Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000396

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ FIPS-validate or NSA-approved cryptography to implement digital signatures.

    &lt;VulnDiscussion&gt;FIPS 140-2 is the current standard for validating cryptographic modules, and NSA Type-X (where X=1, 2, 3, 4) products are NSA...
    Rule Medium Severity
  • SRG-OS-000423

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect the integrity of transmitted information.

    &lt;VulnDiscussion&gt;Ensuring the integrity of transmitted information requires the operating system take feasible measures to employ transmission...
    Rule Medium Severity
  • SRG-OS-000424

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ cryptographic mechanisms to recognize changes to information during transmission unless otherwise protected by alternative physical measures.

    &lt;VulnDiscussion&gt;Ensuring that transmitted information is not altered during transmission requires the operating system take feasible measures...
    Rule Medium Severity
  • SRG-OS-000425

    <GroupDescription></GroupDescription>
    Group
  • The operating system must maintain the integrity of information during aggregation, packaging, and transformation in preparation for transmission.

    &lt;VulnDiscussion&gt;Ensuring the integrity of transmitted information requires the operating system take feasible measures to employ transmission...
    Rule Medium Severity
  • SRG-OS-000423

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect the confidentiality of transmitted information.

    &lt;VulnDiscussion&gt;Ensuring the confidentiality of transmitted information requires the operating system take feasible measures to employ transm...
    Rule Medium Severity
  • SRG-OS-000424

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical measures.

    &lt;VulnDiscussion&gt;Ensuring that transmitted information does not become disclosed to unauthorized entities requires the operating system take f...
    Rule Medium Severity
  • SRG-OS-000425

    <GroupDescription></GroupDescription>
    Group
  • The operating system must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission.

    &lt;VulnDiscussion&gt;Ensuring that transmitted information remains confidential during aggregation, packaging, and transformation requires the ope...
    Rule Medium Severity
  • SRG-OS-000404

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ cryptographic mechanisms to protect information in storage.

    &lt;VulnDiscussion&gt;When data is written to digital media, such as hard drives, mobile computers, external/removable hard drives, personal digita...
    Rule Low Severity
  • SRG-OS-000404

    <GroupDescription></GroupDescription>
    Group
  • The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information at rest unless otherwise protected by alternative physical measures.

    &lt;VulnDiscussion&gt;When data is written to digital media, such as hard drives, mobile computers, external/removable hard drives, personal digita...
    Rule Low Severity
  • SRG-OS-000423

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect the integrity of transmitted information.

    &lt;VulnDiscussion&gt;Ensuring the integrity of transmitted information requires the operating system take feasible measures to employ transmission...
    Rule Medium Severity
  • SRG-OS-000327

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect the audit records resulting from non-local accesses to privileged accounts and the execution of privileged functions.

    &lt;VulnDiscussion&gt;Protection of audit records and audit data is of critical importance. Care must be taken to ensure privileged users cannot ci...
    Rule Medium Severity
  • SRG-OS-000356

    <GroupDescription></GroupDescription>
    Group
  • The operating system must synchronize internal information system clocks with a server that is synchronized to one of the redundant United States Naval Observatory (USNO) time servers or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).

    &lt;VulnDiscussion&gt;To assure the accuracy of the system clock, it must be synchronized with an authoritative time source within DOD. Many system...
    Rule Medium Severity
  • SRG-OS-000445

    <GroupDescription></GroupDescription>
    Group
  • The operating system must verify the correct operation of security functions in accordance with organization-defined conditions and in accordance with organization-defined frequency (if periodic verification).

    &lt;VulnDiscussion&gt;Security functional testing involves testing the operating system for conformance to the operating system security function s...
    Rule Medium Severity
  • SRG-OS-000324

    <GroupDescription></GroupDescription>
    Group
  • The operating system must prevent non-privileged users from circumventing malicious code protection capabilities.

    &lt;VulnDiscussion&gt;In order to minimize potential negative impact to the organization caused by malicious code, it is imperative that malicious ...
    Rule Medium Severity
  • SRG-OS-000445

    <GroupDescription></GroupDescription>
    Group
  • The operating system must identify potentially security-relevant error conditions.

    &lt;VulnDiscussion&gt;Security functional testing involves testing the operating system for conformance to the operating system security function s...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The sshd server must bind the X11 forwarding server to the loopback address.

    &lt;VulnDiscussion&gt;As enabling X11 Forwarding on the host can permit a malicious user to secretly open another X11 connection to another remote ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules