[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 30426 Download | Alert*

For most users mission critical information on websites (Internal or External) are likely to require JavaScript and if the browser does not allow JavaScript the site will not work well, or at all and may lead to help desk calls. Rationale:For normal user experience in web browsing JavaScript must be enabled. Specialized browsing for specific use cases, advanced users or explicit domains may ...

With macOS 10.12, Apple introduced the capability to have a user's Desktop and Documents folders automatically synchronize to the user's iCloud Drive, provided they have enough room purchased through Apple on their iCloud Drive. This capability mirrors what Microsoft is doing with the use of OneDrive and Office 365. There are concerns with using this capability. The storage space that Apple ...

The operating system must display the date and time of the last successful account logon upon logon. Rationale: Providing users with feedback on when account accesses last occurred facilitates user recognition and reporting of unauthorized account use. Fixtext: Add the following line to the top of "/etc/pam.d/login": session required pam_lastlog.so showfailed

Description: The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulati ...

The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and stan ...

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter). The umount command is used to unmount a ...

Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account. Configure the Ubuntu operating system to enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt. Fixtext: Edit the file "/etc/pam.d/common-auth" and set the parameter "pam_faildelay" to a value of ...

If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments. If an account is configured for password authentication but does not have an assigned password, it may be possible to log on to the account without authenticating. Fixtext: Remove any instances of the "n ...

If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change management process. This requirement applies to Ubuntu operating systems with software libraries that are accessible and configurable, as in the case of interpreted languages. S ...

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter). The su command allows a user to run co ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   3042

© SecPod Technologies