Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server.

    &lt;VulnDiscussion&gt;If access to the X server is not restricted, a user's X session may be compromised.&lt;/VulnDiscussion&gt;&lt;FalsePositives&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The .Xauthority utility must only permit access to authorized hosts.

    &lt;VulnDiscussion&gt;If unauthorized clients are permitted access to the X server, a user's X session may be compromised.&lt;/VulnDiscussion&gt;&l...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • X Window System connections that are not required must be disabled.

    &lt;VulnDiscussion&gt;If unauthorized clients are permitted access to the X server, a user's X session may be compromised.&lt;/VulnDiscussion&gt;&l...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The graphical login service provides the capability of logging into the system using an X-Windows type interface from the console. If graphical login access for the console is required, the service must be in local-only mode.

    &lt;VulnDiscussion&gt;Externally accessible graphical desktop software may open the system to remote attacks.&lt;/VulnDiscussion&gt;&lt;FalsePositi...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Generic Security Services (GSS) must be disabled.

    &lt;VulnDiscussion&gt;This service should be disabled if it is not required.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Systems services that are not required must be disabled.

    &lt;VulnDiscussion&gt;Services that are enabled but not required by the mission may provide excessive access or additional attack vectors to penetr...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • TCP Wrappers must be enabled and configured per site policy to only allow access by approved hosts and services.

    &lt;VulnDiscussion&gt;TCP Wrappers are a host-based access control system that allows administrators to control who has access to various network s...
    Rule Medium Severity
  • SRG-OS-000076

    <GroupDescription></GroupDescription>
    Group
  • User passwords must be changed at least every 60 days.

    &lt;VulnDiscussion&gt;Limiting the lifespan of authenticators limits the period of time an unauthorized user has access to the system while using c...
    Rule Medium Severity
  • SRG-OS-000002

    <GroupDescription></GroupDescription>
    Group
  • The operating system must automatically terminate temporary accounts within 72 hours.

    &lt;VulnDiscussion&gt;If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...
    Rule Low Severity
  • SRG-OS-000075

    <GroupDescription></GroupDescription>
    Group
  • The operating system must enforce minimum password lifetime restrictions.

    &lt;VulnDiscussion&gt;Passwords need to be changed at specific policy-based intervals; however, if the information system or application allows the...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules