Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must disable directed broadcast packet forwarding.

    &lt;VulnDiscussion&gt;This parameter must be disabled to reduce the risk of denial of service attacks.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not respond to ICMP timestamp requests.

    &lt;VulnDiscussion&gt;By accurately determining the system's clock state, an attacker can more effectively attack certain time-based pseudorandom n...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not respond to ICMP broadcast timestamp requests.

    &lt;VulnDiscussion&gt;By accurately determining the system's clock state, an attacker can more effectively attack certain time-based pseudorandom n...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not respond to ICMP broadcast netmask requests.

    &lt;VulnDiscussion&gt;By determining the netmasks of various computers in your network, an attacker can better map your subnet structure and infer ...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not respond to broadcast ICMP echo requests.

    &lt;VulnDiscussion&gt;ICMP echo requests can be useful for reconnaissance of systems and for denial of service attacks.&lt;/VulnDiscussion&gt;&lt;F...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must not respond to multicast echo requests.

    &lt;VulnDiscussion&gt;Multicast echo requests can be useful for reconnaissance of systems and for denial of service attacks.&lt;/VulnDiscussion&gt;...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must ignore ICMP redirect messages.

    &lt;VulnDiscussion&gt;Ignoring ICMP redirect messages reduces the likelihood of denial of service attacks.&lt;/VulnDiscussion&gt;&lt;FalsePositives...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must set strict multihoming.

    &lt;VulnDiscussion&gt;These settings control whether a packet arriving on a non-forwarding interface can be accepted for an IP address that is not ...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must disable ICMP redirect messages.

    &lt;VulnDiscussion&gt;A malicious user can exploit the ability of the system to send ICMP redirects by continually sending packets to the system, f...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must disable TCP reverse IP source routing.

    &lt;VulnDiscussion&gt;If enabled, reverse IP source routing would allow an attacker to more easily complete a three-way TCP handshake and spoof new...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules