DISA SLES 12 STIG v2r13

Audit Details

Name: DISA SLES 12 STIG v2r13

Updated: 3/25/2024

Authority: DISA STIG

Plugin: Unix

Revision: 1.1

Estimated Item Count: 216

File Details

Filename: DISA_STIG_SLES_12_v2r13.audit

Size: 549 kB

MD5: 9ba057b7fd65ef362f88c2ea5d38385a
SHA256: 549a1b0106d54727c993710fb61c1cddc24debe519454e03dad0227fd5f18292

Audit Items

DescriptionCategories
DISA_STIG_SLES_12_v2r13.audit from DISA SLES 12 v2r13 STIG
SLES-12-010000 - The SUSE operating system must be a vendor-supported release.

SYSTEM AND INFORMATION INTEGRITY

SLES-12-010010 - Vendor-packaged SUSE operating system security patches and updates must be installed and up to date.

SYSTEM AND INFORMATION INTEGRITY

SLES-12-010020 - The SUSE operating system must display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access to the local graphical user interface.

ACCESS CONTROL

SLES-12-010030 - The SUSE operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting access via local console.

ACCESS CONTROL

SLES-12-010040 - The SUSE operating system must display a banner before granting local or remote access to the system via a graphical user logon.

ACCESS CONTROL

SLES-12-010050 - The SUSE operating system must display the approved Standard Mandatory DoD Notice before granting local or remote access to the system via a graphical user logon.

ACCESS CONTROL

SLES-12-010060 - The SUSE operating system must be able to lock the graphical user interface (GUI).

ACCESS CONTROL

SLES-12-010070 - The SUSE operating system must utilize vlock to allow for session locking.

ACCESS CONTROL

SLES-12-010080 - The SUSE operating system must initiate a session lock after a 15-minute period of inactivity for the graphical user interface.

ACCESS CONTROL

SLES-12-010090 - The SUSE operating system must initiate a session lock after a 15-minute period of inactivity.

ACCESS CONTROL

SLES-12-010100 - The SUSE operating system must conceal, via the session lock, information previously visible on the display with a publicly viewable image in the graphical user interface.

ACCESS CONTROL

SLES-12-010109 - The SUSE operating system must specify the default 'include' directory for the /etc/sudoers file - include directory for the /etc/sudoers file.

CONFIGURATION MANAGEMENT

SLES-12-010109 - The SUSE operating system must specify the default 'include' directory for the /etc/sudoers file.

CONFIGURATION MANAGEMENT

SLES-12-010110 - The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010111 - The SUSE operating system must restrict privilege elevation to authorized personnel.

CONFIGURATION MANAGEMENT

SLES-12-010112 - The SUSE operating system must use the invoking user's password for privilege escalation when using 'sudo'.

ACCESS CONTROL

SLES-12-010113 - The SUSE operating system must require re-authentication when using the 'sudo' command - sudo command.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010114 - The SUSE operating system must not be configured to bypass password requirements for privilege escalation.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010120 - The SUSE operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.

ACCESS CONTROL

SLES-12-010130 - The SUSE operating system must lock an account after three consecutive invalid access attempts.

ACCESS CONTROL

SLES-12-010140 - The SUSE operating system must enforce a delay of at least four (4) seconds between logon prompts following a failed logon attempt.

CONFIGURATION MANAGEMENT

SLES-12-010150 - The SUSE operating system must enforce passwords that contain at least one upper-case character.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010160 - The SUSE operating system must enforce passwords that contain at least one lower-case character.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010170 - The SUSE operating system must enforce passwords that contain at least one numeric character.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010180 - The SUSE operating system must enforce passwords that contain at least one special character.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010190 - The SUSE operating system must require the change of at least eight (8) of the total number of characters when passwords are changed.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010210 - The SUSE operating system must employ FIPS 140-2 approved cryptographic hashing algorithm for system authentication (login.defs).

IDENTIFICATION AND AUTHENTICATION

SLES-12-010220 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010221 - The SUSE operating system must not have accounts configured with blank or null passwords.

CONFIGURATION MANAGEMENT

SLES-12-010230 - The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010231 - The SUSE operating system must not be configured to allow blank or null passwords.

CONFIGURATION MANAGEMENT

SLES-12-010240 - The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010250 - The SUSE operating system must employ passwords with a minimum of 15 characters.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010260 - The SUSE operating system must be configured to create or update passwords with a minimum lifetime of 24 hours (one day).

IDENTIFICATION AND AUTHENTICATION

SLES-12-010270 - The SUSE operating system must employ user passwords with a minimum lifetime of 24 hours (one day).

IDENTIFICATION AND AUTHENTICATION

SLES-12-010280 - The SUSE operating system must be configured to create or update passwords with a maximum lifetime of 60 days.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010290 - The SUSE operating system must employ user passwords with a maximum lifetime of 60 days.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010300 - The SUSE operating system must employ a password history file.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010310 - The SUSE operating system must not allow passwords to be reused for a minimum of five (5) generations.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010320 - The SUSE operating system must prevent the use of dictionary words for passwords.

CONFIGURATION MANAGEMENT

SLES-12-010330 - The SUSE operating system must never automatically remove or disable emergency administrator accounts.

ACCESS CONTROL

SLES-12-010331 - The SUSE operating system must automatically expire temporary accounts within 72 hours.

ACCESS CONTROL

SLES-12-010340 - The SUSE operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity after password expiration.

IDENTIFICATION AND AUTHENTICATION

SLES-12-010370 - The SUSE operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.

CONFIGURATION MANAGEMENT

SLES-12-010375 - The SUSE operating system must restrict access to the kernel message buffer.

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010380 - The SUSE operating system must not allow unattended or automatic logon via the graphical user interface.

CONFIGURATION MANAGEMENT

SLES-12-010390 - The SUSE operating system must display the date and time of the last successful account logon upon logon.

ACCESS CONTROL

SLES-12-010400 - There must be no .shosts files on the SUSE operating system.

CONFIGURATION MANAGEMENT

SLES-12-010410 - There must be no shosts.equiv files on the SUSE operating system.

CONFIGURATION MANAGEMENT