Skip to content

Red Hat Enterprise Linux 9 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • RHEL 9 must audit all uses of the mount command.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • Successful/unsuccessful uses of the umount2 system call in RHEL 9 must generate an audit record.

    The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identificat...
    Rule Medium Severity
  • RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.

    The actions taken by system administrators must be audited to keep a record of what was executed on the system, as well as for accountability purposes. Editing the sudoers file may be sign of an at...
    Rule Medium Severity
  • RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.

    In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modifications. Any unexpected users, groups, or modifications must be investigated f...
    Rule Medium Severity
  • RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.

    In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modifications. Any unexpected users, groups, or modifications should be investigated...
    Rule Medium Severity
  • RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/tallylog.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • RHEL 9 must take appropriate action when a critical audit processing failure occurs.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...
    Rule Medium Severity
  • RHEL 9 audit system must protect auditing rules from unauthorized change.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • RHEL 9 IP tunnels must use FIPS 140-3 approved cryptographic algorithms.

    Overriding the system crypto policy makes the behavior of the Libreswan service violate expectations, and makes system configuration more fragmented.
    Rule Medium Severity
  • RHEL 9 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-3 approved cryptographic hashing algorithm for system authentication.

    Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and; therefore, cannot be relied upon to provide confidentiality or integrity, and DOD data may b...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules