Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 library directories must have mode 755 or less permissive.

    &lt;VulnDiscussion&gt;If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without under...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 library files must have mode 755 or less permissive.

    &lt;VulnDiscussion&gt;If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without under...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SLEM 5 local interactive user home directories must have mode 750 or less permissive.

    &lt;VulnDiscussion&gt;Excessive permissions on local interactive user home directories may allow unauthorized access to user files by other users.&...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SLEM 5 local initialization files must have mode 740 or less permissive.

    &lt;VulnDiscussion&gt;Local initialization files are used to configure the user's shell environment upon logon. Malicious modification of these fil...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 SSH daemon public host key files must have mode 644 or less permissive.

    &lt;VulnDiscussion&gt;If a public host key file is modified by an unauthorized user, the SSH service may be compromised.&lt;/VulnDiscussion&gt;&lt;...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 SSH daemon private host key files must have mode 640 or less permissive.

    &lt;VulnDiscussion&gt;If an unauthorized user obtains the private SSH host key file, the host could be impersonated.&lt;/VulnDiscussion&gt;&lt;Fals...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 library files must be owned by root.

    &lt;VulnDiscussion&gt;If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without under...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 library files must be group-owned by root.

    &lt;VulnDiscussion&gt;If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without under...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 library directories must be owned by root.

    &lt;VulnDiscussion&gt;If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without under...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 library directories must be group-owned by root.

    &lt;VulnDiscussion&gt;If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without under...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must have system commands owned by root.

    &lt;VulnDiscussion&gt;If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without under...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must have system commands group-owned by root or a system account.

    &lt;VulnDiscussion&gt;If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without under...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must have directories that contain system commands owned by root.

    &lt;VulnDiscussion&gt;If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without under...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must have directories that contain system commands group-owned by root.

    &lt;VulnDiscussion&gt;If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without under...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SLEM 5 files and directories must have a valid owner.

    &lt;VulnDiscussion&gt;Unowned files and directories may be unintentionally inherited if a user is assigned the same User Identifier (UID) as the UI...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SLEM 5 files and directories must have a valid group owner.

    &lt;VulnDiscussion&gt;Files without a valid group owner may be unintentionally inherited if a group is assigned the same Group Identifier (GID) as ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SLEM 5 local interactive user home directories must be group-owned by the home directory owner's primary group.

    &lt;VulnDiscussion&gt;If the Group Identifier (GID) of a local interactive user's home directory is not the same as the primary GID of the user, th...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All SLEM 5 world-writable directories must be group-owned by root, sys, bin, or an application group.

    &lt;VulnDiscussion&gt;If a world-writable directory has the sticky bit set and is not group-owned by a privileged Group Identifier (GID), unauthori...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • The sticky bit must be set on all SLEM 5 world-writable directories.

    &lt;VulnDiscussion&gt;Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must prevent unauthorized users from accessing system error messages.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000205-GPOS-00083

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    &lt;VulnDiscussion&gt;Any operating system providing too much information in error messages risks compromising the data and security of the structu...
    Rule Medium Severity
  • SRG-OS-000096-GPOS-00050

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 clock must, for networked systems, be synchronized to an authoritative DOD time source at least every 24 hours.

    &lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must not have network interfaces in promiscuous mode unless approved and documented.

    &lt;VulnDiscussion&gt;Network interfaces in promiscuous mode allow for the capture of all network traffic visible to the system. If unauthorized in...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • SLEM 5 must not forward Internet Protocol version 4 (IPv4) source-routed packets.

    &lt;VulnDiscussion&gt;Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than c...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules