Oracle Linux 8 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000206-GPOS-00084
Group -
SRG-OS-000206-GPOS-00084
Group -
The OL 8 "/var/log/messages" file must be owned by root.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the OL 8 system or platform...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
The OL 8 "/var/log/messages" file must be group-owned by root.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the OL 8 system or platform...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
The OL 8 "/var/log" directory must have mode 0755 or less permissive.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the OL 8 system or platform...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
The OL 8 "/var/log" directory must be owned by root.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the OL 8 system or platform...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
SRG-OS-000250-GPOS-00093
Group -
The OL 8 SSH daemon must be configured to use system-wide crypto policies.
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an auth...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
Group -
The OL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an au...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
Group -
The OL 8 SSH server must be configured to use only ciphers employing FIPS 140-2 validated cryptographic algorithms.
Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied on to provide confidentiality or integrity, and DoD data may be co...Rule Medium Severity -
SRG-OS-000480-GPOS-00232
Group -
SRG-OS-000250-GPOS-00093
Group -
The OL 8 operating system must implement DoD-approved encryption in the OpenSSL package.
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an au...Rule Medium Severity -
SRG-OS-000250-GPOS-00093
Group -
The OL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an aut...Rule Medium Severity -
SRG-OS-000250-GPOS-00093
Group -
The OL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Transport Layer Security (TLS) encryption is a required security setting as a num...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SRG-OS-000259-GPOS-00100
Group -
OL 8 system commands must be owned by root.
If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change ma...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
OL 8 system commands must be group-owned by root or a system account.
If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change ma...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
OL 8 library files must have mode 755 or less permissive.
If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change ma...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SRG-OS-000259-GPOS-00100
Group -
SRG-OS-000363-GPOS-00150
Group -
SRG-OS-000366-GPOS-00153
Group -
SRG-OS-000366-GPOS-00153
Group -
SRG-OS-000366-GPOS-00153
Group -
OL 8 must prevent the loading of a new kernel for later execution.
Changes to any software components can have significant effects on the overall security of the operating system. This requirement ensures the software has not been tampered with and that it has bee...Rule Medium Severity -
SRG-OS-000312-GPOS-00122
Group -
OL 8 must enable kernel parameters to enforce Discretionary Access Control (DAC) on symlinks.
DAC is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which mode (e.g., read or write). Ow...Rule Medium Severity -
SRG-OS-000312-GPOS-00122
Group -
SRG-OS-000138-GPOS-00069
Group -
SRG-OS-000138-GPOS-00069
Group -
OL 8 must prevent kernel profiling by unprivileged users.
Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of ...Rule Low Severity -
SRG-OS-000373-GPOS-00156
Group -
OL 8 must require users to provide a password for privilege escalation.
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, i...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
Group -
OL 8 must require users to reauthenticate for privilege escalation and changing roles.
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, i...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
OL 8 must restrict privilege elevation to authorized personnel.
The sudo command allows a user to execute programs with elevated (administrator) privileges. It prompts the user for their password and confirms your request to execute a command by checking a file...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.