Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • The debug-shell systemd service must be disabled on TOSS.

    The debug-shell requires no authentication and provides root privileges to anyone who has physical access to the machine. While this feature is disabled by default, masking it adds an additional la...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The root account must be the only account having unrestricted access to the TOSS system.

    If an account other than root also has a User Identifier (UID) of "0", it has root authority, giving that account unrestricted access to the entire operating system. Multiple accounts with a UID of...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The systemd Ctrl-Alt-Delete burst key sequence in TOSS must be disabled.

    A locally logged-on user who presses Ctrl-Alt-Delete when at the console can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the r...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • There must be no ".shosts" files on The TOSS operating system.

    The ."shosts" files are used to configure host-based authentication for individual users or the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • TOSS must not allow blank or null passwords in the system-auth file.

    If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments.
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules