Skip to content

Red Hat Enterprise Linux 9 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • RHEL 9 must audit all uses of the chown, fchown, fchownat, and lchown system calls.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • RHEL 9 must audit all uses of the setfacl command.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • RHEL 9 must audit all uses of the setfiles command.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • RHEL 9 must audit all uses of the delete_module system call.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • RHEL 9 must audit all uses of the chsh command.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • RHEL 9 must audit all uses of the kmod command.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • RHEL 9 must audit all uses of the passwd command.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • RHEL 9 must audit all uses of the ssh-agent command.

    Without generating audit record specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or ...
    Rule Medium Severity
  • RHEL 9 must audit all uses of the sudo command.

    Without generating audit record specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or ...
    Rule Medium Severity
  • RHEL 9 must audit all uses of the unix_update command.

    Without generating audit record specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules