Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000399

    <GroupDescription></GroupDescription>
    Group
  • The VMM must request data origin authentication verification on the name/address resolution responses the system receives from authoritative sources.

    &lt;VulnDiscussion&gt;If data origin authentication and data integrity verification is not performed, the resultant response could be forged, it ma...
    Rule Medium Severity
  • SRG-OS-000400

    <GroupDescription></GroupDescription>
    Group
  • The VMM must request data integrity verification on the name/address resolution responses the system receives from authoritative sources.

    &lt;VulnDiscussion&gt; If data origin authentication and data integrity verification is not performed, the resultant response could be forged, it m...
    Rule Medium Severity
  • SRG-OS-000401

    <GroupDescription></GroupDescription>
    Group
  • The VMM must perform data integrity verification on the name/address resolution responses the system receives from authoritative sources.

    &lt;VulnDiscussion&gt;If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it m...
    Rule Medium Severity
  • SRG-OS-000402

    <GroupDescription></GroupDescription>
    Group
  • The VMM must perform data origin verification authentication on the name/address resolution responses the system receives from authoritative sources.

    &lt;VulnDiscussion&gt;If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it m...
    Rule Medium Severity
  • SRG-OS-000403

    <GroupDescription></GroupDescription>
    Group
  • The VMM must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.

    &lt;VulnDiscussion&gt;Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...
    Rule Medium Severity
  • SRG-OS-000404

    <GroupDescription></GroupDescription>
    Group
  • The VMM must implement cryptographic mechanisms to prevent unauthorized modification of all information at rest on all VMM components.

    &lt;VulnDiscussion&gt;VMMs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized modifica...
    Rule Medium Severity
  • SRG-OS-000405

    <GroupDescription></GroupDescription>
    Group
  • The VMM must implement cryptographic mechanisms to prevent unauthorized disclosure of all information at rest on all VMM components.

    &lt;VulnDiscussion&gt;VMMs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosu...
    Rule Medium Severity
  • SRG-OS-000408

    <GroupDescription></GroupDescription>
    Group
  • The VMM must maintain a separate execution domain for each executing process.

    &lt;VulnDiscussion&gt;VMMs can maintain separate execution domains for each executing process by assigning each process a separate address space. E...
    Rule Medium Severity
  • SRG-OS-000408

    <GroupDescription></GroupDescription>
    Group
  • The VMM must maintain a separate execution domain for each guest VM.

    &lt;VulnDiscussion&gt;VMMs can maintain separate execution domains for each executing guest VM by assigning each guest VM a separate address space....
    Rule Medium Severity
  • SRG-OS-000420

    <GroupDescription></GroupDescription>
    Group
  • The VMM must protect against or limit the effects of Denial of Service (DoS) attacks by ensuring the VMM is implementing rate-limiting measures on impacted network interfaces.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules