Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000228

    Group
  • Any publically accessible connection to the operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.

    Display of a standardized and approved use notification before granting access to the publicly accessible operating system ensures privacy and security notification verbiage used is consistent with...
    Rule Medium Severity
  • SRG-OS-000239

    Group
  • The operating system must audit all account modifications.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to modify an exi...
    Rule Medium Severity
  • SRG-OS-000240

    Group
  • The operating system must audit all account disabling actions.

    When operating system accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the operating system processes themselves. In ...
    Rule Medium Severity
  • SRG-OS-000241

    Group
  • The operating system must audit all account removal actions.

    When operating system accounts are removed, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the operating system processes themselves. In o...
    Rule Medium Severity
  • SRG-OS-000250

    Group
  • The operating system must implement cryptography to protect the integrity of remote access sessions.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an auth...
    Rule High Severity
  • SRG-OS-000254

    Group
  • The operating system must initiate session audits at system start-up.

    If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enab...
    Rule Medium Severity
  • SRG-OS-000255

    Group
  • The operating system must produce audit records containing information to establish the identity of any individual or process associated with the event.

    Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility...
    Rule Medium Severity
  • SRG-OS-000256

    Group
  • The operating system must protect audit tools from unauthorized access.

    Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...
    Rule Medium Severity
  • SRG-OS-000257

    Group
  • The operating system must protect audit tools from unauthorized modification.

    Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...
    Rule Medium Severity
  • SRG-OS-000258

    Group
  • The operating system must protect audit tools from unauthorized deletion.

    Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules