Red Hat Enterprise Linux 9 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000480-GPOS-00227
Group -
RHEL 9 /boot/grub2/grub.cfg file must be group-owned by root.
The "root" group is a highly privileged group. Furthermore, the group-owner of this file should not have any access privileges anyway.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
RHEL 9 /boot/grub2/grub.cfg file must be owned by root.
The " /boot/grub2/grub.cfg" file stores sensitive system configuration. Protection of this file is critical for system security.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
RHEL 9 must disable virtual system calls.
System calls are special routines in the Linux kernel, which userspace applications ask to do privileged tasks. Invoking a system call is an expensive operation because the processor must interrupt...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
RHEL 9 must clear the page allocator to prevent use-after-free attacks.
Poisoning writes an arbitrary value to freed pages, so any modification or reference to that page after being freed or before being initialized will be detected and prevented. This prevents many ty...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
Group -
SRG-OS-000433-GPOS-00193
Group -
RHEL 9 must enable mitigations against processor-based vulnerabilities.
Kernel page-table isolation is a kernel feature that mitigates the Meltdown security vulnerability and hardens the kernel against attempts to bypass kernel address space layout randomization (KASLR...Rule Low Severity -
SRG-OS-000037-GPOS-00015
Group -
RHEL 9 must enable auditing of processes that start prior to the audit daemon.
Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. If auditi...Rule Low Severity -
SRG-OS-000132-GPOS-00067
Group -
SRG-OS-000132-GPOS-00067
Group -
RHEL 9 must prevent kernel profiling by nonprivileged users.
Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
RHEL 9 must prevent the loading of a new kernel for later execution.
Changes to any software components can have significant effects on the overall security of the operating system. This requirement ensures the software has not been tampered with and that it has bee...Rule Medium Severity -
SRG-OS-000132-GPOS-00067
Group -
RHEL 9 must restrict exposed kernel pointer addresses access.
Exposing kernel pointers (through procfs or "seq_printf()") exposes kernel writeable structures, which may contain functions pointers. If a write vulnerability occurs in the kernel, allowing write ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.