| TOSS-04-010000 | TOSS must display the Standard Mandatory DoD Notice and Consent Banner or equivalent US Government Agency Notice and Consent Banner before granting local or remote access to the system. |
| TOSS-04-010010 | TOSS, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. |
| TOSS-04-010020 | TOSS, for PKI-based authentication, must enforce authorized access to the corresponding private key. |
| TOSS-04-010030 | TOSS must require authentication upon booting into emergency or rescue modes. |
| TOSS-04-010040 | TOSS must not permit direct logons to the root account using remote access from outside of the system via SSH. |
| TOSS-04-010050 | The TOSS file system automounter must be disabled unless required. |
| TOSS-04-010060 | The TOSS pam_unix.so module must be configured in the password-auth file to use a FIPS 140-2-approved cryptographic hashing algorithm for system authentication. |
| TOSS-04-010070 | The TOSS pam_unix.so module must be configured in the system-auth file to use a FIPS 140-2-approved cryptographic hashing algorithm for system authentication. |
| TOSS-04-010080 | The TOSS operating system must implement DoD-approved encryption in the OpenSSL package. |
| TOSS-04-010090 | TOSS must use a Linux Security Module configured to enforce limits on system services. |
| TOSS-04-010100 | TOSS must prevent unauthorized and unintended information transfer via shared system resources. |
| TOSS-04-010110 | The TOSS operating system must be configured to use TCP syncookies. |
| TOSS-04-010120 | TOSS must display the Standard Mandatory DoD Notice and Consent Banner or equivalent US Government Agency Notice and Consent Banner before granting local or remote access to the system via a ssh logon. |
| TOSS-04-010140 | The TOSS operating system must implement DoD-approved encryption to protect the confidentiality of SSH connections. |
| TOSS-04-010150 | The TOSS operating system must implement DoD-approved TLS encryption in the GnuTLS package. |
| TOSS-04-010160 | The TOSS SSH daemon must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms. |
| TOSS-04-010170 | The TOSS operating system must be configured to preserve log records from failure events. |
| TOSS-04-010180 | TOSS must, for networked systems, compare internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS). |
| TOSS-04-010210 | The TOSS file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency. |
| TOSS-04-010220 | TOSS must prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization. |
| TOSS-04-010230 | TOSS must require reauthentication when using the "sudo" command. |
| TOSS-04-010240 | TOSS must have the packages required for multifactor authentication installed. |
| TOSS-04-010250 | TOSS must prohibit the use of cached authentications after one day. |
| TOSS-04-010280 | All TOSS networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission. |
| TOSS-04-010330 | For TOSS systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured. |
| TOSS-04-010340 | The debug-shell systemd service must be disabled on TOSS. |
| TOSS-04-010350 | The root account must be the only account having unrestricted access to the TOSS system. |
| TOSS-04-010360 | The systemd Ctrl-Alt-Delete burst key sequence in TOSS must be disabled. |
| TOSS-04-010370 | There must be no ".shosts" files on The TOSS operating system. |
| TOSS-04-010380 | TOSS must not allow blank or null passwords in the system-auth file. |
| TOSS-04-010390 | TOSS must not be performing packet forwarding unless the system is a router. |
| TOSS-04-010400 | The TOSS SSH daemon must not allow authentication using known host's authentication. |
| TOSS-04-010410 | The TOSS SSH daemon must not allow compression or must only allow compression after successful authentication. |
| TOSS-04-010420 | The TOSS SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements. |
| TOSS-04-010430 | TOSS must not allow an unattended or automatic logon to the system. |
| TOSS-04-020000 | TOSS must enforce the limit of five consecutive invalid logon attempts by a user during a 15-minute time period. |
| TOSS-04-020010 | TOSS must limit the number of concurrent sessions to 256 for all accounts and/or account types. |
| TOSS-04-020020 | TOSS must retain a user's session lock until that user reestablishes access using established identification and authentication procedures. |
| TOSS-04-020030 | TOSS must automatically lock graphical user sessions after 15 minutes of inactivity. |
| TOSS-04-020050 | TOSS must map the authenticated identity to the user or group account for PKI-based authentication. |
| TOSS-04-020060 | TOSS duplicate User IDs (UIDs) must not exist for interactive users. |
| TOSS-04-020070 | TOSS must use multifactor authentication for network and local access to privileged and nonprivileged accounts. |
| TOSS-04-020120 | TOSS must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. |
| TOSS-04-020140 | TOSS must automatically remove or disable emergency accounts after the crisis is resolved or 72 hours. |
| TOSS-04-020150 | TOSS must reveal error messages only to authorized users. |
| TOSS-04-020160 | TOSS must protect wireless access to the system using authentication of users and/or devices. |
| TOSS-04-020170 | TOSS must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes occur. |
| TOSS-04-020180 | TOSS must require users to reauthenticate for privilege escalation. |
| TOSS-04-020190 | TOSS must require users to provide a password for privilege escalation. |
| TOSS-04-020200 | All TOSS local interactive user accounts must be assigned a home directory upon creation. |
| TOSS-04-020210 | All TOSS local interactive user home directories must be group-owned by the home directory owner's primary group. |
| TOSS-04-020230 | All TOSS local interactive users must have a home directory assigned in the /etc/passwd file. |
| TOSS-04-020240 | The x86 Ctrl-Alt-Delete key sequence in TOSS must be disabled if a graphical user interface is installed. |
| TOSS-04-020250 | TOSS must disable the user list at logon for graphical user interfaces. |
| TOSS-04-020260 | TOSS must display the date and time of the last successful account logon upon an SSH logon. |
| TOSS-04-020270 | TOSS must not allow accounts configured with blank or null passwords. |
| TOSS-04-020280 | TOSS must not have unnecessary accounts. |
| TOSS-04-020290 | TOSS must define default permissions for all authenticated users in such a way that the user can only read and modify their own files. |
| TOSS-04-020300 | All TOSS local interactive user home directories must have mode 0770 or less permissive. |
| TOSS-04-020310 | All TOSS local interactive user home directories must be owned by root. |
| TOSS-04-020320 | All TOSS local interactive user home directories must be owned by the user's primary group. |
| TOSS-04-030000 | TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow. |
| TOSS-04-030010 | TOSS audit records must contain information to establish what type of events occurred, when the events occurred, the source of events, where events occurred, and the outcome of events. |
| TOSS-04-030060 | TOSS must generate audit records containing the full-text recording of privileged commands. |
| TOSS-04-030080 | TOSS must alert the ISSO and SA (at a minimum) in the event of an audit processing failure. |
| TOSS-04-030090 | TOSS must take appropriate action when an audit processing failure occurs. |
| TOSS-04-030120 | TOSS audit logs must have a mode of 0600 or less permissive to prevent unauthorized read access. |
| TOSS-04-030130 | TOSS audit log directory must have a mode of 0700 or less permissive to prevent unauthorized read access. |
| TOSS-04-030140 | TOSS audit logs must be owned by user root to prevent unauthorized read access. |
| TOSS-04-030150 | TOSS audit logs must be owned by group root to prevent unauthorized read access. |
| TOSS-04-030160 | TOSS audit log directory must be owned by user root to prevent unauthorized read access. |
| TOSS-04-030170 | TOSS audit log directory must be owned by group root to prevent unauthorized read access. |
| TOSS-04-030180 | The TOSS audit system must protect auditing rules from unauthorized change. |
| TOSS-04-030190 | The TOSS audit system must protect logon UIDs from unauthorized change. |
| TOSS-04-030310 | Successful/unsuccessful uses of the "chage" command in TOSS must generate an audit record. |
| TOSS-04-030320 | Successful/unsuccessful uses of the "chcon" command in TOSS must generate an audit record. |
| TOSS-04-030330 | Successful/unsuccessful uses of the ssh-agent in TOSS must generate an audit record. |
| TOSS-04-030340 | Successful/unsuccessful uses of the "passwd" command in TOSS must generate an audit record. |
| TOSS-04-030350 | Successful/unsuccessful uses of postdrop in TOSS must generate an audit record. |
| TOSS-04-030360 | Successful/unsuccessful uses of postqueue in TOSS must generate an audit record. |
| TOSS-04-030370 | Successful/unsuccessful uses of setsebool in TOSS must generate an audit record. |
| TOSS-04-030380 | Successful/unsuccessful uses of the ssh-keysign in TOSS must generate an audit record. |
| TOSS-04-030390 | Successful/unsuccessful uses of the "setfacl" command in RTOSS must generate an audit record. |
| TOSS-04-030400 | Successful/unsuccessful uses of the "pam_timestamp_check" command in TOSS must generate an audit record. |
| TOSS-04-030410 | Successful/unsuccessful uses of the "newgrp" command in TOSS must generate an audit record. |
| TOSS-04-030420 | Successful/unsuccessful uses of the "init_module" command in TOSS must generate an audit record. |
| TOSS-04-030430 | Successful/unsuccessful uses of the "rename" command in TOSS must generate an audit record. |
| TOSS-04-030440 | Successful/unsuccessful uses of the "renameat" command in TOSS must generate an audit record. |
| TOSS-04-030450 | Successful/unsuccessful uses of the "rmdir" command in TOSS must generate an audit record. |
| TOSS-04-030460 | Successful/unsuccessful uses of the "unlink" command in TOSS must generate an audit record. |
| TOSS-04-030470 | Successful/unsuccessful uses of the "unlinkat" command in TOSS must generate an audit record. |
| TOSS-04-030480 | Successful/unsuccessful uses of the "finit_module" command in TOSS must generate an audit record. |
| TOSS-04-030490 | Successful/unsuccessful uses of the "delete_module" command in TOSS must generate an audit record. |
| TOSS-04-030500 | Successful/unsuccessful uses of the "crontab" command in TOSS must generate an audit record. |
| TOSS-04-030510 | Successful/unsuccessful uses of the "chsh" command in TOSS must generate an audit record. |
| TOSS-04-030520 | Successful/unsuccessful uses of setfiles in TOSS must generate an audit record. |
| TOSS-04-030540 | Successful/unsuccessful uses of the "chacl" command in TOSS must generate an audit record. |
| TOSS-04-030550 | TOSS must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. |
| TOSS-04-030560 | Successful/unsuccessful uses of the chmod system call in TOSS must generate an audit record. |
| TOSS-04-030570 | Successful/unsuccessful uses of the chown system call in TOSS must generate an audit record. |
| TOSS-04-030580 | Successful/unsuccessful uses of the creat system call in TOSS must generate an audit record. |
| TOSS-04-030590 | Successful/unsuccessful uses of the fchmod system call in TOSS must generate an audit record. |
| TOSS-04-030600 | Successful/unsuccessful uses of the fchmodat system call in TOSS must generate an audit record. |
| TOSS-04-030610 | Successful/unsuccessful uses of the fchown system call in TOSS must generate an audit record. |
| TOSS-04-030620 | Successful/unsuccessful uses of the fchownat system call in TOSS must generate an audit record. |
| TOSS-04-030630 | Successful/unsuccessful uses of the ftruncate system call system call in TOSS must generate an audit record. |
| TOSS-04-030640 | Successful/unsuccessful uses of the lchown system call in TOSS must generate an audit record. |
| TOSS-04-030650 | Successful/unsuccessful uses of the open system call in TOSS must generate an audit record. |
| TOSS-04-030660 | Successful/unsuccessful uses of the open_by_handle_at system call system call in TOSS must generate an audit record. |
| TOSS-04-030670 | Successful/unsuccessful uses of the openat system call in TOSS must generate an audit record. |
| TOSS-04-030680 | Successful/unsuccessful uses of the truncate system call in TOSS must generate an audit record. |
| TOSS-04-030750 | TOSS audit tools must be owned by "root". |
| TOSS-04-030780 | TOSS must use cryptographic mechanisms to protect the integrity of audit tools. |
| TOSS-04-030790 | TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/group". |
| TOSS-04-030800 | TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/gshadow". |
| TOSS-04-030810 | TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/passwd". |
| TOSS-04-030820 | TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/security/opasswd". |
| TOSS-04-030840 | TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers". |
| TOSS-04-030850 | TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/". |
| TOSS-04-030860 | The TOSS audit system must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions. |
| TOSS-04-030890 | TOSS must allocate audit record storage capacity to store at least one week's worth of audit records, when audit records are not immediately sent to a central audit record storage facility. |
| TOSS-04-030900 | The TOSS audit records must be offloaded onto a different system or storage media from the system being audited. |
| TOSS-04-030910 | TOSS must label all off-loaded audit logs before sending them to the central log server. |
| TOSS-04-030990 | The TOSS audit system must be configured to audit any usage of the "fsetxattr" system call. |
| TOSS-04-031000 | The TOSS audit system must be configured to audit any usage of the "lsetxattr" system call. |
| TOSS-04-031100 | Successful/unsuccessful uses of the fremovexattr system call in TOSS must generate an audit record. |
| TOSS-04-031110 | Successful/unsuccessful uses of the "lremovexattr" system call in TOSS must generate an audit record. |
| TOSS-04-031120 | Successful/unsuccessful uses of the "removexattr" system call in TOSS must generate an audit record. |
| TOSS-04-031130 | Successful/unsuccessful modifications to the "lastlog" file in TOSS must generate an audit record. |
| TOSS-04-031140 | Successful/unsuccessful uses of "semanage" in TOSS must generate an audit record. |
| TOSS-04-031150 | Successful/unsuccessful uses of the "gpasswd" command in TOSS must generate an audit record. |
| TOSS-04-031160 | Successful/unsuccessful uses of the "mount" command in TOSS must generate an audit record. |
| TOSS-04-031170 | Successful/unsuccessful uses of the "mount" syscall in TOSS must generate an audit record. |
| TOSS-04-031180 | Successful/unsuccessful uses of the "su" command in TOSS must generate an audit record. |
| TOSS-04-031190 | Successful/unsuccessful uses of the "umount" command in TOSS must generate an audit record. |
| TOSS-04-031200 | Successful/unsuccessful uses of the "unix_update" in TOSS must generate an audit record. |
| TOSS-04-031210 | Successful/unsuccessful uses of the "usermod" command in TOSS must generate an audit record. |
| TOSS-04-031220 | Successful/unsuccessful uses of "unix_chkpwd" in TOSS must generate an audit record. |
| TOSS-04-031230 | Successful/unsuccessful uses of "userhelper" in TOSS must generate an audit record. |
| TOSS-04-031240 | Successful/unsuccessful uses of the "kmod" command in TOSS must generate an audit record. |
| TOSS-04-031340 | The auditd service must be running in TOSS. |
| TOSS-04-031350 | The TOSS audit system must audit local events. |
| TOSS-04-031360 | TOSS must resolve audit information before writing to disk. |
| TOSS-04-031370 | TOSS must have the packages required for offloading audit logs installed. |
| TOSS-04-031380 | TOSS must have the packages required for encrypting offloaded audit logs installed. |
| TOSS-04-040010 | TOSS must monitor remote access methods. |
| TOSS-04-040020 | TOSS must force a frequent session key renegotiation for SSH connections by the client. |
| TOSS-04-040030 | TOSS must force a frequent session key renegotiation for SSH connections to the server. |
| TOSS-04-040040 | TOSS must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. |
| TOSS-04-040050 | TOSS must enforce password complexity by requiring that at least one uppercase character be used. |
| TOSS-04-040060 | TOSS must enforce password complexity by requiring that at least one lowercase character be used. |
| TOSS-04-040070 | TOSS must enforce password complexity by requiring that at least one numeric character be used. |
| TOSS-04-040080 | TOSS must require the change of at least eight characters when passwords are changed. |
| TOSS-04-040090 | TOSS must store only encrypted representations of passwords. |
| TOSS-04-040100 | TOSS must not have the rsh-server package installed. |
| TOSS-04-040110 | TOSS must enforce 24 hours/one day as the minimum password lifetime. |
| TOSS-04-040120 | TOSS must enforce a 60-day maximum password lifetime restriction. |
| TOSS-04-040140 | TOSS must enforce a minimum 15-character password length. |
| TOSS-04-040150 | TOSS must cover or disable the built-in or attached camera when not in use. |
| TOSS-04-040160 | TOSS must disable IEEE 1394 (FireWire) Support. |
| TOSS-04-040170 | TOSS must disable mounting of cramfs. |
| TOSS-04-040180 | TOSS must disable network management of the chrony daemon. |
| TOSS-04-040190 | TOSS must disable the asynchronous transfer mode (ATM) protocol. |
| TOSS-04-040200 | TOSS must disable the controller area network (CAN) protocol. |
| TOSS-04-040210 | TOSS must disable the stream control transmission (SCTP) protocol. |
| TOSS-04-040220 | TOSS must disable the transparent inter-process communication (TIPC) protocol. |
| TOSS-04-040230 | TOSS must not have any automated bug reporting tools installed. |
| TOSS-04-040250 | TOSS must not have the sendmail package installed. |
| TOSS-04-040260 | TOSS must not have the telnet-server package installed. |
| TOSS-04-040270 | TOSS must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. |
| TOSS-04-040280 | TOSS must be configured to disable USB mass storage. |
| TOSS-04-040290 | TOSS must be configured so that all network connections associated with SSH traffic are terminated at the end of the session or after 10 minutes of inactivity, except to fulfill documented and validated mission requirements. |
| TOSS-04-040310 | TOSS must have policycoreutils package installed. |
| TOSS-04-040330 | All TOSS local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection. |
| TOSS-04-040340 | TOSS must limit privileges to change software resident within software libraries. |
| TOSS-04-040350 | TOSS must enforce password complexity by requiring that at least one special character be used. |
| TOSS-04-040370 | A firewall must be installed on TOSS. |
| TOSS-04-040390 | TOSS must take appropriate action when the internal event queue is full. |
| TOSS-04-040420 | TOSS must accept Personal Identity Verification (PIV) credentials. |
| TOSS-04-040440 | TOSS must implement DoD-approved encryption in the OpenSSL package. |
| TOSS-04-040480 | A firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring TOSS can implement rate-limiting measures on impacted network interfaces. |
| TOSS-04-040490 | TOSS must implement non-executable data to protect its memory from unauthorized code execution. |
| TOSS-04-040500 | YUM must remove all software components after updated versions have been installed on TOSS. |
| TOSS-04-040510 | TOSS must enable the "SELinux" targeted policy. |
| TOSS-04-040540 | TOSS must prevent the use of dictionary words for passwords. |
| TOSS-04-040550 | TOSS must enforce a delay of at least four seconds between logon prompts following a failed logon attempt. |
| TOSS-04-040560 | A File Transfer Protocol (FTP) server package must not be installed unless mission essential on TOSS. |
| TOSS-04-040570 | All TOSS local files and directories must have a valid group owner. |
| TOSS-04-040580 | All TOSS local files and directories must have a valid owner. |
| TOSS-04-040590 | Cron logging must be implemented in TOSS. |
| TOSS-04-040600 | If the Trivial File Transfer Protocol (TFTP) server is required, the TOSS TFTP daemon must be configured to operate in secure mode. |
| TOSS-04-040610 | The graphical display manager must not be installed on TOSS unless approved. |
| TOSS-04-040630 | The TOSS file integrity tool must be configured to verify Access Control Lists (ACLs). |
| TOSS-04-040640 | The TOSS file integrity tool must be configured to verify extended attributes. |
| TOSS-04-040650 | The TOSS SSH daemon must perform strict mode checking of home directory configuration files. |
| TOSS-04-040660 | The TOSS SSH private host key files must have mode 0600 or less permissive. |
| TOSS-04-040670 | The TOSS SSH public host key files must have mode 0644 or less permissive. |
| TOSS-04-040680 | The x86 Ctrl-Alt-Delete key sequence must be disabled on TOSS. |
| TOSS-04-040690 | TOSS must be a vendor-supported release. |
| TOSS-04-040700 | TOSS must be configured to prevent unrestricted mail relaying. |
| TOSS-04-040710 | TOSS must define default permissions for logon and non-logon shells. |
| TOSS-04-040720 | TOSS must disable access to network bpf syscall from unprivileged processes. |
| TOSS-04-040730 | TOSS must enable hardening for the Berkeley Packet Filter Just-in-time compiler. |
| TOSS-04-040740 | TOSS must enable the hardware random number generator entropy gatherer service. |
| TOSS-04-040750 | TOSS must ensure the SSH server uses strong entropy. |
| TOSS-04-040760 | TOSS must have the packages required to use the hardware random number generator entropy gatherer service. |
| TOSS-04-040770 | TOSS must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages. |
| TOSS-04-040780 | TOSS must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages. |
| TOSS-04-040790 | TOSS must not accept router advertisements on all IPv6 interfaces by default. |
| TOSS-04-040800 | TOSS must not accept router advertisements on all IPv6 interfaces. |
| TOSS-04-040810 | TOSS must not allow blank or null passwords in the password-auth file. |
| TOSS-04-040820 | TOSS must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default. |
| TOSS-04-040830 | TOSS must not forward IPv4 source-routed packets by default. |
| TOSS-04-040840 | TOSS must not forward IPv4 source-routed packets. |
| TOSS-04-040850 | TOSS must not forward IPv6 source-routed packets by default. |
| TOSS-04-040860 | TOSS must not forward IPv6 source-routed packets. |
| TOSS-04-040870 | TOSS must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address. |
| TOSS-04-040880 | TOSS must not send Internet Control Message Protocol (ICMP) redirects. |
| TOSS-04-040890 | TOSS must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted. |
| TOSS-04-040900 | TOSS must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted. |
| TOSS-04-040910 | TOSS must restrict exposed kernel pointer addresses access. |
| TOSS-04-040920 | TOSS must restrict privilege elevation to authorized personnel. |
| TOSS-04-040930 | TOSS must use reverse path filtering on all IPv4 interfaces. |
| TOSS-04-040940 | TOSS network interfaces must not be in promiscuous mode. |
| TOSS-04-040950 | TOSS must enable kernel parameters to enforce discretionary access control on symlinks. |
| TOSS-04-040960 | TOSS must enable kernel parameters to enforce discretionary access control on hardlinks. |