Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000004

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit account creation.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000239

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit account modification.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000240

    <GroupDescription></GroupDescription>
    Group
  • The operating system must automatically audit account disabling actions.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000241

    <GroupDescription></GroupDescription>
    Group
  • The operating system must automatically audit account termination.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must ensure unauthorized, security-relevant configuration changes detected are tracked.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit all administrative, privileged, and security actions.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Medium Severity
  • SRG-OS-000032

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit login, logout, and session initiation.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit failed attempts to access files and programs.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Low Severity
  • SRG-OS-000061

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect against an individual falsely denying having performed a particular action. In order to do so the system must be configured to send audit records to a remote audit server.

    &lt;VulnDiscussion&gt;Keeping audit records on a remote system reduces the likelihood of audit records being changed or corrupted. Duplicating and ...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The auditing system must not define a different auditing level for specific users.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules