Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000191-GPOS-00080

    Group
  • SLEM 5 must implement an endpoint security tool.

    Adding endpoint security tools can provide the capability to automatically take actions in response to malicious behavior, which can provide additional agility in reacting to network threats. These...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    Group
  • SLEM 5 must display the Standard Mandatory DOD Notice and Consent Banner before granting any local or remote connection to the system.

    Display of a standardized and approved use notification before granting access to SLEM 5 ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executiv...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 must disable the x86 Ctrl-Alt-Delete key sequence.

    A locally logged-on user who presses Ctrl-Alt-Delete when at the console can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the r...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SLEM 5 with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-approved PKIs, all DOD systems (e.g., web servers and web portals) must be...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SLEM 5 with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.

    If the system allows a user to boot into single-user or maintenance mode without authentication, any user that invokes single-user or maintenance mode is granted privileged access to all system inf...
    Rule High Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • SLEM 5 must restrict access to the kernel message buffer.

    Restricting access to the kernel message buffer limits access only to root. This prevents attackers from gaining additional system information as a nonprivileged user.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SLEM 5 kernel core dumps must be disabled unless needed.

    Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a considerable amount of disk space and may result in denial of service (DoS...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00193

    Group
  • Address space layout randomization (ASLR) must be implemented by SLEM 5 to protect memory from unauthorized code execution.

    Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory inclu...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00192

    Group
  • SLEM 5 must implement kptr-restrict to prevent the leaking of internal kernel addresses.

    Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory inclu...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Vendor-packaged SLEM 5 security patches and updates must be installed and up to date.

    Timely patching is critical for maintaining the operational availability, confidentiality, and integrity of information technology (IT) systems. However, failure to keep SLEM 5 and application soft...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules