III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
Group -
If the Trivial File Transfer Protocol (TFTP) server is required, the TOSS TFTP daemon must be configured to operate in secure mode.
Restricting TFTP to a specific directory prevents remote users from copying, transferring, or overwriting system files.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The graphical display manager must not be installed on TOSS unless approved.
Internet services that are not required for system or application processes must not be active to decrease the attack surface of the system. Graphical display managers have a long history of securi...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The TOSS file integrity tool must be configured to verify Access Control Lists (ACLs).
ACLs can provide permissions beyond those permitted through the file mode and must be verified by file integrity tools. TOSS installation media come with a file integrity tool, Advanced Intrusion ...Rule Low Severity -
SRG-OS-000480-GPOS-00227
Group -
The TOSS file integrity tool must be configured to verify extended attributes.
Extended attributes in file systems are used to contain arbitrary data and file metadata with security implications. TOSS installation media come with a file integrity tool, Advanced Intrusion Det...Rule Low Severity -
SRG-OS-000480-GPOS-00227
Group -
The TOSS SSH daemon must perform strict mode checking of home directory configuration files.
If other users have access to modify user-specific SSH configuration files, they may be able to log on to the system as another user.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The TOSS SSH private host key files must have mode 0600 or less permissive.
If an unauthorized user obtains the private SSH host key file, the host could be impersonated.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The TOSS SSH public host key files must have mode 0644 or less permissive.
If a public host key file is modified by an unauthorized user, the SSH service may be compromised.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The x86 Ctrl-Alt-Delete key sequence must be disabled on TOSS.
A locally logged-on user, who presses Ctrl-Alt-Delete when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
TOSS must be a vendor-supported release.
An operating system release is considered "supported" if the vendor continues to provide security patches for the product. With an unsupported release, it will not be possible to resolve security i...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
TOSS must be configured to prevent unrestricted mail relaying.
If unrestricted mail relaying is permitted, unauthorized senders could use this host as a mail relay for the purpose of sending spam or other unauthorized activity.Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.