Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000478

    Group
  • The operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.

    Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating system must implement cryptographic modules adhering to the higher stand...
    Rule High Severity
  • SRG-OS-000479

    Group
  • The operating system must, at a minimum, off-load audit data from interconnected systems in real time and off-load audit data from standalone systems weekly.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • The operating system must prevent the use of dictionary words for passwords.

    If the operating system allows the user to select passwords based on dictionary words, then this increases the chances of password compromise by increasing the opportunity for successful guesses an...
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • The operating system must enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.

    Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • The operating system must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security ba...
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • The operating system must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.

    Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary access.
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • The operating system must not allow an unattended or automatic logon to the system.

    Failure to restrict system access to authenticated users negatively impacts operating system security.
    Rule High Severity
  • SRG-OS-000480

    Group
  • The operating system must limit the ability of non-privileged users to grant other users direct access to the contents of their home directories/folders.

    Users' home directories/folders may contain information of a sensitive nature. Non-privileged users should coordinate any sharing of information with an SA through shared resources.
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • The operating system must enable an application firewall, if available.

    Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Application firewalls limit which applications are allowed to communicate over the network.
    Rule Medium Severity
  • SRG-OS-000481

    Group
  • The operating system must protect the confidentiality and integrity of communications with wireless peripherals.

    Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unprotected communications can be intercepted and either read, altered, or u...
    Rule High Severity
  • SRG-OS-000439

    Group
  • The operating system must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    Security flaws with operating systems are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (includin...
    Rule Medium Severity
  • SRG-OS-000590

    Group
  • The operating system must disable accounts when the accounts are no longer associated to a user.

    Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality which reduce the attack surface of the system.
    Rule Medium Severity
  • SRG-OS-000690

    Group
  • The operating system must prohibit the use or connection of unauthorized hardware components.

    Hardware components provide the foundation for organizational systems and the platform for the execution of authorized software programs. Managing the inventory of hardware components and controlli...
    Rule Medium Severity
  • SRG-OS-000705

    Group
  • The operating system must implement multifactor authentication for local, network, and/or remote access to privileged accounts and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.

    The purpose of requiring a device separate from the system to which the user is attempting to gain access for one of the factors during multifactor authentication is to reduce the likelihood of com...
    Rule Medium Severity
  • SRG-OS-000710

    Group
  • The operating system must, for password-based authentication, verify when users create or update passwords the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • SRG-OS-000720

    Group
  • The operating system must for password-based authentication, require immediate selection of a new password upon account recovery.

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • SRG-OS-000725

    Group
  • The operating system must for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • SRG-OS-000730

    Group
  • The operating system must, for password-based authentication, employ automated tools to assist the user in selecting strong password authenticators.

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • SRG-OS-000745

    Group
  • The operating system must accept only external credentials that are NIST-compliant.

    Acceptance of only NIST-compliant external authenticators applies to organizational systems that are accessible to the public (e.g., public-facing websites). External authenticators are issued by n...
    Rule Medium Severity
  • SRG-OS-000755

    Group
  • The operating system must monitor the use of maintenance tools that execute with increased privilege.

    Maintenance tools that execute with increased system privilege can result in unauthorized access to organizational information and assets that would otherwise be inaccessible.
    Rule Medium Severity
  • SRG-OS-000775

    Group
  • The operating system must include only approved trust anchors in trust stores or certificate stores managed by the organization.

    Public key infrastructure (PKI) certificates are certificates with visibility external to organizational systems and certificates related to the internal operations of systems, such as application-...
    Rule Medium Severity
  • SRG-OS-000780

    Group
  • The operating system must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.

    A Trusted Platform Module (TPM) is an example of a hardware-protected data store that can be used to protect cryptographic keys.
    Rule Medium Severity
  • SRG-OS-000785

    Group
  • The operating system must synchronize system clocks within and between systems or system components.

    Time synchronization of system clocks is essential for the correct execution of many system services, including identification and authentication processes that involve certificates and time-of-day...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules