III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000476
<GroupDescription></GroupDescription>Group -
The VMM must generate audit records for all account creations, modifications, disabling, and termination events.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000477
<GroupDescription></GroupDescription>Group -
The VMM must generate audit records for all module load, unload, and restart actions, and also for all program and guest VM initiations.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000478
<GroupDescription></GroupDescription>Group -
The VMM must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VMM must i...Rule Medium Severity -
SRG-OS-000479
<GroupDescription></GroupDescription>Group -
The VMM must, at a minimum, off-load interconnected systems in real time and off-load standalone systems weekly.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The VMM must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
<VulnDiscussion>Configuring the VMM to implement organization-wide security implementation guides and security checklists ensures compliance ...Rule Medium Severity -
SRG-OS-000481
<GroupDescription></GroupDescription>Group -
The VMM must protect the confidentiality and integrity of communications with wireless peripherals.
<VulnDiscussion>Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unpr...Rule Medium Severity -
SRG-OS-000590
<GroupDescription></GroupDescription>Group -
The VMM must disable accounts when the accounts are no longer associated to a user.
<VulnDiscussion>Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality...Rule Medium Severity -
SRG-OS-000690
<GroupDescription></GroupDescription>Group -
The VMM must prohibit the use or connection of unauthorized hardware components.
<VulnDiscussion>Hardware components provide the foundation for organizational systems and the platform for the execution of authorized softwa...Rule Medium Severity -
SRG-OS-000705
<GroupDescription></GroupDescription>Group -
The VMM must implement multifactor authentication for local, network, and/or remote access to privileged accounts and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
<VulnDiscussion>The purpose of requiring a device separate from the system to which the user is attempting to gain access for one of the fact...Rule Medium Severity -
SRG-OS-000710
<GroupDescription></GroupDescription>Group -
The VMM must for password-based authentication, verify when users create or update passwords the passwords are not found on the list of commonly-used, expected, or compromised passwords in ia-5 (1) (a).
<VulnDiscussion>Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...Rule Medium Severity -
SRG-OS-000720
<GroupDescription></GroupDescription>Group -
The VMM must for password-based authentication, require immediate selection of a new password upon account recovery.
<VulnDiscussion>Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...Rule Medium Severity -
SRG-OS-000725
<GroupDescription></GroupDescription>Group -
The VMM must for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.
<VulnDiscussion>Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...Rule Medium Severity -
SRG-OS-000730
<GroupDescription></GroupDescription>Group -
The VMM must for password-based authentication, employ automated tools to assist the user in selecting strong password authenticators.
<VulnDiscussion>Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authen...Rule Medium Severity -
SRG-OS-000745
<GroupDescription></GroupDescription>Group -
The VMM must accept only external credentials that are NIST-compliant.
<VulnDiscussion>Acceptance of only NIST-compliant external authenticators applies to organizational systems that are accessible to the public...Rule Medium Severity -
SRG-OS-000755
<GroupDescription></GroupDescription>Group -
The VMM must monitor the use of maintenance tools that execute with increased privilege.
<VulnDiscussion>Maintenance tools that execute with increased system privilege can result in unauthorized access to organizational informatio...Rule Medium Severity -
SRG-OS-000775
<GroupDescription></GroupDescription>Group -
The VMM must include only approved trust anchors in trust stores or certificate stores managed by the organization.
<VulnDiscussion>Public key infrastructure (PKI) certificates are certificates with visibility external to organizational systems and certific...Rule Medium Severity -
SRG-OS-000780
<GroupDescription></GroupDescription>Group -
The VMM must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
<VulnDiscussion>A Trusted Platform Module (TPM) is an example of a hardware-protected data store that can be used to protect cryptographic ke...Rule Medium Severity -
SRG-OS-000785
<GroupDescription></GroupDescription>Group -
The VMM must synchronize system clocks within and between systems or system components.
<VulnDiscussion>Time synchronization of system clocks is essential for the correct execution of many system services, including identificatio...Rule Medium Severity -
SRG-OS-000805
<GroupDescription></GroupDescription>Group -
The VMM must employ automated patch management tools to facilitate flaw remediation to the organization-defined system components.
<VulnDiscussion>Using automated tools to support patch management helps to ensure the timeliness and completeness of system patching operatio...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.