III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
TOSS must not be performing packet forwarding unless the system is a router.
<VulnDiscussion>Routing protocol daemons are typically used on routers to exchange network topology information with other routers. If this s...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The TOSS SSH daemon must not allow authentication using known host's authentication.
<VulnDiscussion>Configuring this setting for the SSH daemon provides additional assurance that remote logon via SSH will require a password, ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The TOSS SSH daemon must not allow compression or must only allow compression after successful authentication.
<VulnDiscussion>If compression is allowed in an SSH connection prior to authentication, vulnerabilities in the compression software could res...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The TOSS SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.
<VulnDiscussion>Configuring these settings for the SSH daemon provides additional assurance that remote logon via SSH will not use unused met...Rule Medium Severity -
SRG-OS-000480-GPOS-00229
<GroupDescription></GroupDescription>Group -
TOSS must not allow an unattended or automatic logon to the system.
<VulnDiscussion>Failure to restrict system access to authenticated users negatively impacts operating system security.</VulnDiscussion>...Rule High Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
TOSS must enforce the limit of five consecutive invalid logon attempts by a user during a 15-minute time period.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-OS-000027-GPOS-00008
<GroupDescription></GroupDescription>Group -
TOSS must limit the number of concurrent sessions to 256 for all accounts and/or account types.
<VulnDiscussion>Operating system management includes the ability to control the number of users and user sessions that utilize an operating s...Rule Low Severity -
SRG-OS-000028-GPOS-00009
<GroupDescription></GroupDescription>Group -
TOSS must retain a user's session lock until that user reestablishes access using established identification and authentication procedures.
<VulnDiscussion>A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...Rule Medium Severity -
SRG-OS-000029-GPOS-00010
<GroupDescription></GroupDescription>Group -
TOSS must automatically lock graphical user sessions after 15 minutes of inactivity.
<VulnDiscussion>A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...Rule Medium Severity -
SRG-OS-000068-GPOS-00036
<GroupDescription></GroupDescription>Group -
TOSS must map the authenticated identity to the user or group account for PKI-based authentication.
<VulnDiscussion>Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the indivi...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.