Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must include root when automatically locking an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.

    &lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must persist lockouts between system reboots.

    &lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-OS-000069-GPOS-00037

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must be configured to use the pam_pwquality.so module.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000366-GPOS-00153

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system TDNF package management tool must cryptographically verify the authenticity of all software packages during installation for all repos.

    &lt;VulnDiscussion&gt;Installation of any nontrusted software, patches, service packs, device drivers, or operating system components can significa...
    Rule High Severity
  • SRG-OS-000032-GPOS-00013

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must configure the Secure Shell (SSH) SyslogFacility.

    &lt;VulnDiscussion&gt;Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must enable Secure Shell (SSH) authentication logging.

    &lt;VulnDiscussion&gt;Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must terminate idle Secure Shell (SSH) sessions.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-OS-000239-GPOS-00089

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must audit all account modifications.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00226

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.

    &lt;VulnDiscussion&gt;Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain acc...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The Photon operating system must configure Secure Shell (SSH) to disallow authentication with an empty password.

    &lt;VulnDiscussion&gt;Blank passwords are one of the first things an attacker checks for when probing a system. Even if the user somehow has a blan...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules