Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000426

    Group
  • The operating system must maintain the confidentiality and integrity of information during reception.

    Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during packing/un...
    Rule Medium Severity
  • SRG-OS-000432

    Group
  • The operating system must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.

    A common vulnerability of operating system is unpredictable behavior when invalid inputs are received. This requirement guards against adverse or unintended system behavior caused by invalid inputs...
    Rule Medium Severity
  • SRG-OS-000433

    Group
  • The operating system must implement non-executable data to protect its memory from unauthorized code execution.

    Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory incl...
    Rule Medium Severity
  • SRG-OS-000433

    Group
  • The operating system must implement address space layout randomization to protect its memory from unauthorized code execution.

    Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory incl...
    Rule Medium Severity
  • SRG-OS-000437

    Group
  • The operating system must remove all software components after updated versions have been installed.

    Previous versions of software components that are not removed from the information system after updates have been installed may be exploited by adversaries. Some information technology products may...
    Rule Medium Severity
  • SRG-OS-000445

    Group
  • The operating system must verify correct operation of all security functions.

    Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...
    Rule Medium Severity
  • SRG-OS-000446

    Group
  • The operating system must perform verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days.

    Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...
    Rule Medium Severity
  • SRG-OS-000447

    Group
  • The operating system must shut down the information system, restart the information system, and/or notify the system administrator when anomalies in the operation of any security functions are discovered.

    If anomalies are not acted upon, security functions may fail to secure the system. Security function is defined as the hardware, software, and/or firmware of the information system responsible fo...
    Rule Medium Severity
  • SRG-OS-000458

    Group
  • The operating system must generate audit records when successful/unsuccessful attempts to access security objects occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000461

    Group
  • The operating system must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000462

    Group
  • The operating system must generate audit records when successful/unsuccessful attempts to modify privileges occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000463

    Group
  • The operating system must generate audit records when successful/unsuccessful attempts to modify security objects occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000465

    Group
  • The operating system must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000466

    Group
  • The operating system must generate audit records when successful/unsuccessful attempts to delete privileges occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000467

    Group
  • The operating system must generate audit records when successful/unsuccessful attempts to delete security levels occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000468

    Group
  • The operating system must generate audit records when successful/unsuccessful attempts to delete security objects occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000470

    Group
  • The operating system must generate audit records when successful/unsuccessful logon attempts occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000471

    Group
  • The operating system must generate audit records for privileged activities or other system-level access.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000471

    Group
  • The audit system must be configured to audit the loading and unloading of dynamic kernel modules.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000472

    Group
  • The operating system must generate audit records showing starting and ending time for user access to the system.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000473

    Group
  • The operating system must generate audit records when concurrent logons to the same account occur from different sources.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000474

    Group
  • The operating system must generate audit records when successful/unsuccessful accesses to objects occur.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000475

    Group
  • The operating system must generate audit records for all direct access to the information system.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000476

    Group
  • The operating system must generate audit records for all account creations, modifications, disabling, and termination events.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000477

    Group
  • The operating system must generate audit records for all kernel module load, unload, and restart actions, and also for all program initiations.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules