Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000254

    Group
  • The operating system must initiate session audits at system start-up.

    If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enab...
    Rule Medium Severity
  • SRG-OS-000255

    Group
  • The operating system must produce audit records containing information to establish the identity of any individual or process associated with the event.

    Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility...
    Rule Medium Severity
  • SRG-OS-000256

    Group
  • The operating system must protect audit tools from unauthorized access.

    Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...
    Rule Medium Severity
  • SRG-OS-000257

    Group
  • The operating system must protect audit tools from unauthorized modification.

    Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...
    Rule Medium Severity
  • SRG-OS-000258

    Group
  • The operating system must protect audit tools from unauthorized deletion.

    Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...
    Rule Medium Severity
  • SRG-OS-000259

    Group
  • The operating system must limit privileges to change software resident within software libraries.

    If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part...
    Rule Medium Severity
  • SRG-OS-000266

    Group
  • The operating system must enforce password complexity by requiring that at least one special character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity or strength is a measure of the effectiveness of a password in resisting ...
    Rule Medium Severity
  • SRG-OS-000269

    Group
  • In the event of a system failure, the operating system must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.

    Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Failure to a known secure state helps prevent a loss of confidentiality, i...
    Rule Medium Severity
  • SRG-OS-000274

    Group
  • The operating system must notify system administrators and ISSOs when accounts are created.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to create a new ...
    Rule Medium Severity
  • SRG-OS-000275

    Group
  • The operating system must notify system administrators and ISSOs when accounts are modified.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to modify an exi...
    Rule Medium Severity
  • SRG-OS-000276

    Group
  • The operating system must notify system administrators and ISSOs when accounts are disabled.

    When operating system accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual operating system users or for identifying the operating system processe...
    Rule Medium Severity
  • SRG-OS-000277

    Group
  • The operating system must notify system administrators and ISSOs when accounts are removed.

    When operating system accounts are removed, user accessibility is affected. Accounts are utilized for identifying individual operating system users or for identifying the operating system processes...
    Rule Medium Severity
  • SRG-OS-000278

    Group
  • The operating system must use cryptographic mechanisms to protect the integrity of audit tools.

    Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit information. Audit information includes all information (e.g., audit recor...
    Rule High Severity
  • SRG-OS-000279

    Group
  • The operating system must automatically terminate a user session after inactivity time-outs have expired or at shutdown.

    Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i....
    Rule Medium Severity
  • SRG-OS-000280

    Group
  • The operating system must provide a logoff capability for user-initiated communications sessions when requiring user access authentication.

    If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Information resources to which us...
    Rule Medium Severity
  • SRG-OS-000281

    Group
  • The operating system must display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions.

    If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Users need to be aware of whether ...
    Rule Medium Severity
  • SRG-OS-000297

    Group
  • The operating system must control remote access methods.

    Remote access services, such as those providing remote access to network devices and information systems, which lack automated control capabilities, increase risk and make remote user access manage...
    Rule Medium Severity
  • SRG-OS-000298

    Group
  • The operating system must provide the capability to immediately disconnect or disable remote access to the operating system.

    Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking place would not be immediately stopped. Operating system remote access functionality mu...
    Rule Medium Severity
  • SRG-OS-000299

    Group
  • The operating system must protect wireless access to and from the system using encryption.

    Allowing devices and users to connect to or from the system without first authenticating them allows untrusted access and can lead to a compromise or attack. Since wireless communications can be in...
    Rule Medium Severity
  • SRG-OS-000300

    Group
  • The operating system must protect wireless access to the system using authentication of users and/or devices.

    Allowing devices and users to connect to the system without first authenticating them allows untrusted access and can lead to a compromise or attack. Wireless technologies include, for example, mi...
    Rule Medium Severity
  • SRG-OS-000303

    Group
  • The operating system must audit all account enabling actions.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to enable a new ...
    Rule Medium Severity
  • SRG-OS-000304

    Group
  • The operating system must notify system administrators (SAs) and information system security officers (ISSOs) of account enabling actions.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to enable an exis...
    Rule Medium Severity
  • SRG-OS-000312

    Group
  • The operating system must allow operating system admins to pass information to any other operating system admin or user.

    Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which...
    Rule Medium Severity
  • SRG-OS-000312

    Group
  • The operating system must allow operating system admins to grant their privileges to other operating system admins.

    Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which...
    Rule Medium Severity
  • SRG-OS-000312

    Group
  • The operating system must allow operating system admins to change security attributes on users, the operating system, or the operating systems components.

    Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules