Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must be configured so that the cron.allow file, if it exists, is group-owned by root.

    &lt;VulnDiscussion&gt;If the group owner of the "cron.allow" file is not set to root, sensitive information could be viewed or edited by unauthoriz...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must disable Kernel core dumps unless needed.

    &lt;VulnDiscussion&gt;Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a co...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must be configured so that a separate file system is used for user home directories (such as /home or an equivalent).

    &lt;VulnDiscussion&gt;The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must use a separate file system for /var.

    &lt;VulnDiscussion&gt;The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...
    Rule Low Severity
  • SRG-OS-000341-GPOS-00132

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must use a separate file system for the system audit data path large enough to hold at least one week of audit data.

    &lt;VulnDiscussion&gt;The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must use a separate file system for /tmp (or equivalent).

    &lt;VulnDiscussion&gt;The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...
    Rule Low Severity
  • SRG-OS-000033-GPOS-00014

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The operating syst...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must be configured so that the file integrity tool is configured to verify Access Control Lists (ACLs).

    &lt;VulnDiscussion&gt;ACLs can provide permissions beyond those permitted through the file mode and must be verified by file integrity tools.&lt;/V...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must be configured so that the file integrity tool is configured to verify extended attributes.

    &lt;VulnDiscussion&gt;Extended attributes in file systems are used to contain arbitrary data and file metadata with security implications.&lt;/Vuln...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must use a file integrity tool that is configured to use FIPS 140-2 approved cryptographic hashes for validating file contents and directories.

    &lt;VulnDiscussion&gt;File integrity tools use cryptographic hashes for verifying file contents and directories have not been altered. These hashes...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules