Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000037-GPOS-00015

    Group
  • The OL 8 audit package must be installed.

    Without establishing what type of events occurred and their source, location, and outcome, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attac...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    Group
  • OL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.

    Without establishing what type of events occurred and their source, location, and outcome, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attac...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • OL 8 must be a vendor-supported release.

    Configuring the operating system to implement organization-wide security implementation guides and security checklists verifies compliance with federal standards and establishes a common security b...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • OL 8 vendor-packaged system security patches and updates must be installed and up to date.

    Timely patching is critical for maintaining the operational availability, confidentiality, and integrity of information technology (IT) systems. However, failure to keep operating system and applic...
    Rule Medium Severity
  • SRG-OS-000033-GPOS-00014

    Group
  • OL 8 must implement NIST FIPS-validated cryptography for the following: To provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.

    Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The operating system must implement cryptographic modules adhering to the higher standards...
    Rule High Severity
  • SRG-OS-000185-GPOS-00079

    Group
  • All OL 8 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.

    OL 8 systems handling data requiring "data-at-rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest. Selection of ...
    Rule High Severity
  • SRG-OS-000023-GPOS-00006

    Group
  • OL 8 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via an SSH logon.

    Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbiage used is consistent with applicable federal ...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    Group
  • OL 8 must display a banner before granting local or remote access to the system via a graphical user logon.

    Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbiage used is consistent with applicable federal ...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    Group
  • OL 8 must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon.

    Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbiage used is consistent with applicable federal ...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    Group
  • OL 8 must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a command line user logon.

    Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbiage used is consistent with applicable federal ...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    Group
  • All OL 8 remote access methods must be monitored.

    Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities increase risk and make remote user access mana...
    Rule Medium Severity
  • SRG-OS-000066-GPOS-00034

    Group
  • OL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

    Without path validation, the relying party cannot make an informed trust decision when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entity re...
    Rule Medium Severity
  • SRG-OS-000067-GPOS-00035

    Group
  • OL 8, for certificate-based authentication, must enforce authorized access to the corresponding private key.

    If an unauthorized user obtains access to a private key without a passcode, that user would have unauthorized access to any system where the associated public key has been installed.
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • OL 8 must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • OL 8 must employ FIPS 140-2 approved cryptographic hashing algorithms for all stored passwords.

    The system must use a strong hashing algorithm to store the password. Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords ar...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • The OL 8 shadow password suite must be configured to use a sufficient number of hashing rounds.

    The system must use a strong hashing algorithm to store the password. The system must use a sufficient number of hashing rounds to ensure the required level of entropy. Passwords need to be prot...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.

    If the system does not require valid authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all file...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.

    If the system does not require valid authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all file...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • OL 8 operating systems booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.

    If the system does not require valid authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all file...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • OL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.

    If the system does not require valid authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all file...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • OL 8 operating systems must require authentication upon booting into rescue mode.

    If the system does not require valid root authentication before it boots into emergency or rescue mode, anyone who invokes emergency or rescue mode is granted privileged access to all files on the ...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • OL 8 operating systems must require authentication upon booting into emergency mode.

    If the system does not require valid root authentication before it boots into emergency or rescue mode, anyone who invokes emergency or rescue mode is granted privileged access to all files on the ...
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    Group
  • The OL 8 "pam_unix.so" module must be configured in the system-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.

    Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied on to provide confidentiality or integrity, and DoD data may be co...
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    Group
  • The OL 8 "pam_unix.so" module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.

    Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied on to provide confidentiality or integrity, and DoD data may be co...
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    Group
  • OL 8 must prevent system daemons from using Kerberos for authentication.

    Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied on to provide confidentiality or integrity, and DoD data may be co...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules