Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must define default permissions for logon and non-logon shells.

    The umask controls the default access mode assigned to newly created files. A umask of 077 limits new files to mode 600 or less permissive. Although umask can be represented as a four-digit number,...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must disable access to network bpf syscall from unprivileged processes.

    It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooke...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must enable hardening for the Berkeley Packet Filter Just-in-time compiler.

    It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooke...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must enable the hardware random number generator entropy gatherer service.

    The most important characteristic of a random number generator is its randomness, namely its ability to deliver random numbers that are impossible to predict. Entropy in computer security is associ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must ensure the SSH server uses strong entropy.

    The most important characteristic of a random number generator is its randomness, namely its ability to deliver random numbers that are impossible to predict. Entropy in computer security is associ...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must have the packages required to use the hardware random number generator entropy gatherer service.

    The most important characteristic of a random number generator is its randomness, namely its ability to deliver random numbers that are impossible to predict. Entropy in computer security is associ...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.

    ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the host's route table and are unauthenticated. An ill...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.

    ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the host's route table and are unauthenticated. An ill...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must not accept router advertisements on all IPv6 interfaces by default.

    Routing protocol daemons are typically used on routers to exchange network topology information with other routers. If this software is used when not required, system network information may be unn...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must not accept router advertisements on all IPv6 interfaces.

    Routing protocol daemons are typically used on routers to exchange network topology information with other routers. If this software is used when not required, system network information may be unn...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules