Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000077-GPOS-00045

    Group
  • Windows Server 2016 password history must be configured to 24 passwords remembered.

    A system is more vulnerable to unauthorized access when system users recycle the same password several times without being required to change to a unique password on a regularly scheduled basis. Th...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • Windows Server 2016 maximum password age must be configured to 60 days or less.

    The longer a password is in use, the greater the opportunity for someone to gain unauthorized knowledge of the passwords. Scheduled changing of passwords hinders the ability of unauthorized system ...
    Rule Medium Severity
  • SRG-OS-000075-GPOS-00043

    Group
  • Windows Server 2016 minimum password age must be configured to at least one day.

    Permitting passwords to be changed in immediate succession within the same day allows users to cycle passwords through their history database. This enables users to effectively negate the purpose o...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • Windows Server 2016 minimum password length must be configured to 14 characters.

    Information systems not protected with strong password schemes (including passwords of minimum length) provide the opportunity for anyone to crack the password, thus gaining access to the system an...
    Rule Medium Severity
  • SRG-OS-000069-GPOS-00037

    Group
  • Windows Server 2016 must have the built-in Windows password complexity policy enabled.

    The use of complex passwords increases their strength against attack. The built-in Windows password complexity policy requires passwords to contain at least three of the four types of characters (n...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • Windows Server 2016 reversible password encryption must be disabled.

    Storing passwords using reversible encryption is essentially the same as storing clear-text versions of the passwords, which are easily compromised. For this reason, this policy must never be enabled.
    Rule High Severity
  • SRG-OS-000342-GPOS-00133

    Group
  • Audit records must be backed up to a different system or media than the system being audited.

    Protection of log data includes assuring the log data is not accidentally lost or deleted. Audit information stored in one location is vulnerable to accidental or incidental deletion or alteration.
    Rule Medium Severity
  • SRG-OS-000479-GPOS-00224

    Group
  • Windows Server 2016 must, at a minimum, offload audit records of interconnected systems in real time and offload standalone or nondomain-joined systems weekly.

    Protection of log data includes ensuring the log data is not accidentally lost or deleted. Audit information stored in one location is vulnerable to accidental or incidental deletion or alteration.
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • Permissions for the Application event log must prevent access by non-privileged accounts.

    Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • Permissions for the Security event log must prevent access by non-privileged accounts.

    Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. A...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules