UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

SLES 12 Security Technical Implementation Guide


Overview

Date Finding Count (214)
2023-12-01 CAT I (High): 13 CAT II (Med): 177 CAT III (Low): 24
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-217159 High The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence.
V-217164 High The SUSE operating system root account must be the only account having unrestricted access to the system.
V-217101 High The SUSE operating system must be a vendor-supported release.
V-217160 High The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence for Graphical User Interfaces.
V-217268 High The SUSE operating system must not allow automatic logon via SSH.
V-217264 High All networked SUSE operating systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
V-217262 High SuSEfirewall2 must protect against or limit the effects of Denial-of-Service (DoS) attacks on the SUSE operating system by implementing rate-limiting measures on impacted network interfaces.
V-217112 High The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges.
V-222386 High The SUSE operating system must use a virus scan program.
V-217139 High The SUSE operating system must not allow unattended or automatic logon via the graphical user interface.
V-251721 High The SUSE operating system must not have accounts configured with blank or null passwords.
V-217141 High There must be no .shosts files on the SUSE operating system.
V-217142 High There must be no shosts.equiv files on the SUSE operating system.
V-217124 Medium The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords.
V-217122 Medium The SUSE operating system must employ FIPS 140-2 approved cryptographic hashing algorithm for system authentication (login.defs).
V-217120 Medium The SUSE operating system must enforce passwords that contain at least one special character.
V-217121 Medium The SUSE operating system must require the change of at least eight (8) of the total number of characters when passwords are changed.
V-217158 Medium The SUSE operating system Apparmor tool must be configured to control whitelisted applications and user home directory access control.
V-217156 Medium The SUSE operating system must disable the file system automounter unless required.
V-217155 Medium The SUSE operating system must disable the USB mass storage kernel module.
V-217154 Medium The SUSE operating system must remove all outdated software components after updated versions have been installed.
V-217153 Medium The SUSE operating system tool zypper must have gpgcheck enabled.
V-217152 Medium The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools.
V-237623 Medium The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding by default unless the system is a router.
V-237622 Medium The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.
V-237621 Medium The SUSE operating system must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
V-237620 Medium The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.
V-217128 Medium The SUSE operating system must be configured to create or update passwords with a minimum lifetime of 24 hours (one day).
V-217261 Medium The SUSE operating system must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.
V-217260 Medium The SUSE operating system file /etc/gdm/banner must contain the Standard Mandatory DoD Notice and Consent banner text.
V-217162 Medium The SUSE operating system must not have unnecessary accounts.
V-217163 Medium The SUSE operating system must not have duplicate User IDs (UIDs) for interactive users.
V-217278 Medium The SUSE operating system SSH daemon must use privilege separation.
V-217161 Medium The SUSE operating system default permissions must be defined in such a way that all authenticated users can only read and modify their own files.
V-217166 Medium If Network Security Services (NSS) is being used by the SUSE operating system it must prohibit the use of cached authentications after one day.
V-217167 Medium The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to prohibit the use of cached offline authentications after one day.
V-217272 Medium The SUSE operating system SSH daemon must be configured with a timeout interval.
V-217273 Medium The SUSE operating system for all network connections associated with SSH traffic must immediately terminate at the end of the session or after 10 minutes of inactivity.
V-217168 Medium All SUSE operating system files and directories must have a valid owner.
V-217169 Medium All SUSE operating system files and directories must have a valid group owner.
V-217276 Medium The SUSE operating system SSH daemon private host key files must have mode 0640 or less permissive.
V-217277 Medium The SUSE operating system SSH daemon must perform strict mode checking of home directory configuration files.
V-217274 Medium The SUSE operating system SSH daemon must be configured to not allow authentication using known hosts authentication.
V-217275 Medium The SUSE operating system SSH daemon public host key files must have mode 0644 or less permissive.
V-217218 Medium The SUSE operating system must generate audit records for all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr syscalls.
V-217102 Medium Vendor-packaged SUSE operating system security patches and updates must be installed and up to date.
V-217103 Medium The SUSE operating system must display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access to the local graphical user interface.
V-217104 Medium The SUSE operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting access via local console.
V-217105 Medium The SUSE operating system must display a banner before granting local or remote access to the system via a graphical user logon.
V-217106 Medium The SUSE operating system must display the approved Standard Mandatory DoD Notice before granting local or remote access to the system via a graphical user logon.
V-217107 Medium The SUSE operating system must be able to lock the graphical user interface (GUI).
V-237617 Medium The SUSE operating system must have system commands group-owned by root or a system account.
V-237613 Medium The SUSE operating system must have system commands set to a mode of 755 or less permissive.
V-217217 Medium The SUSE operating system must generate audit records for all uses of the kmod command.
V-217188 Medium The SUSE operating system must prevent unauthorized users from accessing system error messages.
V-217189 Medium The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.
V-217110 Medium The SUSE operating system must initiate a session lock after a 15-minute period of inactivity.
V-217180 Medium SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.
V-217181 Medium SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.
V-217182 Medium All SUSE operating system world-writable directories must be group-owned by root, sys, bin, or an application group.
V-217183 Medium SUSE operating system kernel core dumps must be disabled unless needed.
V-217116 Medium The SUSE operating system must enforce a delay of at least four (4) seconds between logon prompts following a failed logon attempt.
V-217114 Medium The SUSE operating system must lock an account after three consecutive invalid access attempts.
V-255914 Medium The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
V-217175 Medium All SUSE operating system local initialization files must have mode 0740 or less permissive.
V-217174 Medium All SUSE operating system local interactive user home directories must be group-owned by the home directory owners primary group.
V-217177 Medium All SUSE operating system local initialization files must not execute world-writable programs.
V-217176 Medium All SUSE operating system local interactive user initialization files executable search paths must contain only paths that resolve to the users home directory.
V-217171 Medium All SUSE operating system local interactive user accounts, upon creation, must be assigned a home directory.
V-217173 Medium All SUSE operating system local interactive user home directories must have mode 0750 or less permissive.
V-217172 Medium All SUSE operating system local interactive user home directories defined in the /etc/passwd file must exist.
V-217265 Medium The SUSE operating system must log SSH connection attempts and failures to the server.
V-217267 Medium The SUSE operating system must deny direct logons to the root account using remote access via SSH.
V-217266 Medium The SUSE operating system must display the date and time of the last successful account logon upon an SSH logon.
V-217179 Medium SUSE operating system file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.
V-217178 Medium SUSE operating system file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.
V-217263 Medium The SUSE operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting access via SSH.
V-217208 Medium The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
V-217117 Medium The SUSE operating system must enforce passwords that contain at least one upper-case character.
V-237604 Medium The SUSE operating system must use the invoking user's password for privilege escalation when using "sudo".
V-237607 Medium The SUSE operating system library files must have mode 0755 or less permissive.
V-237606 Medium The SUSE operating system must not have unnecessary account capabilities.
V-217203 Medium The SUSE operating system audit tools must have the proper permissions configured to protect against unauthorized access.
V-217202 Medium The SUSE operating system must protect audit rules from unauthorized modification.
V-217119 Medium The SUSE operating system must enforce passwords that contain at least one numeric character.
V-217118 Medium The SUSE operating system must enforce passwords that contain at least one lower-case character.
V-217207 Medium The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
V-217206 Medium The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
V-217205 Medium The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
V-217204 Medium The SUSE operating system must not disable syscall auditing.
V-217193 Medium The SUSE operating system auditd service must notify the System Administrator (SA) and Information System Security Officer (ISSO) immediately when audit storage capacity is 75 percent full.
V-217192 Medium The SUSE operating system must allocate audit record storage capacity to store at least one weeks worth of audit records when audit records are not immediately sent to a central audit record storage facility.
V-256981 Medium The SUSE operating system must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
V-217190 Medium The SUSE operating system must have the auditing package installed.
V-217197 Medium The audit-audispd-plugins must be installed on the SUSE operating system.
V-217270 Medium The SUSE operating system must implement DoD-approved encryption to protect the confidentiality of SSH remote connections.
V-217195 Medium The Information System Security Officer (ISSO) and System Administrator (SA), at a minimum, must have mail aliases to be notified of a SUSE operating system audit processing failure.
V-217194 Medium The Information System Security Officer (ISSO) and System Administrator (SA), at a minimum, must be alerted of a SUSE operating system audit processing failure event.
V-217271 Medium The SUSE operating system SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
V-222385 Medium The SUSE operating system must implement the Endpoint Security for Linux Threat Prevention tool.
V-217290 Medium The SUSE operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
V-217291 Medium The SUSE operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
V-217292 Medium The SUSE operating system must not allow interfaces to accept Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
V-217293 Medium The SUSE operating system must not allow interfaces to accept Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages by default.
V-217294 Medium The SUSE operating system must not allow interfaces to send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
V-217295 Medium The SUSE operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
V-217296 Medium The SUSE operating system must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.
V-217297 Medium The SUSE operating system must not have network interfaces in promiscuous mode unless approved and documented.
V-217298 Medium The SUSE operating system wireless network adapters must be disabled unless approved and documented.
V-217299 Medium The SUSE operating system must have the packages required for multifactor authentication to be installed.
V-217126 Medium The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords.
V-217127 Medium The SUSE operating system must employ passwords with a minimum of 15 characters.
V-217170 Medium All SUSE operating system local interactive users must have a home directory assigned in the /etc/passwd file.
V-217125 Medium The SUSE operating system must not be configured to allow blank or null passwords.
V-237605 Medium The SUSE operating system must require re-authentication when using the "sudo" command.
V-217123 Medium The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords.
V-217230 Medium The SUSE operating system must generate audit records for all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.
V-217129 Medium The SUSE operating system must employ user passwords with a minimum lifetime of 24 hours (one day).
V-217269 Medium The SUSE operating system must not allow users to override SSH environment variables.
V-217191 Medium SUSE operating system audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
V-255916 Medium The SUSE operating system must use a file integrity tool to verify correct operation of all security functions.
V-256980 Medium The SUSE operating system must automatically expire temporary accounts within 72 hours.
V-237618 Medium The SUSE operating system must have directories that contain system commands group-owned by root.
V-237619 Medium The SUSE operating system must not have the vsftpd package installed if not required for operational support.
V-217196 Medium The SUSE operating system audit system must take appropriate action when the audit storage volume is full.
V-217283 Medium The SUSE operating system must implement kptr-restrict to prevent the leaking of internal kernel addresses.
V-217281 Medium The SUSE operating system clock must, for networked systems, be synchronized to an authoritative DoD time source at least every 24 hours.
V-217280 Medium The SUSE operating system SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.
V-217287 Medium The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
V-217286 Medium The SUSE operating system must be configured to use TCP syncookies.
V-217285 Medium The SUSE operating system must off-load rsyslog messages for networked systems in real time and off-load standalone systems at least weekly.
V-217109 Medium The SUSE operating system must initiate a session lock after a 15-minute period of inactivity for the graphical user interface.
V-217201 Medium Audispd must take appropriate action when the SUSE operating system audit storage is full.
V-217289 Medium The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
V-217288 Medium The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets.
V-237614 Medium The SUSE operating system must have directories that contain system commands set to a mode of 0755 or less permissive.
V-217223 Medium The SUSE operating system must generate audit records for all uses of the chown, fchown, fchownat, and lchown syscalls.
V-237615 Medium The SUSE operating system must have system commands owned by root.
V-217227 Medium The SUSE operating system must generate audit records for all uses of the chmod, fchmod, and fchmodat system calls.
V-237612 Medium The SUSE operating system library directories must be group-owned by root.
V-217284 Medium Address space layout randomization (ASLR) must be implemented by the SUSE operating system to protect memory from unauthorized code execution.
V-251719 Medium The SUSE operating system must specify the default "include" directory for the /etc/sudoers file.
V-237610 Medium The SUSE operating system library directories must be owned by root.
V-217200 Medium The audit system must take appropriate action when the network cannot be used to off-load audit records.
V-237611 Medium The SUSE operating system library files must be group-owned by root.
V-217279 Medium The SUSE operating system SSH daemon must not allow compression or must only allow compression after successful authentication.
V-217210 Medium The SUSE operating system must generate audit records for all uses of the su command.
V-233308 Medium The SUSE operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
V-237609 Medium The SUSE operating system library files must be owned by root.
V-217254 Medium The SUSE operating system must generate audit records for all uses of the delete_module command.
V-217255 Medium The SUSE operating system must generate audit records for all uses of the init_module and finit_module syscalls.
V-217257 Medium The SUSE operating system must generate audit records for all modifications to the faillog file.
V-217250 Medium The SUSE operating system must generate audit records for all uses of the chage command.
V-217251 Medium The SUSE operating system must generate audit records for all uses of the usermod command.
V-217252 Medium The SUSE operating system must generate audit records for all uses of the crontab command.
V-217253 Medium The SUSE operating system must generate audit records for all uses of the pam_timestamp_check command.
V-217258 Medium The SUSE operating system must not have the telnet-server package installed.
V-237608 Medium The SUSE operating system library directories must have mode 0755 or less permissive.
V-237603 Medium The SUSE operating system must restrict privilege elevation to authorized personnel.
V-217138 Medium The SUSE operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
V-217131 Medium The SUSE operating system must employ user passwords with a maximum lifetime of 60 days.
V-217130 Medium The SUSE operating system must be configured to create or update passwords with a maximum lifetime of 60 days.
V-217133 Medium The SUSE operating system must not allow passwords to be reused for a minimum of five (5) generations.
V-217132 Medium The SUSE operating system must employ a password history file.
V-217135 Medium The SUSE operating system must never automatically remove or disable emergency administrator accounts.
V-217134 Medium The SUSE operating system must prevent the use of dictionary words for passwords.
V-217136 Medium The SUSE operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity after password expiration.
V-217247 Medium The SUSE operating system must generate audit records for all modifications to the lastlog file.
V-217246 Medium The SUSE operating system must generate audit records for all modifications to the tallylog file must generate an audit record.
V-217245 Medium The SUSE operating system must generate audit records for all uses of the rm command.
V-217244 Medium Successful/unsuccessful attempts to modify categories of information (e.g., classification levels) must generate audit records.
V-217243 Medium The SUSE operating system must generate audit records for all uses of the chacl command.
V-217242 Medium The SUSE operating system must generate audit records for all uses of the setfacl command.
V-217241 Medium The SUSE operating system must generate audit records for all uses of the chmod command.
V-217240 Medium The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
V-217249 Medium The SUSE operating system must generate audit records for all uses of the unix_chkpwd command.
V-217248 Medium The SUSE operating system must generate audit records for all uses of the passmass command.
V-217144 Medium SUSE operating systems with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
V-217146 Medium All SUSE operating system persistent disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.
V-217147 Medium The sticky bit must be set on all SUSE operating system world-writable directories.
V-237616 Medium The SUSE operating system must have directories that contain system commands owned by root.
V-217302 Medium The SUSE operating system, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
V-217300 Medium The SUSE operating system must implement certificate status checking for multifactor authentication.
V-217301 Medium The SUSE operating system must implement multifactor authentication for access to privileged accounts via pluggable authentication modules (PAM).
V-217148 Medium Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.
V-217149 Medium The SUSE operating system must notify the System Administrator (SA) when AIDE discovers anomalies in the operation of any security functions.
V-251722 Medium The SUSE operating system must generate audit records for all uses of the unlink, unlinkat, rename, renameat and rmdir syscalls.
V-217145 Medium SUSE operating systems with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
V-251720 Medium The SUSE operating system must not be configured to bypass password requirements for privilege escalation.
V-217143 Medium FIPS 140-2 mode must be enabled on the SUSE operating system.
V-217151 Low The SUSE operating system file integrity tool must be configured to verify extended attributes.
V-217150 Low The SUSE operating system file integrity tool must be configured to verify Access Control Lists (ACLs).
V-217108 Low The SUSE operating system must utilize vlock to allow for session locking.
V-217212 Low The SUSE operating system must generate audit records for all uses of the chfn command.
V-217213 Low The SUSE operating system must generate audit records for all uses of the mount command.
V-217214 Low The SUSE operating system must generate audit records for all uses of the umount command.
V-217216 Low The SUSE operating system must generate audit records for all uses of the ssh-keysign command.
V-217184 Low A separate file system must be used for SUSE operating system user home directories (such as /home or an equivalent).
V-217185 Low The SUSE operating system must use a separate file system for /var.
V-217186 Low The SUSE operating system must use a separate file system for the system audit data path.
V-217113 Low The SUSE operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.
V-217209 Low The SUSE operating system must generate audit records for all uses of the privileged functions.
V-217199 Low Audispd must off-load audit records onto a different system or media from the SUSE operating system being audited.
V-217198 Low The SUSE operating system audit event multiplexor must be configured to use Kerberos.
V-217238 Low The SUSE operating system must generate audit records for all uses of the newgrp command.
V-217239 Low The SUSE operating system must generate audit records for a uses of the chsh command.
V-217236 Low The SUSE operating system must generate audit records for all uses of the passwd command.
V-217237 Low The SUSE operating system must generate audit records for all uses of the gpasswd command.
V-255915 Low The SUSE operating system must restrict access to the kernel message buffer.
V-217282 Low The SUSE operating system must be configured to use Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
V-217215 Low The SUSE operating system must generate audit records for all uses of the ssh-agent command.
V-217211 Low The SUSE operating system must generate audit records for all uses of the sudo command.
V-217111 Low The SUSE operating system must conceal, via the session lock, information previously visible on the display with a publicly viewable image in the graphical user interface.
V-217140 Low The SUSE operating system must display the date and time of the last successful account logon upon logon.