Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000126-GPOS-00066

    Group
  • The SUSE operating system SSH daemon must be configured with a timeout interval.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • The sticky bit must be set on all SUSE operating system world-writable directories.

    Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of ...
    Rule Medium Severity
  • SRG-OS-000142-GPOS-00071

    Group
  • The SUSE operating system must be configured to use TCP syncookies.

    Denial of Service (DoS) is a condition in which a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    Group
  • The SUSE operating system for all network connections associated with SSH traffic must immediately terminate at the end of the session or after 10 minutes of inactivity.

    Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of network connections associated with communications sessions (i.e., netwo...
    Rule Medium Severity
  • SRG-OS-000185-GPOS-00079

    Group
  • All SUSE operating system persistent disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.

    SUSE operating systems handling data requiring data-at-rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest. Selecti...
    Rule High Severity
  • SRG-OS-000205-GPOS-00083

    Group
  • The SUSE operating system must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    Any operating system providing too much information in error messages risks compromising the data and security of the structure, and content of error messages needs to be carefully considered by th...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    Group
  • The SUSE operating system must prevent unauthorized users from accessing system error messages.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the SUSE operating system o...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The SUSE operating system library files must have mode 0755 or less permissive.

    If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The SUSE operating system library directories must have mode 0755 or less permissive.

    If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The SUSE operating system library files must be owned by root.

    If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The SUSE operating system library directories must be owned by root.

    If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The SUSE operating system library files must be group-owned by root.

    If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The SUSE operating system library directories must be group-owned by root.

    If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The SUSE operating system must have system commands set to a mode of 0755 or less permissive.

    If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The SUSE operating system must have directories that contain system commands set to a mode of 0755 or less permissive.

    If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The SUSE operating system must have system commands owned by root.

    If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The SUSE operating system must have directories that contain system commands owned by root.

    If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The SUSE operating system must have system commands group-owned by root or a system account.

    If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The SUSE operating system must have directories that contain system commands group-owned by root.

    If the SUSE operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are ...
    Rule Medium Severity
  • SRG-OS-000298-GPOS-00116

    Group
  • The SUSE operating system must have a firewall system installed to immediately disconnect or disable remote access to the whole operating system.

    Operating system remote access functionality must have the capability to immediately disconnect current users remotely accessing the information system and/or disable further remote access. The spe...
    Rule Medium Severity
  • SRG-OS-000299-GPOS-00117

    Group
  • The SUSE operating system wireless network adapters must be disabled unless approved and documented.

    Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unprotected communications can be intercepted and either read, altered, or u...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00122

    Group
  • SUSE operating system AppArmor tool must be configured to control whitelisted applications and user home directory access control.

    Using a whitelist provides a configuration management method for allowing the execution of only authorized software. Using only authorized software decreases risk by limiting the number of potentia...
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    Group
  • The SUSE operating system clock must, for networked systems, be synchronized to an authoritative DOD time source at least every 24 hours.

    Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when condu...
    Rule Medium Severity
  • SRG-OS-000359-GPOS-00146

    Group
  • The SUSE operating system must be configured to use Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).

    If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the SUSE operating system include date and...
    Rule Low Severity
  • SRG-OS-000363-GPOS-00150

    Group
  • Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.

    Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized access to the SUSE operating system. Changes to SUSE operating system co...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules