Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Kernel core dumps must be disabled unless needed.

    &lt;VulnDiscussion&gt;Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a co...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The kernel core dump data directory must be owned by root.

    &lt;VulnDiscussion&gt;Kernel core dumps may contain the full contents of system memory at the time of the crash. As the system memory may contain s...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The kernel core dump data directory must be group-owned by root.

    &lt;VulnDiscussion&gt;Kernel core dumps may contain the full contents of system memory at the time of the crash. As the system memory may contain s...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The kernel core dump data directory must have mode 0700 or less permissive.

    &lt;VulnDiscussion&gt;Kernel core dumps may contain the full contents of system memory at the time of the crash. As the system memory may contain s...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must require passwords to change the boot device settings. (SPARC)

    &lt;VulnDiscussion&gt;Setting the EEPROM password helps prevent attackers who gain physical access to the system console from booting from an exter...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must implement transaction recovery for transaction-based systems.

    &lt;VulnDiscussion&gt;Recovery and reconstitution constitutes executing an operating system contingency plan comprised of activities to restore ess...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • SNMP communities, users, and passphrases must be changed from the default.

    &lt;VulnDiscussion&gt;Whether active or not, default SNMP passwords, users, and passphrases must be changed to maintain security. If the service is...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • A file integrity baseline must be created, maintained, and reviewed at least weekly to determine if unauthorized changes have been made to important system files located in the root file system.

    &lt;VulnDiscussion&gt;A file integrity baseline is a collection of file metadata used to evaluate the integrity of the system. A minimal baseline m...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Direct logins must not be permitted to shared, default, application, or utility accounts.

    &lt;VulnDiscussion&gt;Shared accounts (accounts where two or more people log in with the same user identification) do not provide identification an...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not have any unnecessary accounts.

    &lt;VulnDiscussion&gt;Accounts providing no operational purpose provide additional opportunities for system compromise. Unnecessary accounts includ...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules