Skip to content

Oracle Linux 8 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • OL 8 must enable the USBGuard.

    Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Peripherals include but are not limited to such devices as flash drive...
    Rule Medium Severity
  • A firewall must be able to protect against or limit the effects of denial-of-service (DoS) attacks by ensuring OL 8 can implement rate-limiting measures on impacted network interfaces.

    DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. This requi...
    Rule Medium Severity
  • All OL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.

    Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected communications can be intercepted and read or altered. This requirement a...
    Rule Medium Severity
  • OL 8 must force a frequent session key renegotiation for SSH connections to the server.

    Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied on to provide confidentiality or integrity, and DOD data may be co...
    Rule Medium Severity
  • The x86 Ctrl-Alt-Delete key sequence in OL 8 must be disabled if a graphical user interface is installed.

    A locally logged-on user, who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create th...
    Rule High Severity
  • OL 8 must disable the debug-shell systemd service.

    The debug-shell requires no authentication and provides root privileges to anyone who has physical access to the machine. While this feature is disabled by default, masking it adds a layer of assur...
    Rule Low Severity
  • OL 8 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.

    ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the host's route table and are unauthenticated. An ill...
    Rule Medium Severity
  • OL 8 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.

    ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the host's route table and are unauthenticated. An ill...
    Rule Medium Severity
  • OL 8 must not send Internet Control Message Protocol (ICMP) redirects.

    ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages contain information from the system's route table, possibly r...
    Rule Medium Severity
  • OL 8 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.

    Responding to broadcast ICMP echoes facilitates network mapping and provides a vector for amplification attacks. There are notable differences between Internet Protocol version 4 (IPv4) and Inte...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules