I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all uses of the chcon command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all uses of the rm command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all modifications to the tallylog file must generate an audit record.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all modifications to the lastlog file.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all uses of the passmass command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all uses of the usermod command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all uses of the pam_timestamp_check command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all uses of the delete_module system call.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all uses of the init_module and finit_module system calls.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all uses of the su command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all uses of the sudo command.
<VulnDiscussion>Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...Rule Low Severity -
SRG-OS-000046-GPOS-00022
<GroupDescription></GroupDescription>Group -
The Information System Security Officer (ISSO) and System Administrator (SA), at a minimum, must be alerted of a SUSE operating system audit processing failure event.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000046-GPOS-00022
<GroupDescription></GroupDescription>Group -
The Information System Security Officer (ISSO) and System Administrator (SA), at a minimum, must have mail aliases to be notified of a SUSE operating system audit processing failure.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000047-GPOS-00023
<GroupDescription></GroupDescription>Group -
The SUSE operating system audit system must take appropriate action when the audit storage volume is full.
<VulnDiscussion>It is critical that when the SUSE operating system is at risk of failing to process audit logs as required, it takes action t...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The SUSE operating system must protect audit rules from unauthorized modification.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Medium Severity -
SRG-OS-000256-GPOS-00097
<GroupDescription></GroupDescription>Group -
The SUSE operating system audit tools must have the proper permissions configured to protect against unauthorized access.
<VulnDiscussion>Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...Rule Medium Severity -
SRG-OS-000278-GPOS-00108
<GroupDescription></GroupDescription>Group -
The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools.
<VulnDiscussion>Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit in...Rule Medium Severity -
SRG-OS-000327-GPOS-00127
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all uses of the privileged functions.
<VulnDiscussion>Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external enti...Rule Low Severity -
SRG-OS-000337-GPOS-00129
<GroupDescription></GroupDescription>Group -
The SUSE operating system must have the auditing package installed.
<VulnDiscussion>Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it...Rule Medium Severity -
SRG-OS-000341-GPOS-00132
<GroupDescription></GroupDescription>Group -
The SUSE operating system must allocate audit record storage capacity to store at least one week of audit records when audit records are not immediately sent to a central audit record storage facility.
<VulnDiscussion>To ensure SUSE operating systems have a sufficient storage capacity in which to write the audit logs, SUSE operating systems ...Rule Medium Severity -
SRG-OS-000342-GPOS-00133
<GroupDescription></GroupDescription>Group -
The audit-audispd-plugins must be installed on the SUSE operating system.
<VulnDiscussion>The audit-audispd-plugins must be installed on the SUSE operating system.</VulnDiscussion><FalsePositives></Fa...Rule Medium Severity -
SRG-OS-000342-GPOS-00133
<GroupDescription></GroupDescription>Group -
The SUSE operating system audit event multiplexor must be configured to use Kerberos.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Allowing devices and us...Rule Low Severity -
SRG-OS-000342-GPOS-00133
<GroupDescription></GroupDescription>Group -
Audispd must off-load audit records onto a different system or media from the SUSE operating system being audited.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Low Severity -
SRG-OS-000343-GPOS-00134
<GroupDescription></GroupDescription>Group -
The SUSE operating system auditd service must notify the System Administrator (SA) and Information System Security Officer (ISSO) immediately when audit storage capacity is 75 percent full.
<VulnDiscussion>If security personnel are not notified immediately when storage volume reaches 75 percent utilization, they are unable to pla...Rule Medium Severity -
SRG-OS-000468-GPOS-00212
<GroupDescription></GroupDescription>Group -
The SUSE operating system must generate audit records for all uses of the unlink, unlinkat, rename, renameat, and rmdir system calls.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.