Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the truncate system call in TOSS must generate an audit record.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000256-GPOS-00097

    <GroupDescription></GroupDescription>
    Group
  • TOSS audit tools must be owned by "root".

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000278-GPOS-00108

    <GroupDescription></GroupDescription>
    Group
  • TOSS must use cryptographic mechanisms to protect the integrity of audit tools.

    &lt;VulnDiscussion&gt;Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit in...
    Rule Medium Severity
  • SRG-OS-000303-GPOS-00120

    <GroupDescription></GroupDescription>
    Group
  • TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/group".

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000303-GPOS-00120

    <GroupDescription></GroupDescription>
    Group
  • TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/gshadow".

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000303-GPOS-00120

    <GroupDescription></GroupDescription>
    Group
  • TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/passwd".

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000303-GPOS-00120

    <GroupDescription></GroupDescription>
    Group
  • TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/security/opasswd".

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000303-GPOS-00120

    <GroupDescription></GroupDescription>
    Group
  • TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000303-GPOS-00120

    <GroupDescription></GroupDescription>
    Group
  • TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/".

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000326-GPOS-00126

    <GroupDescription></GroupDescription>
    Group
  • The TOSS audit system must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.

    &lt;VulnDiscussion&gt;In certain situations, software applications/programs need to execute with elevated privileges to perform required functions....
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules