Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000108

    <GroupDescription></GroupDescription>
    Group
  • The VMM must use multifactor authentication for local access to nonprivileged accounts.

    &lt;VulnDiscussion&gt; To assure accountability, prevent unauthenticated access, and prevent misuse of the system, privileged users must utilize mu...
    Rule Medium Severity
  • SRG-OS-000109

    <GroupDescription></GroupDescription>
    Group
  • The VMM must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.

    &lt;VulnDiscussion&gt; To assure individual accountability and prevent unauthorized access, organizational users shall be individually identified a...
    Rule Medium Severity
  • SRG-OS-000112

    <GroupDescription></GroupDescription>
    Group
  • The VMM must implement replay-resistant authentication mechanisms for network access to privileged accounts.

    &lt;VulnDiscussion&gt;A replay attack may enable an unauthorized user to gain access to the VMM. Authentication sessions between the authenticator ...
    Rule Medium Severity
  • SRG-OS-000113

    <GroupDescription></GroupDescription>
    Group
  • The VMM must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.

    &lt;VulnDiscussion&gt;A replay attack may enable an unauthorized user to gain access to the VMM. Authentication sessions between the authenticator ...
    Rule Medium Severity
  • SRG-OS-000114

    <GroupDescription></GroupDescription>
    Group
  • The VMM must uniquely identify peripherals before establishing a connection.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Per...
    Rule Medium Severity
  • SRG-OS-000118

    <GroupDescription></GroupDescription>
    Group
  • The VMM must disable local account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.

    &lt;VulnDiscussion&gt;Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potenti...
    Rule Medium Severity
  • SRG-OS-000120

    <GroupDescription></GroupDescription>
    Group
  • The VMM must use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.

    &lt;VulnDiscussion&gt;Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be r...
    Rule Medium Severity
  • SRG-OS-000122

    <GroupDescription></GroupDescription>
    Group
  • The VMM must support an audit reduction capability that supports on-demand reporting requirements.

    &lt;VulnDiscussion&gt;The ability to generate on-demand reports, including after the audit data has been subjected to audit reduction, greatly faci...
    Rule Medium Severity
  • SRG-OS-000123

    <GroupDescription></GroupDescription>
    Group
  • The VMM must automatically remove or disable emergency accounts after the crisis is resolved or 72 hours.

    &lt;VulnDiscussion&gt;Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid ac...
    Rule Medium Severity
  • SRG-OS-000125

    <GroupDescription></GroupDescription>
    Group
  • The VMM must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.

    &lt;VulnDiscussion&gt;If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the syst...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules