Skip to content

Oracle Linux 8 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000250-GPOS-00093

    <GroupDescription></GroupDescription>
    Group
  • OL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections provided by FIPS-validated cryptographic algorithms, information can be viewed an...
    Rule Medium Severity
  • SRG-OS-000366-GPOS-00153

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must ensure cryptographic verification of vendor software packages.

    &lt;VulnDiscussion&gt;Cryptographic verification of vendor software packages ensures that all software packages are obtained from a valid source an...
    Rule Medium Severity
  • SRG-OS-000363-GPOS-00150

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.

    &lt;VulnDiscussion&gt;Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized ...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must terminate idle user sessions.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via an SSH logon.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the operating system ensures privacy and se...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must display a banner before granting local or remote access to the system via a graphical user logon.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the operating system ensures privacy and se...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the operating system ensures privacy and se...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a command line user logon.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the operating system ensures privacy and se...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    <GroupDescription></GroupDescription>
    Group
  • The OL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote ac...
    Rule Medium Severity
  • SRG-OS-000125-GPOS-00065

    <GroupDescription></GroupDescription>
    Group
  • The OL 8 SSH server must be configured to use only ciphers employing FIPS 140-2 validated cryptographic algorithms.

    &lt;VulnDiscussion&gt;Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be r...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00232

    <GroupDescription></GroupDescription>
    Group
  • The OL 8 SSH server must be configured to use strong entropy.

    &lt;VulnDiscussion&gt;The most important characteristic of a random number generator is its randomness, namely its ability to deliver random number...
    Rule Low Severity
  • SRG-OS-000250-GPOS-00093

    <GroupDescription></GroupDescription>
    Group
  • The OL 8 operating system must implement DoD-approved encryption in the OpenSSL package.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote ac...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    <GroupDescription></GroupDescription>
    Group
  • The OL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Transport...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • OL 8 system commands must have mode 755 or less permissive.

    &lt;VulnDiscussion&gt;If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing t...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • OL 8 system commands must be owned by root.

    &lt;VulnDiscussion&gt;If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing t...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • OL 8 system commands must be group-owned by root or a system account.

    &lt;VulnDiscussion&gt;If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing t...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • OL 8 library files must have mode 755 or less permissive.

    &lt;VulnDiscussion&gt;If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing t...
    Rule Medium Severity
  • YUM must be configured to prevent the installation of patches, service packs, device drivers, or OL 8 system components that have not been digitally signed using a certificate that is recognized and approved by the organization.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the operating system. This require...
    Rule High Severity
  • SRG-OS-000366-GPOS-00153

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the operating system. This require...
    Rule High Severity
  • SRG-OS-000366-GPOS-00153

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must prevent the loading of a new kernel for later execution.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the operating system. This require...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00122

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must enable kernel parameters to enforce Discretionary Access Control (DAC) on symlinks.

    &lt;VulnDiscussion&gt;DAC is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be aut...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00122

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must enable kernel parameters to enforce Discretionary Access Control (DAC) on hardlinks.

    &lt;VulnDiscussion&gt;DAC is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be aut...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must restrict access to the kernel message buffer.

    &lt;VulnDiscussion&gt;Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...
    Rule Low Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must prevent kernel profiling by unprivileged users.

    &lt;VulnDiscussion&gt;Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...
    Rule Low Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must require users to provide a password for privilege escalation.

    &lt;VulnDiscussion&gt;Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operati...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules