III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000104-GPOS-00051
Group -
Certificate Name Filtering must be implemented with appropriate authorization and documentation.
To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
Group -
Expired digital certificates must not be used.
The longer and more often a key is used, the more susceptible it is to loss or discovery. This weakens the assurance provided to a relying Party that the unique binding between a key and its named ...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
Group -
All digital certificates in use must have a valid path to a trusted certification authority (CA).
The origin of a certificate, or the CA, is crucial in determining if the certificate should be trusted. An approved CA establishes grounds for confidence at both ends of communications sessions in ...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
Group -
IBM RACF must limit Write or greater access to SYS1.NUCLEUS to system programmers only.
This data set contains a large portion of the system initialization (IPL) programs and pointers to the master and alternate master catalog. Unauthorized access could result in the compromise of the...Rule High Severity -
SRG-OS-000080-GPOS-00048
Group -
IBM RACF must limit Write or greater access to libraries that contain PPT modules to system programmers only.
Specific PPT designated program modules possess significant security bypass capabilities. Unauthorized access could result in the compromise of the operating system environment, ACP, and customer d...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.