Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The use of FTP must be restricted.

    &lt;VulnDiscussion&gt;FTP is an insecure protocol that transfers files and credentials in clear text, and can be replaced by using SFTP. However, i...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not allow autologin capabilities from the GNOME desktop.

    &lt;VulnDiscussion&gt;As automatic logins are a known security risk for other than "kiosk" types of systems, GNOME automatic login should be disabl...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Unauthorized use of the at or cron capabilities must not be permitted.

    &lt;VulnDiscussion&gt;On many systems, only the system administrator needs the ability to schedule jobs. Even though a given user is not listed in...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Logins to the root account must be restricted to the system console only.

    &lt;VulnDiscussion&gt;Use an authorized mechanism such as RBAC and the "su" command to provide administrative access to unprivileged accounts. Thes...
    Rule Medium Severity
  • SRG-OS-000025

    <GroupDescription></GroupDescription>
    Group
  • The operating system, upon successful logon, must display to the user the date and time of the last logon (access).

    &lt;VulnDiscussion&gt;Users need to be aware of activity that occurs regarding their account. Providing users with information regarding the date a...
    Rule Low Severity
  • SRG-OS-000030

    <GroupDescription></GroupDescription>
    Group
  • The operating system must provide the capability for users to directly initiate session lock mechanisms.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000031

    <GroupDescription></GroupDescription>
    Group
  • The operating system session lock mechanism, when activated on a device with a display screen, must place a publicly viewable pattern onto the associated display, hiding what was previously visible on the screen.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must not allow logins for users with blank passwords.

    &lt;VulnDiscussion&gt;If the password field is blank and the system does not enforce a policy that passwords are required, it could allow login wit...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must prevent remote devices that have established a non-remote connection with the system from communicating outside of the communication path with resources in external networks.

    &lt;VulnDiscussion&gt;This control enhancement is implemented within the remote device (e.g., notebook/laptop computer) via configuration settings ...
    Rule Medium Severity
  • SRG-OS-000027

    <GroupDescription></GroupDescription>
    Group
  • The operating system must limit the number of concurrent sessions for each account to an organization-defined number of sessions.

    &lt;VulnDiscussion&gt;Limiting the number of allowed users and sessions per user can limit risks related to denial of service attacks. The organiza...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules