No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
The Photon operating system must audit all account creations.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
The Photon operating system must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
<GroupDescription></GroupDescription>Group -
The Photon operating system must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the operating system ensures privacy and se...Rule Medium Severity -
SRG-OS-000027-GPOS-00008
<GroupDescription></GroupDescription>Group -
The Photon operating system must limit the number of concurrent sessions to ten for all accounts and/or account types.
<VulnDiscussion>Operating system management includes the ability to control the number of users and user sessions that utilize an operating s...Rule Low Severity -
SRG-OS-000032-GPOS-00013
<GroupDescription></GroupDescription>Group -
The Photon operating system must monitor remote access logins.
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and information systems, which lack automate...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
The Photon operating system must have the OpenSSL FIPS provider installed to protect the confidentiality of remote access sessions.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule High Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The Photon operating system must configure auditd to log to disk.
<VulnDiscussion>Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events ...Rule Medium Severity -
SRG-OS-000039-GPOS-00017
<GroupDescription></GroupDescription>Group -
The Photon operating system must enable the auditd service.
<VulnDiscussion>Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...Rule Medium Severity -
SRG-OS-000042-GPOS-00020
<GroupDescription></GroupDescription>Group -
The Photon operating system must be configured to audit the execution of privileged functions.
<VulnDiscussion>Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external enti...Rule Medium Severity -
SRG-OS-000046-GPOS-00022
<GroupDescription></GroupDescription>Group -
The Photon operating system must alert the ISSO and SA in the event of an audit processing failure.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The Photon operating system must protect audit logs from unauthorized access.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
<GroupDescription></GroupDescription>Group -
The Photon operating system must allow only authorized users to configure the auditd service.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Photon operating system must generate audit records when successful/unsuccessful attempts to access privileges occur.
<VulnDiscussion>The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise ...Rule Medium Severity -
SRG-OS-000069-GPOS-00037
<GroupDescription></GroupDescription>Group -
The Photon operating system must enforce password complexity by requiring that at least one uppercase character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-OS-000070-GPOS-00038
<GroupDescription></GroupDescription>Group -
The Photon operating system must enforce password complexity by requiring that at least one lowercase character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-OS-000071-GPOS-00039
<GroupDescription></GroupDescription>Group -
The Photon operating system must enforce password complexity by requiring that at least one numeric character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-OS-000072-GPOS-00040
<GroupDescription></GroupDescription>Group -
The Photon operating system must require the change of at least eight characters when passwords are changed.
<VulnDiscussion> If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances o...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
<GroupDescription></GroupDescription>Group -
The operating system must store only encrypted representations of passwords.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule High Severity -
SRG-OS-000074-GPOS-00042
<GroupDescription></GroupDescription>Group -
The Photon operating system must not have the telnet package installed.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule High Severity -
SRG-OS-000075-GPOS-00043
<GroupDescription></GroupDescription>Group -
The Photon operating system must enforce one day as the minimum password lifetime.
<VulnDiscussion>Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enfo...Rule Medium Severity -
SRG-OS-000076-GPOS-00044
<GroupDescription></GroupDescription>Group -
The Photon operating systems must enforce a 90-day maximum password lifetime restriction.
<VulnDiscussion>Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the ...Rule Medium Severity -
SRG-OS-000077-GPOS-00045
<GroupDescription></GroupDescription>Group -
The Photon operating system must prohibit password reuse for a minimum of five generations.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-OS-000078-GPOS-00046
<GroupDescription></GroupDescription>Group -
The Photon operating system must enforce a minimum 15-character password length.
<VulnDiscussion>The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
The Photon operating system must require authentication upon booting into single-user and maintenance modes.
<VulnDiscussion>If the system does not require authentication before it boots into single-user mode, anyone with console access to the system...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The Photon operating system must disable unnecessary kernel modules.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.