I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The .Xauthority files must not have extended ACLs.
<VulnDiscussion>.Xauthority files ensure the user is authorized to access the specific X Windows host. Extended ACLs may permit unauthorized ...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
X displays must not be exported to the world.
<VulnDiscussion>Open X displays allow an attacker to capture keystrokes and to execute commands remotely. Many users have their X Server set ...Rule High Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
.Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server.
<VulnDiscussion>If access to the X server is not restricted, a user's X session may be compromised.</VulnDiscussion><FalsePositives&...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The .Xauthority utility must only permit access to authorized hosts.
<VulnDiscussion>If unauthorized clients are permitted access to the X server, a user's X session may be compromised.</VulnDiscussion>&l...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
X Window System connections that are not required must be disabled.
<VulnDiscussion>If unauthorized clients are permitted access to the X server, a user's X session may be compromised.</VulnDiscussion>&l...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The graphical login service provides the capability of logging into the system using an X-Windows type interface from the console. If graphical login access for the console is required, the service must be in local-only mode.
<VulnDiscussion>Externally accessible graphical desktop software may open the system to remote attacks.</VulnDiscussion><FalsePositi...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Generic Security Services (GSS) must be disabled.
<VulnDiscussion>This service should be disabled if it is not required.</VulnDiscussion><FalsePositives></FalsePositives><...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
Systems services that are not required must be disabled.
<VulnDiscussion>Services that are enabled but not required by the mission may provide excessive access or additional attack vectors to penetr...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
TCP Wrappers must be enabled and configured per site policy to only allow access by approved hosts and services.
<VulnDiscussion>TCP Wrappers are a host-based access control system that allows administrators to control who has access to various network s...Rule Medium Severity -
SRG-OS-000076
<GroupDescription></GroupDescription>Group -
User passwords must be changed at least every 60 days.
<VulnDiscussion>Limiting the lifespan of authenticators limits the period of time an unauthorized user has access to the system while using c...Rule Medium Severity -
SRG-OS-000002
<GroupDescription></GroupDescription>Group -
The operating system must automatically terminate temporary accounts within 72 hours.
<VulnDiscussion>If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...Rule Low Severity -
SRG-OS-000075
<GroupDescription></GroupDescription>Group -
The operating system must enforce minimum password lifetime restrictions.
<VulnDiscussion>Passwords need to be changed at specific policy-based intervals; however, if the information system or application allows the...Rule Medium Severity -
SRG-OS-000078
<GroupDescription></GroupDescription>Group -
User passwords must be at least 15 characters in length.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting guessing and brute-force attac...Rule Medium Severity -
SRG-OS-000072
<GroupDescription></GroupDescription>Group -
The system must require at least eight characters be changed between the old and new passwords during a password change.
<VulnDiscussion>To ensure password changes are effective in their goals, the system must ensure old and new passwords have significant differ...Rule Medium Severity -
SRG-OS-000069
<GroupDescription></GroupDescription>Group -
The system must require passwords to contain at least one uppercase alphabetic character.
<VulnDiscussion>Complex passwords can reduce the likelihood of success of automated password-guessing attacks.</VulnDiscussion><Fals...Rule Medium Severity -
SRG-OS-000070
<GroupDescription></GroupDescription>Group -
The operating system must enforce password complexity requiring that at least one lowercase character is used.
<VulnDiscussion>Complex passwords can reduce the likelihood of success of automated password-guessing attacks.</VulnDiscussion><Fals...Rule Medium Severity -
SRG-OS-000071
<GroupDescription></GroupDescription>Group -
The system must require passwords to contain at least one numeric character.
<VulnDiscussion>Complex passwords can reduce the likelihood of success of automated password-guessing attacks.</VulnDiscussion><Fals...Rule Medium Severity -
SRG-OS-000266
<GroupDescription></GroupDescription>Group -
The system must require passwords to contain at least one special character.
<VulnDiscussion>Complex passwords can reduce the likelihood of success of automated password-guessing attacks.</VulnDiscussion><Fals...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must require passwords to contain no more than three consecutive repeating characters.
<VulnDiscussion>Complex passwords can reduce the likelihood of success of automated password-guessing attacks.</VulnDiscussion><Fals...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The system must not have accounts configured with blank or null passwords.
<VulnDiscussion>Complex passwords can reduce the likelihood of success of automated password-guessing attacks.</VulnDiscussion><Fals...Rule Medium Severity -
SRG-OS-000073
<GroupDescription></GroupDescription>Group -
Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors.
<VulnDiscussion>Cryptographic hashes provide quick password authentication while not actually storing the password.</VulnDiscussion><...Rule Medium Severity -
SRG-OS-000021
<GroupDescription></GroupDescription>Group -
The system must disable accounts after three consecutive unsuccessful login attempts.
<VulnDiscussion>Allowing continued access to accounts on the system exposes them to brute-force password-guessing attacks.</VulnDiscussion...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The delay between login prompts following a failed login attempt must be at least 4 seconds.
<VulnDiscussion>As an immediate return of an error message, coupled with the capability to try again, may facilitate automatic and rapid-fire...Rule Medium Severity -
SRG-OS-000028
<GroupDescription></GroupDescription>Group -
The system must require users to re-authenticate to unlock a graphical desktop environment.
<VulnDiscussion>Allowing access to a graphical environment when the user is not attending the system can allow unauthorized users access to t...Rule Medium Severity -
SRG-OS-000029
<GroupDescription></GroupDescription>Group -
Graphical desktop environments provided by the system must automatically lock after 15 minutes of inactivity.
<VulnDiscussion>Allowing access to a graphical environment when the user is not attending the system can allow unauthorized users access to t...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.