I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000191-GPOS-00080
Group -
SLEM 5 must implement an endpoint security tool.
Adding endpoint security tools can provide the capability to automatically take actions in response to malicious behavior, which can provide additional agility in reacting to network threats. These...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
Group -
SLEM 5 must display the Standard Mandatory DOD Notice and Consent Banner before granting any local or remote connection to the system.
Display of a standardized and approved use notification before granting access to SLEM 5 ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executiv...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 must disable the x86 Ctrl-Alt-Delete key sequence.
A locally logged-on user who presses Ctrl-Alt-Delete when at the console can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the r...Rule High Severity -
SRG-OS-000080-GPOS-00048
Group -
SLEM 5 with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-approved PKIs, all DOD systems (e.g., web servers and web portals) must be...Rule High Severity -
SRG-OS-000080-GPOS-00048
Group -
SLEM 5 with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
If the system allows a user to boot into single-user or maintenance mode without authentication, any user that invokes single-user or maintenance mode is granted privileged access to all system inf...Rule High Severity -
SRG-OS-000138-GPOS-00069
Group -
SLEM 5 must restrict access to the kernel message buffer.
Restricting access to the kernel message buffer limits access only to root. This prevents attackers from gaining additional system information as a nonprivileged user.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 kernel core dumps must be disabled unless needed.
Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a considerable amount of disk space and may result in denial of service (DoS...Rule Medium Severity -
SRG-OS-000433-GPOS-00193
Group -
Address space layout randomization (ASLR) must be implemented by SLEM 5 to protect memory from unauthorized code execution.
Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory inclu...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
Group -
SLEM 5 must implement kptr-restrict to prevent the leaking of internal kernel addresses.
Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory inclu...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Vendor-packaged SLEM 5 security patches and updates must be installed and up to date.
Timely patching is critical for maintaining the operational availability, confidentiality, and integrity of information technology (IT) systems. However, failure to keep SLEM 5 and application soft...Rule Medium Severity -
SRG-OS-000366-GPOS-00153
Group -
The SLEM 5 tool zypper must have gpgcheck enabled.
Changes to any software components can have significant effects on the overall security of SLEM 5. This requirement ensures the software has not been tampered with and has been provided by a truste...Rule High Severity -
SRG-OS-000437-GPOS-00194
Group -
SLEM 5 must remove all outdated software components after updated versions have been installed.
Previous versions of software components that are not removed from the information system after updates have been installed may be exploited by adversaries. Some information technology products may...Rule Medium Severity -
SRG-OS-000028-GPOS-00009
Group -
SLEM 5 must use vlock to allow for session locking.
A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not want to log out because of the temporary...Rule Medium Severity -
SRG-OS-000074-GPOS-00042
Group -
SLEM 5 must not have the telnet-server package installed.
It is detrimental for SLEM 5 to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked, and ther...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
A separate file system must be used for SLEM 5 user home directories (such as /home or an equivalent).
The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 must use a separate file system for /var.
The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 must use a separate file system for the system audit data path.
The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.
The "nosuid" mount option causes the system to not execute "setuid" and "setgid" files with owner privileges. This option must be used for mounting any file system not containing approved "setuid" ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.
The "noexec" mount option causes the system to not execute binary files. This option must be used for mounting any file system not containing approved binary files, as they may be incompatible. Exe...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.
The "nosuid" mount option causes the system to not execute "setuid" and "setgid" files with owner privileges. This option must be used for mounting any file system not containing approved "setuid" ...Rule Medium Severity -
SRG-OS-000185-GPOS-00079
Group -
All SLEM 5 persistent disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.
SLEM 5 handling data requiring data-at-rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest. Selection of a cryptogr...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
SLEM 5 file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.
The "nosuid" mount option causes the system to not execute setuid and setgid files with owner privileges. This option must be used for mounting any file system not containing approved setuid and se...Rule Medium Severity -
SRG-OS-000114-GPOS-00059
Group -
SLEM 5 must disable the file system automounter unless required.
Automatically mounting file systems permits easy introduction of unknown devices, thereby facilitating malicious activity.Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SLEM 5 must have directories that contain system commands set to a mode of 755 or less permissive.
If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SLEM 5 must have system commands set to a mode of 755 or less permissive.
If SLEM 5 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.