Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000073

    <GroupDescription></GroupDescription>
    Group
  • Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors.

    &lt;VulnDiscussion&gt;Cryptographic hashes provide quick password authentication while not actually storing the password.&lt;/VulnDiscussion&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000021

    <GroupDescription></GroupDescription>
    Group
  • The system must disable accounts after three consecutive unsuccessful login attempts.

    &lt;VulnDiscussion&gt;Allowing continued access to accounts on the system exposes them to brute-force password-guessing attacks.&lt;/VulnDiscussion...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The delay between login prompts following a failed login attempt must be at least 4 seconds.

    &lt;VulnDiscussion&gt;As an immediate return of an error message, coupled with the capability to try again, may facilitate automatic and rapid-fire...
    Rule Medium Severity
  • SRG-OS-000028

    <GroupDescription></GroupDescription>
    Group
  • The system must require users to re-authenticate to unlock a graphical desktop environment.

    &lt;VulnDiscussion&gt;Allowing access to a graphical environment when the user is not attending the system can allow unauthorized users access to t...
    Rule Medium Severity
  • SRG-OS-000029

    <GroupDescription></GroupDescription>
    Group
  • Graphical desktop environments provided by the system must automatically lock after 15 minutes of inactivity.

    &lt;VulnDiscussion&gt;Allowing access to a graphical environment when the user is not attending the system can allow unauthorized users access to t...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The system must prevent the use of dictionary words for passwords.

    &lt;VulnDiscussion&gt;The use of common words in passwords simplifies password-cracking attacks.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/F...
    Rule Medium Severity
  • SRG-OS-000109

    <GroupDescription></GroupDescription>
    Group
  • The operating system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.

    &lt;VulnDiscussion&gt;Allowing any user to elevate their privileges can allow them excessive control of the system tools.&lt;/VulnDiscussion&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The default umask for system and users must be 077.

    &lt;VulnDiscussion&gt;Setting a very secure default value for umask ensures that users make a conscious choice about their file permissions.&lt;/Vu...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The default umask for FTP users must be 077.

    &lt;VulnDiscussion&gt;Setting a very secure default value for umask ensures that users make a conscious choice about their file permissions.&lt;/Vu...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The value mesg n must be configured as the default setting for all users.

    &lt;VulnDiscussion&gt;The "mesg n" command blocks attempts to use the "write" or "talk" commands to contact users at their terminals, but has the s...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules