III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000266-GPOS-00101
Group -
TOSS must enforce password complexity by requiring that at least one special character be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity or strength is a measure of the effectiveness of a password in resisting ...Rule Medium Severity -
SRG-OS-000297-GPOS-00115
Group -
A firewall must be installed on TOSS.
"Firewalld" provides an easy and effective way to block/limit remote access to the system via ports, services, and protocols. Remote access services, such as those providing remote access to netwo...Rule Medium Severity -
SRG-OS-000342-GPOS-00133
Group -
TOSS must take appropriate action when the internal event queue is full.
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity. TOS...Rule Medium Severity -
SRG-OS-000376-GPOS-00161
Group -
TOSS must accept Personal Identity Verification (PIV) credentials.
The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. The DoD has mandated the use of the Common Access Card (CAC) to support identity management and ...Rule Medium Severity -
SRG-OS-000393-GPOS-00173
Group -
TOSS must implement DoD-approved encryption in the OpenSSL package.
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an auth...Rule Medium Severity -
SRG-OS-000420-GPOS-00186
Group -
A firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring TOSS can implement rate-limiting measures on impacted network interfaces.
DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. This require...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
Group -
TOSS must implement non-executable data to protect its memory from unauthorized code execution.
Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory incl...Rule Medium Severity -
SRG-OS-000437-GPOS-00194
Group -
YUM must remove all software components after updated versions have been installed on TOSS.
Previous versions of software components that are not removed from the information system after updates have been installed may be exploited by adversaries. Some information technology products may...Rule Low Severity -
SRG-OS-000445-GPOS-00199
Group -
TOSS must enable the "SELinux" targeted policy.
Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...Rule Medium Severity -
SRG-OS-000480-GPOS-00225
Group -
TOSS must prevent the use of dictionary words for passwords.
If TOSS allows the user to select passwords based on dictionary words, then this increases the chances of password compromise by increasing the opportunity for successful guesses and brute-force at...Rule Medium Severity -
SRG-OS-000480-GPOS-00226
Group -
TOSS must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
A File Transfer Protocol (FTP) server package must not be installed unless mission essential on TOSS.
The FTP service provides an unencrypted remote access that does not provide for the confidentiality and integrity of user passwords or the remote session. If a privileged user were to log on using ...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
All TOSS local files and directories must have a valid group owner.
Files without a valid group owner may be unintentionally inherited if a group is assigned the same Group Identifier (GID) as the GID of the files without a valid group owner.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
All TOSS local files and directories must have a valid owner.
Unowned files and directories may be unintentionally inherited if a user is assigned the same User Identifier "UID" as the UID of the un-owned files.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Cron logging must be implemented in TOSS.
Cron logging can be used to trace the successful or unsuccessful execution of cron jobs. It can also be used to spot intrusions into the use of the cron facility by unauthorized and malicious users.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
If the Trivial File Transfer Protocol (TFTP) server is required, the TOSS TFTP daemon must be configured to operate in secure mode.
Restricting TFTP to a specific directory prevents remote users from copying, transferring, or overwriting system files.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The graphical display manager must not be installed on TOSS unless approved.
Internet services that are not required for system or application processes must not be active to decrease the attack surface of the system. Graphical display managers have a long history of securi...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The TOSS file integrity tool must be configured to verify Access Control Lists (ACLs).
ACLs can provide permissions beyond those permitted through the file mode and must be verified by file integrity tools. TOSS installation media come with a file integrity tool, Advanced Intrusion ...Rule Low Severity -
SRG-OS-000480-GPOS-00227
Group -
The TOSS file integrity tool must be configured to verify extended attributes.
Extended attributes in file systems are used to contain arbitrary data and file metadata with security implications. TOSS installation media come with a file integrity tool, Advanced Intrusion Det...Rule Low Severity -
SRG-OS-000480-GPOS-00227
Group -
The TOSS SSH daemon must perform strict mode checking of home directory configuration files.
If other users have access to modify user-specific SSH configuration files, they may be able to log on to the system as another user.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The TOSS SSH private host key files must have mode 0600 or less permissive.
If an unauthorized user obtains the private SSH host key file, the host could be impersonated.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The TOSS SSH public host key files must have mode 0644 or less permissive.
If a public host key file is modified by an unauthorized user, the SSH service may be compromised.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The x86 Ctrl-Alt-Delete key sequence must be disabled on TOSS.
A locally logged-on user, who presses Ctrl-Alt-Delete when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
TOSS must be a vendor-supported release.
An operating system release is considered "supported" if the vendor continues to provide security patches for the product. With an unsupported release, it will not be possible to resolve security i...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
TOSS must be configured to prevent unrestricted mail relaying.
If unrestricted mail relaying is permitted, unauthorized senders could use this host as a mail relay for the purpose of sending spam or other unauthorized activity.Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.