Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000076-GPOS-00044

    Group
  • The Photon operating systems must enforce a 90-day maximum password lifetime restriction.

    Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...
    Rule Medium Severity
  • SRG-OS-000077-GPOS-00045

    Group
  • The Photon operating system must prohibit password reuse for a minimum of five generations.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • The Photon operating system must enforce a minimum 15-character password length.

    The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The Photon operating system must require authentication upon booting into single-user and maintenance modes.

    If the system does not require authentication before it boots into single-user mode, anyone with console access to the system can trivially access all files on the system. GRUB2 is the boot loader ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The Photon operating system must disable unnecessary kernel modules.

    It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooke...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • The Photon operating system must not have duplicate User IDs (UIDs).

    To ensure accountability and prevent unauthenticated access, organizational users must be uniquely identified and authenticated to prevent potential misuse and provide for nonrepudiation.
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    Group
  • The Photon operating system must use mechanisms meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.

    Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide confidentiality or integrity, and DOD data may be ...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • The Photon operating system must restrict access to the kernel message buffer.

    Restricting access to the kernel message buffer limits access only to root. This prevents attackers from gaining additional system information as a nonprivileged user.
    Rule Medium Severity
  • SRG-OS-000142-GPOS-00071

    Group
  • The Photon operating system must be configured to use TCP syncookies.

    A TCP SYN flood attack can cause a Denial of Service (DOS) by filling a system's TCP connection table with connections in the SYN_RCVD state. Syncookies can be used to track a connection when a sub...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    Group
  • The Photon operating system must terminate idle Secure Shell (SSH) sessions after 15 minutes.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules