Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000364-GPOS-00151

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must not allow removable media to be used as the boot loader unless approved.

    &lt;VulnDiscussion&gt;Malicious users with removable boot media can gain access to a system configured to use removable media as the boot loader. I...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must not have the telnet-server package installed.

    &lt;VulnDiscussion&gt;It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...
    Rule High Severity
  • SRG-OS-000038-GPOS-00016

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must be configured so that auditing is configured to produce records containing information to establish what type of events occurred, where the events occurred, the source of the events, and the outcome of the events. These audit records must also identify individual identities of group account users.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events ...
    Rule Medium Severity
  • SRG-OS-000046-GPOS-00022

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must shut down upon audit processing failure, unless availability is an overriding concern. If availability is a concern, the system must alert the designated staff (System Administrator [SA] and Information System Security Officer [ISSO] at a minimum) in the event of an audit processing failure.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must be configured to off-load audit logs onto a different system or storage media from the system being audited.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must take appropriate action when the remote logging buffer is full.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must label all off-loaded audit logs before sending them to the central log server.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must off-load audit records onto a different system or media from the system being audited.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must encrypt the transfer of audit records off-loaded onto a different system or media from the system being audited.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must be configured so that the audit system takes appropriate action when the audit storage volume is full.

    &lt;VulnDiscussion&gt;Taking appropriate action in case of a filled audit storage volume will minimize the possibility of losing audit records. One...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must be configured so that the audit system takes appropriate action when there is an error sending audit records to a remote system.

    &lt;VulnDiscussion&gt;Taking appropriate action when there is an error sending audit records to a remote system will minimize the possibility of lo...
    Rule Medium Severity
  • SRG-OS-000343-GPOS-00134

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must initiate an action to notify the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity.

    &lt;VulnDiscussion&gt;If security personnel are not notified immediately when storage volume reaches 75 percent utilization, they are unable to pla...
    Rule Medium Severity
  • SRG-OS-000343-GPOS-00134

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must immediately notify the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) via email when the threshold for the repository maximum audit record storage capacity is reached.

    &lt;VulnDiscussion&gt;If security personnel are not notified immediately when the threshold for the repository maximum audit record storage capacit...
    Rule Medium Severity
  • SRG-OS-000343-GPOS-00134

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must immediately notify the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) when the threshold for the repository maximum audit record storage capacity is reached.

    &lt;VulnDiscussion&gt;If security personnel are not notified immediately when the threshold for the repository maximum audit record storage capacit...
    Rule Medium Severity
  • SRG-OS-000327-GPOS-00127

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must audit all executions of privileged functions.

    &lt;VulnDiscussion&gt;Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external enti...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must audit all uses of the chown, fchown, fchownat, and lchown syscalls.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000458-GPOS-00203

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must audit all uses of the chmod, fchmod, and fchmodat syscalls.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000458-GPOS-00203

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr syscalls.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must audit all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000392-GPOS-00172

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must audit all uses of the semanage command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000392-GPOS-00172

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must audit all uses of the setsebool command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000392-GPOS-00172

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must audit all uses of the chcon command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000392-GPOS-00172

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must audit all uses of the setfiles command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000392-GPOS-00172

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must generate audit records for all unsuccessful account access events.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000392-GPOS-00172

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Linux operating system must generate audit records for all successful account access events.

    &lt;VulnDiscussion&gt;Without generating audit records that to the security and mission needs of the organization, it would be difficult to establi...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules