II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000471-GPOS-00216
Group -
The Photon operating system must be configured to audit the loading and unloading of dynamic kernel modules.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-OS-000478-GPOS-00223
Group -
The Photon operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating system must implement cryptographic modules adhering to the higher stand...Rule High Severity -
SRG-OS-000480-GPOS-00225
Group -
The Photon operating system must prevent the use of dictionary words for passwords.
If the operating system allows the user to select passwords based on dictionary words, then this increases the chances of password compromise by increasing the opportunity for successful guesses an...Rule Medium Severity -
SRG-OS-000480-GPOS-00226
Group -
The Photon operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt in login.defs.
Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Photon operating system must ensure audit events are flushed to disk at proper intervals.
Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. To that en...Rule Medium Severity -
SRG-OS-000480-GPOS-00228
Group -
The Photon operating system must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary access.Rule Medium Severity -
SRG-OS-000480-GPOS-00229
Group -
The Photon operating system must configure Secure Shell (SSH) to disallow HostbasedAuthentication.
SSH trust relationships enable trivial lateral spread after a host compromise and therefore must be explicitly disabled.Rule High Severity -
SRG-OS-000021-GPOS-00005
Group -
The Photon operating system must be configured to use the pam_faillock.so module.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
Group -
The Photon operating system must prevent leaking information of the existence of a user account.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
Group -
The Photon operating system must audit logon attempts for unknown users.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
Group -
The Photon operating system must include root when automatically locking an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
Group -
The Photon operating system must persist lockouts between system reboots.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...Rule Medium Severity -
SRG-OS-000069-GPOS-00037
Group -
The Photon operating system must be configured to use the pam_pwquality.so module.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Medium Severity -
SRG-OS-000366-GPOS-00153
Group -
The Photon operating system TDNF package management tool must cryptographically verify the authenticity of all software packages during installation for all repos.
Installation of any nontrusted software, patches, service packs, device drivers, or operating system components can significantly affect the overall security of the operating system. This requireme...Rule High Severity -
SRG-OS-000032-GPOS-00013
Group -
The Photon operating system must configure the Secure Shell (SSH) SyslogFacility.
Automated monitoring of remote access sessions allows organizations to detect cyber attacks and ensure ongoing compliance with remote access policies by auditing connection activities. Shipping SS...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
Group -
The Photon operating system must enable Secure Shell (SSH) authentication logging.
Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with remote access policies by auditing connection activities. The INFO Log...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
Group -
The Photon operating system must terminate idle Secure Shell (SSH) sessions.
Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...Rule Medium Severity -
SRG-OS-000239-GPOS-00089
Group -
The Photon operating system must audit all account modifications.
Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to modify an exis...Rule Medium Severity -
SRG-OS-000480-GPOS-00226
Group -
The Photon operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.Rule Medium Severity -
SRG-OS-000480-GPOS-00229
Group -
The Photon operating system must configure Secure Shell (SSH) to disallow authentication with an empty password.
Blank passwords are one of the first things an attacker checks for when probing a system. Even if the user somehow has a blank password on the OS, SSH must not allow that user to log in.Rule High Severity -
SRG-OS-000480-GPOS-00229
Group -
The Photon operating system must configure Secure Shell (SSH) to disable user environment processing.
Enabling user environment processing may enable users to bypass access restrictions in some configurations and must therefore be disabled.Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
The Photon operating system must create a home directory for all new local interactive user accounts.
If local interactive users are not assigned a valid home directory, there is no place for the storage and control of files they should own.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Photon operating system must disable the debug-shell service.
The debug-shell service is intended to diagnose systemd related boot issues with various systemctl commands. Once enabled and following a system reboot, the root shell will be available on tty9. Th...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Photon operating system must configure Secure Shell (SSH) to disallow Generic Security Service Application Program Interface (GSSAPI) authentication.
GSSAPI authentication is used to provide additional authentication mechanisms to applications. Allowing GSSAPI authentication through Secure Shell (SSH) exposes the system's GSSAPI to remote hosts,...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Photon operating system must configure Secure Shell (SSH) to disable X11 forwarding.
X11 is an older, insecure graphics forwarding protocol. It is not used by Photon and should be disabled as a general best practice to limit attack surface area and communication channels.Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.