Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000057

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect audit information from unauthorized access.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The System packages must be up to date with the most recent vendor updates and security fixes.

    &lt;VulnDiscussion&gt;Failure to install security updates can provide openings for attack.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePo...
    Rule Medium Severity
  • SRG-OS-000256

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect audit tools from unauthorized access.

    &lt;VulnDiscussion&gt;Failure to maintain system configurations may result in privilege escalation.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000257

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect audit tools from unauthorized modification.

    &lt;VulnDiscussion&gt;Failure to maintain system configurations may result in privilege escalation.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000258

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect audit tools from unauthorized deletion.

    &lt;VulnDiscussion&gt;Failure to maintain system configurations may result in privilege escalation.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000278

    <GroupDescription></GroupDescription>
    Group
  • System packages must be configured with the vendor-provided files, permissions, and ownerships.

    &lt;VulnDiscussion&gt;Failure to maintain system configurations may result in privilege escalation.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The finger daemon package must not be installed.

    &lt;VulnDiscussion&gt;Finger is an insecure protocol.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The legacy remote network access utilities daemons must not be installed.

    &lt;VulnDiscussion&gt;Legacy remote access utilities allow remote control of a system without proper authentication.&lt;/VulnDiscussion&gt;&lt;Fals...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The NIS package must not be installed.

    &lt;VulnDiscussion&gt;NIS is an insecure protocol.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/Fa...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The pidgin IM client package must not be installed.

    &lt;VulnDiscussion&gt;Instant messaging is an insecure protocol.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegati...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules