Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000078

    <GroupDescription></GroupDescription>
    Group
  • User passwords must be at least 15 characters in length.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting guessing and brute-force attac...
    Rule Medium Severity
  • SRG-OS-000072

    <GroupDescription></GroupDescription>
    Group
  • The system must require at least eight characters be changed between the old and new passwords during a password change.

    &lt;VulnDiscussion&gt;To ensure password changes are effective in their goals, the system must ensure old and new passwords have significant differ...
    Rule Medium Severity
  • SRG-OS-000069

    <GroupDescription></GroupDescription>
    Group
  • The system must require passwords to contain at least one uppercase alphabetic character.

    &lt;VulnDiscussion&gt;Complex passwords can reduce the likelihood of success of automated password-guessing attacks.&lt;/VulnDiscussion&gt;&lt;Fals...
    Rule Medium Severity
  • SRG-OS-000070

    <GroupDescription></GroupDescription>
    Group
  • The operating system must enforce password complexity requiring that at least one lowercase character is used.

    &lt;VulnDiscussion&gt;Complex passwords can reduce the likelihood of success of automated password-guessing attacks.&lt;/VulnDiscussion&gt;&lt;Fals...
    Rule Medium Severity
  • SRG-OS-000071

    <GroupDescription></GroupDescription>
    Group
  • The system must require passwords to contain at least one numeric character.

    &lt;VulnDiscussion&gt;Complex passwords can reduce the likelihood of success of automated password-guessing attacks.&lt;/VulnDiscussion&gt;&lt;Fals...
    Rule Medium Severity
  • SRG-OS-000266

    <GroupDescription></GroupDescription>
    Group
  • The system must require passwords to contain at least one special character.

    &lt;VulnDiscussion&gt;Complex passwords can reduce the likelihood of success of automated password-guessing attacks.&lt;/VulnDiscussion&gt;&lt;Fals...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must require passwords to contain no more than three consecutive repeating characters.

    &lt;VulnDiscussion&gt;Complex passwords can reduce the likelihood of success of automated password-guessing attacks.&lt;/VulnDiscussion&gt;&lt;Fals...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not have accounts configured with blank or null passwords.

    &lt;VulnDiscussion&gt;Complex passwords can reduce the likelihood of success of automated password-guessing attacks.&lt;/VulnDiscussion&gt;&lt;Fals...
    Rule Medium Severity
  • SRG-OS-000073

    <GroupDescription></GroupDescription>
    Group
  • Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors.

    &lt;VulnDiscussion&gt;Cryptographic hashes provide quick password authentication while not actually storing the password.&lt;/VulnDiscussion&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000021

    <GroupDescription></GroupDescription>
    Group
  • The system must disable accounts after three consecutive unsuccessful login attempts.

    &lt;VulnDiscussion&gt;Allowing continued access to accounts on the system exposes them to brute-force password-guessing attacks.&lt;/VulnDiscussion...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules