Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • System start-up files must only execute programs owned by a privileged UID or an application.

    &lt;VulnDiscussion&gt;System start-up files executing programs owned by other than root (or another privileged user) or an application indicates th...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Any X Windows host must write .Xauthority files.

    &lt;VulnDiscussion&gt;.Xauthority files ensure the user is authorized to access the specific X Windows host. If .Xauthority files are not used, it ...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All .Xauthority files must have mode 0600 or less permissive.

    &lt;VulnDiscussion&gt;.Xauthority files ensure the user is authorized to access the specific X Windows host. Excessive permissions may permit unaut...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The .Xauthority files must not have extended ACLs.

    &lt;VulnDiscussion&gt;.Xauthority files ensure the user is authorized to access the specific X Windows host. Extended ACLs may permit unauthorized ...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • X displays must not be exported to the world.

    &lt;VulnDiscussion&gt;Open X displays allow an attacker to capture keystrokes and to execute commands remotely. Many users have their X Server set ...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules