Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must restrict exposed kernel pointer addresses access.

    It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooke...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must restrict privilege elevation to authorized personnel.

    The sudo command allows a user to execute programs with elevated (administrator) privileges. It prompts the user for their password and confirms the request to execute a command by checking a file,...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must use reverse path filtering on all IPv4 interfaces.

    It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooke...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS network interfaces must not be in promiscuous mode.

    Network interfaces in promiscuous mode allow for the capture of all network traffic visible to the system. If unauthorized individuals can access these applications, it may allow them to collect in...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00122

    Group
  • TOSS must enable kernel parameters to enforce discretionary access control on symlinks.

    Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00122

    Group
  • TOSS must enable kernel parameters to enforce discretionary access control on hardlinks.

    Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules