Red Hat Enterprise Linux 7 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using "sudo".
<VulnDiscussion>The sudoers security policy requires that users authenticate themselves before they can use sudo. When sudoers requires authe...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must require re-authentication when using the "sudo" command.
<VulnDiscussion>Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When opera...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
Red Hat Enterprise Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
<VulnDiscussion>If the system does not require valid authentication before it boots into single-user or maintenance mode, anyone who invokes ...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
Red Hat Enterprise Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.
<VulnDiscussion>If the system does not require valid authentication before it boots into single-user or maintenance mode, anyone who invokes ...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must confine SELinux users to roles that conform to least privilege.
<VulnDiscussion>Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or proces...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must not allow privileged accounts to utilize SSH.
<VulnDiscussion>Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or proce...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must elevate the SELinux context when an administrator calls the sudo command.
<VulnDiscussion>Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or proces...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must not have accounts configured with blank or null passwords.
<VulnDiscussion>If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with ...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must specify the default "include" directory for the /etc/sudoers file.
<VulnDiscussion>The "sudo" command allows authorized users to run programs (including shells) as other users, system users, and root. The "/e...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must not be configured to bypass password requirements for privilege escalation.
<VulnDiscussion>Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When opera...Rule Medium Severity -
SRG-OS-000445-GPOS-00199
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must use a file integrity tool to verify correct operation of all security functions.
<VulnDiscussion>Without verification of the security functions, security functions may not operate correctly, and the failure may go unnotice...Rule Medium Severity -
SRG-OS-000123-GPOS-00064
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must automatically expire temporary accounts within 72 hours.
<VulnDiscussion>Temporary accounts are privileged or nonprivileged accounts that are established during pressing circumstances, such as new s...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
<VulnDiscussion>The use of FIPS-validated cryptographic algorithms is enforced by enabling kernel FIPS mode. In the event that kernel FIPS mo...Rule Medium Severity -
SRG-OS-000029-GPOS-00010
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must have the screen package installed.
<VulnDiscussion>A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must restrict access to the kernel message buffer.
<VulnDiscussion>Restricting access to the kernel message buffer limits access only to root. This prevents attackers from gaining additional s...Rule Low Severity -
SRG-OS-000073-GPOS-00041
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must be configured to prevent overwriting of custom authentication configuration settings by the authconfig utility.
<VulnDiscussion>When using the authconfig utility to modify authentication configuration settings, the "system-auth" and "password-auth" file...Rule Medium Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must ensure cryptographic verification of vendor software packages.
<VulnDiscussion>Cryptographic verification of vendor software packages ensures that all software packages are obtained from a valid source an...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must disable the login screen user list for graphical user interfaces.
<VulnDiscussion>Leaving the user list enabled is a security risk as it allows anyone with physical access to the system to enumerate known us...Rule Medium Severity -
SRG-OS-000363-GPOS-00150
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must be configured to allow sending email notifications of configuration changes and adverse events to designated personnel.
<VulnDiscussion>Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.