Red Hat Enterprise Linux 8 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
All RHEL 8 local interactive user home directories must be group-owned by the home directory owner’s primary group.
If the Group Identifier (GID) of a local interactive user’s home directory is not the same as the primary GID of the user, this would allow unauthorized access to the user’s files, and users that s...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
RHEL 8 must be a vendor-supported release.
An operating system release is considered "supported" if the vendor continues to provide security patches for the product. With an unsupported release, it will not be possible to resolve security i...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
RHEL 8 vendor packaged system security patches and updates must be installed and up to date.
Timely patching is critical for maintaining the operational availability, confidentiality, and integrity of information technology (IT) systems. However, failure to keep operating system and applic...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
Group -
RHEL 8 must implement NIST FIPS-validated cryptography for the following: To provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The operating system must implement cryptographic modules adhering to the higher standards...Rule High Severity -
SRG-OS-000185-GPOS-00079
Group -
SRG-OS-000023-GPOS-00006
Group -
SRG-OS-000023-GPOS-00006
Group -
RHEL 8 must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon.
Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbiage used is consistent with applicable federal ...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
Group -
SRG-OS-000032-GPOS-00013
Group -
SRG-OS-000066-GPOS-00034
Group -
RHEL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...Rule Medium Severity -
SRG-OS-000067-GPOS-00035
Group -
RHEL 8, for certificate-based authentication, must enforce authorized access to the corresponding private key.
If an unauthorized user obtains access to a private key without a passcode, that user would have unauthorized access to any system where the associated public key has been installed.Rule Medium Severity -
SRG-OS-000073-GPOS-00041
Group -
RHEL 8 must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
Group -
RHEL 8 must employ FIPS 140-2 approved cryptographic hashing algorithms for all stored passwords.
The system must use a strong hashing algorithm to store the password. Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are ...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
Group -
SRG-OS-000080-GPOS-00048
Group -
RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.
If the system does not require valid authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all file...Rule High Severity -
SRG-OS-000080-GPOS-00048
Group -
RHEL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
If the system does not require valid authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all file...Rule High Severity -
SRG-OS-000080-GPOS-00048
Group -
RHEL 8 operating systems must require authentication upon booting into rescue mode.
If the system does not require valid root authentication before it boots into emergency or rescue mode, anyone who invokes emergency or rescue mode is granted privileged access to all files on the ...Rule Medium Severity -
SRG-OS-000120-GPOS-00061
Group -
The RHEL 8 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide confidentiality or integrity, and DoD data may be ...Rule Medium Severity -
SRG-OS-000120-GPOS-00061
Group -
SRG-OS-000120-GPOS-00061
Group -
The krb5-workstation package must not be installed on RHEL 8.
Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide confidentiality or integrity, and DoD data may be ...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
Group -
RHEL 8 must use a Linux Security Module configured to enforce limits on system services.
Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
Group -
RHEL 8 must have policycoreutils package installed.
Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...Rule Low Severity -
SRG-OS-000138-GPOS-00069
Group -
SRG-OS-000163-GPOS-00072
Group -
RHEL 8 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.
Terminating an unresponsive SSH session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or con...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
The RHEL 8 /var/log/messages file must have mode 0640 or less permissive.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the RHEL 8 system or platfo...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
The RHEL 8 /var/log/messages file must be owned by root.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the RHEL 8 system or platfo...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
SRG-OS-000206-GPOS-00084
Group -
The RHEL 8 /var/log directory must have mode 0755 or less permissive.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the RHEL 8 system or platfo...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
SRG-OS-000206-GPOS-00084
Group -
The RHEL 8 /var/log directory must be group-owned by root.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the RHEL 8 system or platfo...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.