Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000471-GPOS-00216

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must be configured to audit the loading and unloading of dynamic kernel modules.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000478-GPOS-00223

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating ...
    Rule High Severity
  • SRG-OS-000480-GPOS-00225

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must prevent the use of dictionary words for passwords.

    &lt;VulnDiscussion&gt;If the operating system allows the user to select passwords based on dictionary words, then this increases the chances of pas...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00226

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt in login.defs.

    &lt;VulnDiscussion&gt;Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain acc...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must ensure audit events are flushed to disk at proper intervals.

    &lt;VulnDiscussion&gt;Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00228

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.

    &lt;VulnDiscussion&gt;Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary acce...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must configure Secure Shell (SSH) to disallow HostbasedAuthentication.

    &lt;VulnDiscussion&gt;SSH trust relationships enable trivial lateral spread after a host compromise and therefore must be explicitly disabled.&lt;/...
    Rule High Severity
  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must be configured to use the pam_faillock.so module.

    &lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must prevent leaking information of the existence of a user account.

    &lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must audit logon attempts for unknown users.

    &lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules