Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the creat system call in TOSS must generate an audit record.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the fchmod system call in TOSS must generate an audit record.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the fchmodat system call in TOSS must generate an audit record.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the fchown system call in TOSS must generate an audit record.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the fchownat system call in TOSS must generate an audit record.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the ftruncate system call system call in TOSS must generate an audit record.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the lchown system call in TOSS must generate an audit record.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the open system call in TOSS must generate an audit record.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the open_by_handle_at system call system call in TOSS must generate an audit record.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the openat system call in TOSS must generate an audit record.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the truncate system call in TOSS must generate an audit record.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000256-GPOS-00097

    <GroupDescription></GroupDescription>
    Group
  • TOSS audit tools must be owned by "root".

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000278-GPOS-00108

    <GroupDescription></GroupDescription>
    Group
  • TOSS must use cryptographic mechanisms to protect the integrity of audit tools.

    &lt;VulnDiscussion&gt;Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit in...
    Rule Medium Severity
  • SRG-OS-000303-GPOS-00120

    <GroupDescription></GroupDescription>
    Group
  • TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/group".

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000303-GPOS-00120

    <GroupDescription></GroupDescription>
    Group
  • TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/gshadow".

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000303-GPOS-00120

    <GroupDescription></GroupDescription>
    Group
  • TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/passwd".

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000303-GPOS-00120

    <GroupDescription></GroupDescription>
    Group
  • TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/security/opasswd".

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000303-GPOS-00120

    <GroupDescription></GroupDescription>
    Group
  • TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000303-GPOS-00120

    <GroupDescription></GroupDescription>
    Group
  • TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/".

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000326-GPOS-00126

    <GroupDescription></GroupDescription>
    Group
  • The TOSS audit system must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.

    &lt;VulnDiscussion&gt;In certain situations, software applications/programs need to execute with elevated privileges to perform required functions....
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    <GroupDescription></GroupDescription>
    Group
  • TOSS must allocate audit record storage capacity to store at least one week's worth of audit records, when audit records are not immediately sent to a central audit record storage facility.

    &lt;VulnDiscussion&gt;In order to ensure TOSS systems have a sufficient storage capacity in which to write the audit logs, TOSS needs to be able to...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • The TOSS audit records must be offloaded onto a different system or storage media from the system being audited.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • TOSS must label all off-loaded audit logs before sending them to the central log server.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it...
    Rule Medium Severity
  • SRG-OS-000458-GPOS-00203

    <GroupDescription></GroupDescription>
    Group
  • The TOSS audit system must be configured to audit any usage of the "fsetxattr" system call.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000458-GPOS-00203

    <GroupDescription></GroupDescription>
    Group
  • The TOSS audit system must be configured to audit any usage of the "lsetxattr" system call.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules