I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000242
<GroupDescription></GroupDescription>Group -
All interactions between guest VMs and external systems, via other interface devices, must be mediated by the VMM or its service VMs.
<VulnDiscussion>Mechanisms to detect and prevent unauthorized communication flow must be configured or provided as part of the VMM design. If...Rule Medium Severity -
SRG-OS-000250
<GroupDescription></GroupDescription>Group -
The VMM must implement cryptography to protect the integrity of remote access sessions.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule Medium Severity -
SRG-OS-000254
<GroupDescription></GroupDescription>Group -
The VMM must initiate session audits at system startup.
<VulnDiscussion>If auditing is enabled late in the startup process, the actions of some start-up processes may not be audited. Some audit sys...Rule Medium Severity -
SRG-OS-000255
<GroupDescription></GroupDescription>Group -
The VMM must produce audit records containing information to establish the identity of any individual or process associated with the event.
<VulnDiscussion>Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associ...Rule Medium Severity -
SRG-OS-000256
<GroupDescription></GroupDescription>Group -
The VMM must protect audit tools from unauthorized access.
<VulnDiscussion> Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pr...Rule Medium Severity -
SRG-OS-000257
<GroupDescription></GroupDescription>Group -
The VMM must protect audit tools from unauthorized modification.
<VulnDiscussion>Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...Rule Medium Severity -
SRG-OS-000258
<GroupDescription></GroupDescription>Group -
The VMM must protect audit tools from unauthorized deletion.
<VulnDiscussion>Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...Rule Medium Severity -
SRG-OS-000259
<GroupDescription></GroupDescription>Group -
The VMM must limit privileges to change software resident within software libraries.
<VulnDiscussion>If the VMM were to allow any user to make changes to software libraries, then those changes might be implemented without unde...Rule Medium Severity -
SRG-OS-000266
<GroupDescription></GroupDescription>Group -
The VMM must enforce password complexity by requiring that at least one special character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity o...Rule Medium Severity -
SRG-OS-000269
<GroupDescription></GroupDescription>Group -
In the event of a system failure, the VMM must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.
<VulnDiscussion> Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. F...Rule Medium Severity -
SRG-OS-000274
<GroupDescription></GroupDescription>Group -
The VMM must notify system administrators (SAs) and information system security officers (ISSOs) when accounts are created.
<VulnDiscussion>Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestab...Rule Medium Severity -
SRG-OS-000275
<GroupDescription></GroupDescription>Group -
The VMM must notify the system administrator (SA) and information system security officer (ISSO) when accounts are modified.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000276
<GroupDescription></GroupDescription>Group -
The VMM must notify the system administrator (SA) and information system security officer (ISSO) when accounts are disabled.
<VulnDiscussion>When VMM accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual VMM users or...Rule Medium Severity -
SRG-OS-000277
<GroupDescription></GroupDescription>Group -
The VMM must notify the system administrator (SA) and information system security officer (ISSO) when accounts are removed.
<VulnDiscussion>When VMM accounts are removed, user accessibility is affected. Accounts are utilized for identifying individual VMM users or ...Rule Medium Severity -
SRG-OS-000278
<GroupDescription></GroupDescription>Group -
The VMM must use cryptographic mechanisms to protect the integrity of audit tools.
<VulnDiscussion>Protecting the integrity of the tools used for auditing purposes is a critical step towards ensuring the integrity of audit d...Rule Medium Severity -
SRG-OS-000279
<GroupDescription></GroupDescription>Group -
The VMM must automatically terminate a user session after inactivity timeouts have expired or at shutdown.
<VulnDiscussion>Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...Rule Medium Severity -
SRG-OS-000280
<GroupDescription></GroupDescription>Group -
VMMs requiring user access authentication must provide a logout capability for user-initiated communications sessions.
<VulnDiscussion>If a user cannot explicitly end a VMM session, the session may remain open and be exploited by an attacker; this is referred ...Rule Medium Severity -
SRG-OS-000281
<GroupDescription></GroupDescription>Group -
The VMM must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
<VulnDiscussion> If a user cannot explicitly end a VMM session, the session may remain open and be exploited by an attacker; this is referred...Rule Medium Severity -
SRG-OS-000297
<GroupDescription></GroupDescription>Group -
The VMM must control remote access methods.
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and VMMs, which lack automated control capab...Rule Medium Severity -
SRG-OS-000298
<GroupDescription></GroupDescription>Group -
The VMM must provide the capability to immediately disconnect or disable remote access to the information system.
<VulnDiscussion>Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking place would not ...Rule Medium Severity -
SRG-OS-000299
<GroupDescription></GroupDescription>Group -
The VMM must protect wireless access to the system using encryption.
<VulnDiscussion>Allowing devices and users to connect to the system without first authenticating them allows untrusted access and can lead to...Rule Medium Severity -
SRG-OS-000300
<GroupDescription></GroupDescription>Group -
The VMM must protect wireless access to the system using authentication of users and/or devices.
<VulnDiscussion>Allowing devices and users to connect to the system without first authenticating them allows untrusted access and can lead to...Rule Medium Severity -
SRG-OS-000303
<GroupDescription></GroupDescription>Group -
The VMM must automatically audit account enabling actions.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000304
<GroupDescription></GroupDescription>Group -
The VMM must notify the system administrator (SA) and information system security officer (ISSO) of account enabling actions.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000312
<GroupDescription></GroupDescription>Group -
The VMM must implement discretionary access controls to allow VMM admins to pass information to any other VMM admin, user, or guest VM.
<VulnDiscussion> Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have d...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.