Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must not allow blank or null passwords in the password-auth file.

    If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments.
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.

    ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages contain information from the system's route table, possibly r...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must not forward IPv4 source-routed packets by default.

    Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security me...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must not forward IPv4 source-routed packets.

    Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security me...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must not forward IPv6 source-routed packets by default.

    Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security me...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must not forward IPv6 source-routed packets.

    Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security me...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.

    Responding to broadcast ICMP echoes facilitates network mapping and provides a vector for amplification attacks. There are notable differences between Internet Protocol version 4 (IPv4) and Intern...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must not send Internet Control Message Protocol (ICMP) redirects.

    ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages contain information from the system's route table, possibly r...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.

    ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the host's route table and are unauthenticated. An ill...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.

    ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the host's route table and are unauthenticated. An ill...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules