II - Mission Support Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000343-GPOS-00134
Group -
SLEM 5 auditd service must notify the system administrator (SA) and information system security officer (ISSO) immediately when audit storage capacity is 75 percent full.
If security personnel are not notified immediately when storage volume reaches 75 percent utilization, they are unable to plan for audit record storage capacity expansion.Rule Medium Severity -
SRG-OS-000047-GPOS-00023
Group -
SLEM 5 audit system must take appropriate action when the audit storage volume is full.
It is critical that when SLEM 5 is at risk of failing to process audit logs as required, it takes action to mitigate the failure. Audit processing failures include software/hardware errors, failure...Rule Medium Severity -
SRG-OS-000479-GPOS-00224
Group -
SLEM 5 must offload audit records onto a different system or media from the system being audited.
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity.Rule Medium Severity -
SRG-OS-000479-GPOS-00224
Group -
Audispd must take appropriate action when SLEM 5 audit storage is full.
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity.Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
SLEM 5 must protect audit rules from unauthorized modification.
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...Rule Medium Severity -
SRG-OS-000256-GPOS-00097
Group -
SLEM 5 audit tools must have the proper permissions configured to protect against unauthorized access.
Protecting audit information includes identifying and protecting the tools used to view and manipulate log data. Protecting audit tools is necessary to prevent unauthorized operation on audit infor...Rule Medium Severity -
SRG-OS-000256-GPOS-00097
Group -
SLEM 5 audit tools must have the proper permissions applied to protect against unauthorized access.
Protecting audit information includes identifying and protecting the tools used to view and manipulate log data. Protecting audit tools is necessary to prevent unauthorized operation on audit infor...Rule Medium Severity -
SRG-OS-000342-GPOS-00133
Group -
SLEM 5 audit event multiplexor must be configured to use Kerberos.
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Allowing devices and users to connect to or from the system without first authenticating them a...Rule Low Severity -
SRG-OS-000342-GPOS-00133
Group -
Audispd must offload audit records onto a different system or media from SLEM 5 being audited.
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity.Rule Medium Severity -
SRG-OS-000046-GPOS-00022
Group -
The information system security officer (ISSO) and system administrator (SA), at a minimum, must have mail aliases to be notified of a SLEM 5 audit processing failure.
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...Rule Medium Severity -
SRG-OS-000046-GPOS-00022
Group -
The information system security officer (ISSO) and system administrator (SA), at a minimum, must be alerted of a SLEM 5 audit processing failure event.
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "chacl" command.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "chage" command.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "chcon" command.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "chfn" command.
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "chmod" command.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for a uses of the "chsh" command.
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "crontab" command.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "gpasswd" command.
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "insmod" command.
Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit rec...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "kmod" command.
Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit rec...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "modprobe" command.
Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit rec...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "newgrp" command.
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "pam_timestamp_check" command.
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
SLEM 5 must generate audit records for all uses of the "passwd" command.
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.