DISA_STIG_SLES_12_v3r1.audit from DISA SLES 12 v3r1 STIG | |
SLES-12-010000 - The SUSE operating system must be a vendor-supported release. | SYSTEM AND INFORMATION INTEGRITY |
SLES-12-010010 - Vendor-packaged SUSE operating system security patches and updates must be installed and up to date. | SYSTEM AND INFORMATION INTEGRITY |
SLES-12-010020 - The SUSE operating system must display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access to the local graphical user interface. | ACCESS CONTROL |
SLES-12-010030 - The SUSE operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting access via local console. | ACCESS CONTROL |
SLES-12-010040 - The SUSE operating system must display a banner before granting local or remote access to the system via a graphical user logon. | ACCESS CONTROL |
SLES-12-010050 - The SUSE operating system must display the approved Standard Mandatory DoD Notice before granting local or remote access to the system via a graphical user logon. | ACCESS CONTROL |
SLES-12-010060 - The SUSE operating system must be able to lock the graphical user interface (GUI). | ACCESS CONTROL |
SLES-12-010070 - The SUSE operating system must utilize vlock to allow for session locking. | ACCESS CONTROL |
SLES-12-010080 - The SUSE operating system must initiate a session lock after a 15-minute period of inactivity for the graphical user interface. | ACCESS CONTROL |
SLES-12-010090 - The SUSE operating system must initiate a session lock after a 10-minute period of inactivity. | ACCESS CONTROL |
SLES-12-010100 - The SUSE operating system must conceal, via the session lock, information previously visible on the display with a publicly viewable image in the graphical user interface. | ACCESS CONTROL |
SLES-12-010109 - The SUSE operating system must specify the default 'include' directory for the /etc/sudoers file - include directory for the /etc/sudoers file. | CONFIGURATION MANAGEMENT |
SLES-12-010110 - The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010111 - The SUSE operating system must restrict privilege elevation to authorized personnel. | CONFIGURATION MANAGEMENT |
SLES-12-010112 - The SUSE operating system must use the invoking user's password for privilege escalation when using 'sudo' - sudo. | ACCESS CONTROL |
SLES-12-010113 - The SUSE operating system must require re-authentication when using the 'sudo' command - sudo command. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010114 - The SUSE operating system must not be configured to bypass password requirements for privilege escalation. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010120 - The SUSE operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types. | ACCESS CONTROL |
SLES-12-010130 - The SUSE operating system must lock an account after three consecutive invalid access attempts. | ACCESS CONTROL |
SLES-12-010140 - The SUSE operating system must enforce a delay of at least four (4) seconds between logon prompts following a failed logon attempt. | CONFIGURATION MANAGEMENT |
SLES-12-010150 - The SUSE operating system must enforce passwords that contain at least one upper-case character. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010160 - The SUSE operating system must enforce passwords that contain at least one lower-case character. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010170 - The SUSE operating system must enforce passwords that contain at least one numeric character. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010180 - The SUSE operating system must enforce passwords that contain at least one special character. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010190 - The SUSE operating system must require the change of at least eight (8) of the total number of characters when passwords are changed. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010210 - The SUSE operating system must employ FIPS 140-2 approved cryptographic hashing algorithm for system authentication (login.defs). | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010220 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010221 - The SUSE operating system must not have accounts configured with blank or null passwords. | CONFIGURATION MANAGEMENT |
SLES-12-010230 - The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010231 - The SUSE operating system must not be configured to allow blank or null passwords. | CONFIGURATION MANAGEMENT |
SLES-12-010240 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010250 - The SUSE operating system must employ passwords with a minimum of 15 characters. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010260 - The SUSE operating system must be configured to create or update passwords with a minimum lifetime of 24 hours (one day). | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010270 - The SUSE operating system must employ user passwords with a minimum lifetime of 24 hours (one day). | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010280 - The SUSE operating system must be configured to create or update passwords with a maximum lifetime of 60 days. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010290 - The SUSE operating system must employ user passwords with a maximum lifetime of 60 days. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010320 - The SUSE operating system must prevent the use of dictionary words for passwords. | CONFIGURATION MANAGEMENT |
SLES-12-010330 - The SUSE operating system must never automatically remove or disable emergency administrator accounts. | ACCESS CONTROL |
SLES-12-010331 - The SUSE operating system must automatically expire temporary accounts within 72 hours. | ACCESS CONTROL |
SLES-12-010340 - The SUSE operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity after password expiration. | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010370 - The SUSE operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt. | CONFIGURATION MANAGEMENT |
SLES-12-010375 - The SUSE operating system must restrict access to the kernel message buffer. | SYSTEM AND COMMUNICATIONS PROTECTION |
SLES-12-010380 - The SUSE operating system must not allow unattended or automatic logon via the graphical user interface. | CONFIGURATION MANAGEMENT |
SLES-12-010390 - The SUSE operating system must display the date and time of the last successful account logon upon logon. | ACCESS CONTROL |
SLES-12-010400 - There must be no .shosts files on the SUSE operating system. | CONFIGURATION MANAGEMENT |
SLES-12-010410 - There must be no shosts.equiv files on the SUSE operating system. | CONFIGURATION MANAGEMENT |
SLES-12-010420 - FIPS 140-2 mode must be enabled on the SUSE operating system. | SYSTEM AND COMMUNICATIONS PROTECTION |
SLES-12-010430 - SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes. | ACCESS CONTROL |
SLES-12-010440 - SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance. | ACCESS CONTROL |