Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • The debug-shell systemd service must be disabled on TOSS.

    The debug-shell requires no authentication and provides root privileges to anyone who has physical access to the machine. While this feature is disabled by default, masking it adds an additional la...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The root account must be the only account having unrestricted access to the TOSS system.

    If an account other than root also has a User Identifier (UID) of "0", it has root authority, giving that account unrestricted access to the entire operating system. Multiple accounts with a UID of...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The systemd Ctrl-Alt-Delete burst key sequence in TOSS must be disabled.

    A locally logged-on user who presses Ctrl-Alt-Delete when at the console can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the r...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • There must be no ".shosts" files on The TOSS operating system.

    The ."shosts" files are used to configure host-based authentication for individual users or the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must not allow blank or null passwords in the system-auth file.

    If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments.
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must not be performing packet forwarding unless the system is a router.

    Routing protocol daemons are typically used on routers to exchange network topology information with other routers. If this software is used when not required, system network information may be unn...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The TOSS SSH daemon must not allow authentication using known host's authentication.

    Configuring this setting for the SSH daemon provides additional assurance that remote logon via SSH will require a password, even in the event of misconfiguration elsewhere.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The TOSS SSH daemon must not allow compression or must only allow compression after successful authentication.

    If compression is allowed in an SSH connection prior to authentication, vulnerabilities in the compression software could result in compromise of the system from an unauthenticated connection, pote...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The TOSS SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.

    Configuring these settings for the SSH daemon provides additional assurance that remote logon via SSH will not use unused methods of authentication, even in the event of misconfiguration elsewhere.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    Group
  • TOSS must not allow an unattended or automatic logon to the system.

    Failure to restrict system access to authenticated users negatively impacts operating system security.
    Rule High Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • TOSS must enforce the limit of five consecutive invalid logon attempts by a user during a 15-minute time period.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...
    Rule Medium Severity
  • SRG-OS-000027-GPOS-00008

    Group
  • TOSS must limit the number of concurrent sessions to 256 for all accounts and/or account types.

    Operating system management includes the ability to control the number of users and user sessions that utilize an operating system. Limiting the number of allowed users and sessions per user is hel...
    Rule Low Severity
  • SRG-OS-000028-GPOS-00009

    Group
  • TOSS must retain a user's session lock until that user reestablishes access using established identification and authentication procedures.

    A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not want to log out because of the temporary...
    Rule Medium Severity
  • SRG-OS-000029-GPOS-00010

    Group
  • TOSS must automatically lock graphical user sessions after 15 minutes of inactivity.

    A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporar...
    Rule Medium Severity
  • SRG-OS-000068-GPOS-00036

    Group
  • TOSS must map the authenticated identity to the user or group account for PKI-based authentication.

    Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis. There a...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • TOSS duplicate User IDs (UIDs) must not exist for interactive users.

    To ensure accountability and prevent unauthenticated access, interactive users must be identified and authenticated to prevent potential misuse and compromise of the system. Interactive users incl...
    Rule Medium Severity
  • SRG-OS-000105-GPOS-00052

    Group
  • TOSS must use multifactor authentication for network and local access to privileged and nonprivileged accounts.

    Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased. Multifactor authentication requires using two or more factors to achieve authenticat...
    Rule Medium Severity
  • SRG-OS-000118-GPOS-00060

    Group
  • TOSS must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.

    Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts...
    Rule Medium Severity
  • SRG-OS-000123-GPOS-00064

    Group
  • TOSS must automatically remove or disable emergency accounts after the crisis is resolved or 72 hours.

    Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activation may...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    Group
  • TOSS must reveal error messages only to authorized users.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...
    Rule Medium Severity
  • SRG-OS-000299-GPOS-00117

    Group
  • TOSS must protect wireless access to the system using authentication of users and/or devices.

    Allowing devices and users to connect to the system without first authenticating them allows untrusted access and can lead to a compromise or attack. Wireless technologies include, for example, mi...
    Rule Medium Severity
  • SRG-OS-000329-GPOS-00128

    Group
  • TOSS must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes occur.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the a...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    Group
  • TOSS must require users to reauthenticate for privilege escalation.

    Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, ...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00157

    Group
  • TOSS must require users to provide a password for privilege escalation.

    Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • All TOSS local interactive user accounts must be assigned a home directory upon creation.

    If local interactive users are not assigned a valid home directory, there is no place for the storage and control of files they should own.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules