwo...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    <GroupDescription></GroupDescription>
    Group
  • The Department of Defense (DoD) logon banner must be displayed prior to any login attempt.

    &lt;VulnDiscussion&gt;Failure to display the required DoD logon banner prior to a login attempt may void legal proceedings resulting from unauthori...
    Rule Medium Severity
  • SRG-OS-000366-GPOS-00153

    <GroupDescription></GroupDescription>
    Group
  • A private web server must subscribe to certificates, issued from any DOD-authorized Certificate Authority (CA), as an access control mechanism for web users.

    &lt;VulnDiscussion&gt;If the Hardware Management Consoles (HMC) is network-connected, use SSL encryption techniques, through digital certificates t...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • Hardware Management Console audit record content data must be backed up.

    &lt;VulnDiscussion&gt;The Hardware Management Console has the ability to backup and display the following data: 1) Critical console data 2) Critica...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • Audit records content must contain valid information to allow for proper incident reporting.

    &lt;VulnDiscussion&gt;The content of audit data must validate that the information contains: User IDs Successful and unsuccessful attempts to acc...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Hardware Management Console management must be accomplished by using the out-of-band or direct connection method.

    &lt;VulnDiscussion&gt;Removing the management traffic from the production network diminishes the security profile of the Hardware Management Consol...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • Product engineering access to the Hardware Management Console must be disabled.

    &lt;VulnDiscussion&gt;The Hardware Management Console has a built-in feature that allows Product Engineers access to the console. With access autho...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Connection to the Internet for IBM remote support must be in compliance with the Remote Access STIGs.

    &lt;VulnDiscussion&gt;Failure to securely connect to remote sites can leave systems open to multiple attacks and security violations through the ne...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Connection to the Internet for IBM remote support must be in compliance with mitigations specified in the Ports and Protocols and Services Management (PPSM) requirements.

    &lt;VulnDiscussion&gt;Failure to securely connect to remote sites can leave systems open to multiple attacks and security violations through the ne...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules