Skip to content

Red Hat Enterprise Linux 8 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000445-GPOS-00199

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • There must be no shosts.equiv files on the RHEL 8 operating system.

    The "shosts.equiv" files are used to configure host-based authentication for the system via SSH. Host-based authentication is not sufficient for preventing unauthorized access to the system, as it ...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must enable the hardware random number generator entropy gatherer service.

    The most important characteristic of a random number generator is its randomness, namely its ability to deliver random numbers that are impossible to predict. Entropy in computer security is associ...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The RHEL 8 SSH public host key files must have mode 0644 or less permissive.

    If a public host key file is modified by an unauthorized user, the SSH service may be compromised.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The RHEL 8 SSH private host key files must have mode 0640 or less permissive.

    If an unauthorized user obtains the private SSH host key file, the host could be impersonated.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • The RHEL 8 SSH daemon must not allow authentication using known host’s authentication.

    Configuring this setting for the SSH daemon provides additional assurance that remote logon via SSH will require a password, even in the event of misconfiguration elsewhere.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The RHEL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.

    Configuring these settings for the SSH daemon provides additional assurance that remote logon via SSH will not use unused methods of authentication, even in the event of misconfiguration elsewhere.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must use a separate file system for /var.

    The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must use a separate file system for /var/log.

    The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must use a separate file system for the system audit data path.

    The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • A separate RHEL 8 filesystem must be used for the /tmp directory.

    The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.
    Rule Medium Severity
  • SRG-OS-000109-GPOS-00056

    Group
  • RHEL 8 must not permit direct logons to the root account using remote access via SSH.

    Even though the communications channel may be encrypted, an additional layer of security is gained by extending the policy of not logging on directly as root. In addition, logging on with a user-sp...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.

    The "nosuid" mount option causes the system not to execute "setuid" and "setgid" files with owner privileges. This option must be used for mounting any file system not containing approved "setuid" ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.

    The "nosuid" mount option causes the system not to execute "setuid" and "setgid" files with owner privileges. This option must be used for mounting any file system not containing approved "setuid" ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must prevent special devices on non-root local partitions.

    The "nodev" mount option causes the system to not interpret character or block special devices. Executing character or block special devices from untrusted file systems increases the opportunity fo...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must prevent code from being executed on file systems that contain user home directories.

    The "noexec" mount option causes the system not to execute binary files. This option must be used for mounting any file system not containing approved binary files, as they may be incompatible. Exe...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must prevent special devices on file systems that are used with removable media.

    The "nodev" mount option causes the system not to interpret character or block special devices. Executing character or block special devices from untrusted file systems increases the opportunity fo...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.

    The "nosuid" mount option causes the system not to execute "setuid" and "setgid" files with owner privileges. This option must be used for mounting any file system not containing approved "setuid" ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must prevent code from being executed on file systems that are imported via Network File System (NFS).

    The "noexec" mount option causes the system not to execute binary files. This option must be used for mounting any file system not containing approved binary as they may be incompatible. Executing ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must prevent special devices on file systems that are imported via Network File System (NFS).

    The "nodev" mount option causes the system to not interpret character or block special devices. Executing character or block special devices from untrusted file systems increases the opportunity fo...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).

    The "nosuid" mount option causes the system not to execute "setuid" and "setgid" files with owner privileges. This option must be used for mounting any file system not containing approved "setuid" ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Local RHEL 8 initialization files must not execute world-writable programs.

    If user start-up files execute world-writable programs, especially in unprotected directories, they could be maliciously modified to destroy user files or otherwise compromise the system at the use...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules