Skip to content

Red Hat Enterprise Linux 8 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • RHEL 8 audit logs must have a mode of 0600 or less permissive to prevent unauthorized read access.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the RHEL 8 system or platfo...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • RHEL 8 audit logs must be owned by root to prevent unauthorized read access.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the RHEL 8 system or platfo...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • RHEL 8 audit logs must be group-owned by root to prevent unauthorized read access.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • SRG-OS-000057-GPOS-00027

    Group
  • SRG-OS-000057-GPOS-00027

    Group
  • RHEL 8 audit log directory must have a mode of 0700 or less permissive to prevent unauthorized read access.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • RHEL 8 audit system must protect auditing rules from unauthorized change.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • RHEL 8 audit system must protect logon UIDs from unauthorized change.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000062-GPOS-00031

    Group
  • RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000062-GPOS-00031

    Group
  • SRG-OS-000062-GPOS-00031

    Group
  • RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000062-GPOS-00031

    Group
  • RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules