Skip to content

Red Hat Enterprise Linux 9 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 9 vendor packaged system security patches and updates must be installed and up to date.

    Installing software updates is a fundamental mitigation against the exploitation of publicly known vulnerabilities. If the most recent security patches and updates are not installed, unauthorized u...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • The graphical display manager must not be the default target on RHEL 9 unless approved.

    Unnecessary service packages must not be installed to decrease the attack surface of the system. Graphical display managers have a long history of security vulnerabilities and must not be used, unl...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 9 must enable the hardware random number generator entropy gatherer service.

    The most important characteristic of a random number generator is its randomness, namely its ability to deliver random numbers that are impossible to predict. Entropy in computer security is associ...
    Rule Low Severity
  • SRG-OS-000269-GPOS-00103

    Group
  • RHEL 9 systemd-journald service must be enabled.

    In the event of a system failure, RHEL 9 must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to system ...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The systemd Ctrl-Alt-Delete burst key sequence in RHEL 9 must be disabled.

    A locally logged-on user who presses Ctrl-Alt-Delete when at the console can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the r...
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • SRG-OS-000324-GPOS-00125

    Group
  • RHEL 9 debug-shell systemd service must be disabled.

    The debug-shell requires no authentication and provides root privileges to anyone who has physical access to the machine. While this feature is disabled by default, masking it adds an additional la...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 9 must disable the ability of systemd to spawn an interactive boot process.

    Using interactive or recovery boot, the console user could disable auditing, firewalls, or other services, weakening system security.
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes.

    Having a nondefault grub superuser username makes password-guessing attacks less effective.
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 9 /boot/grub2/grub.cfg file must be group-owned by root.

    The "root" group is a highly privileged group. Furthermore, the group-owner of this file should not have any access privileges anyway.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 9 /boot/grub2/grub.cfg file must be owned by root.

    The " /boot/grub2/grub.cfg" file stores sensitive system configuration. Protection of this file is critical for system security.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 9 must disable virtual system calls.

    System calls are special routines in the Linux kernel, which userspace applications ask to do privileged tasks. Invoking a system call is an expensive operation because the processor must interrupt...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 9 must clear the page allocator to prevent use-after-free attacks.

    Poisoning writes an arbitrary value to freed pages, so any modification or reference to that page after being freed or before being initialized will be detected and prevented. This prevents many ty...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00192

    Group
  • SRG-OS-000433-GPOS-00193

    Group
  • RHEL 9 must enable mitigations against processor-based vulnerabilities.

    Kernel page-table isolation is a kernel feature that mitigates the Meltdown security vulnerability and hardens the kernel against attempts to bypass kernel address space layout randomization (KASLR...
    Rule Low Severity
  • SRG-OS-000037-GPOS-00015

    Group
  • RHEL 9 must enable auditing of processes that start prior to the audit daemon.

    Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. If auditi...
    Rule Low Severity
  • SRG-OS-000132-GPOS-00067

    Group
  • SRG-OS-000132-GPOS-00067

    Group
  • RHEL 9 must prevent kernel profiling by nonprivileged users.

    Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 9 must prevent the loading of a new kernel for later execution.

    Changes to any software components can have significant effects on the overall security of the operating system. This requirement ensures the software has not been tampered with and that it has bee...
    Rule Medium Severity
  • SRG-OS-000132-GPOS-00067

    Group
  • RHEL 9 must restrict exposed kernel pointer addresses access.

    Exposing kernel pointers (through procfs or "seq_printf()") exposes kernel writeable structures, which may contain functions pointers. If a write vulnerability occurs in the kernel, allowing write ...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00123

    Group
  • RHEL 9 must enable kernel parameters to enforce discretionary access control on hardlinks.

    By enabling the fs.protected_hardlinks kernel parameter, users can no longer create soft or hard links to files they do not own. Disallowing such hardlinks mitigates vulnerabilities based on insecu...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00123

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 9 must disable the kernel.core_pattern.

    A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could contain sensitive data and is generally useful only for developers tryin...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • RHEL 9 must be configured to disable the Asynchronous Transfer Mode kernel module.

    Disabling Asynchronous Transfer Mode (ATM) protects the system against exploitation of any flaws in its implementation.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • RHEL 9 must be configured to disable the Controller Area Network kernel module.

    Disabling Controller Area Network (CAN) protects the system against exploitation of any flaws in its implementation.
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules