Red Hat Enterprise Linux 8 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000250-GPOS-00093
Group -
SRG-OS-000250-GPOS-00093
Group -
The RHEL 8 operating system must implement DOD-approved encryption to protect the confidentiality of SSH server connections.
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DOD nonpublic information systems by an auth...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000250-GPOS-00093
Group -
SRG-OS-000250-GPOS-00093
Group -
The RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an auth...Rule Medium Severity -
SRG-OS-000250-GPOS-00093
Group -
SRG-OS-000259-GPOS-00100
Group -
RHEL 8 system commands must have mode 755 or less permissive.
If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
RHEL 8 system commands must be owned by root.
If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
RHEL 8 system commands must be group-owned by root or a system account.
If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SRG-OS-000259-GPOS-00100
Group -
RHEL 8 library files must be owned by root.
If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SRG-OS-000363-GPOS-00150
Group -
The RHEL 8 file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency.
Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized access to the operating system. Changes to operating system configuratio...Rule Medium Severity -
SRG-OS-000366-GPOS-00153
Group -
RHEL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.
Changes to any software components can have significant effects on the overall security of the operating system. This requirement ensures the software has not been tampered with and that it has bee...Rule High Severity -
SRG-OS-000366-GPOS-00153
Group -
RHEL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.
Changes to any software components can have significant effects on the overall security of the operating system. This requirement ensures the software has not been tampered with and that it has bee...Rule High Severity -
SRG-OS-000366-GPOS-00153
Group -
SRG-OS-000312-GPOS-00122
Group -
RHEL 8 must enable kernel parameters to enforce discretionary access control on symlinks.
Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which...Rule Medium Severity -
SRG-OS-000312-GPOS-00122
Group -
RHEL 8 must enable kernel parameters to enforce discretionary access control on hardlinks.
Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
Group -
RHEL 8 must restrict access to the kernel message buffer.
Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of ...Rule Low Severity -
SRG-OS-000138-GPOS-00069
Group -
SRG-OS-000373-GPOS-00156
Group -
RHEL 8 must require users to provide a password for privilege escalation.
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, i...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
Group -
SRG-OS-000375-GPOS-00160
Group -
SRG-OS-000375-GPOS-00160
Group -
SRG-OS-000376-GPOS-00161
Group -
RHEL 8 must accept Personal Identity Verification (PIV) credentials.
The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. The DoD has mandated the use of the Common Access Card (CAC) to support identity management and ...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
Group -
RHEL 8 must implement non-executable data to protect its memory from unauthorized code execution.
Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory incl...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
Group -
SRG-OS-000134-GPOS-00068
Group -
RHEL 8 must disable virtual syscalls.
Syscalls are special routines in the Linux kernel, which userspace applications ask to do privileged tasks. Invoking a system call is an expensive operation because the processor must interrupt th...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
Group -
RHEL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks.
Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory inclu...Rule Medium Severity -
SRG-OS-000433-GPOS-00193
Group -
RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.
Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory incl...Rule Medium Severity -
SRG-OS-000437-GPOS-00194
Group -
YUM must remove all software components after updated versions have been installed on RHEL 8.
Previous versions of software components that are not removed from the information system after updates have been installed may be exploited by adversaries. Some information technology products may...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.