Red Hat Enterprise Linux 7 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured.
<VulnDiscussion>IP tunneling mechanisms can be used to bypass network filtering. If tunneling is required, it must be documented with the Inf...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must not forward IPv6 source-routed packets.
<VulnDiscussion>Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than c...Rule Medium Severity -
SRG-OS-000375-GPOS-00160
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must have the required packages for multifactor authentication installed.
<VulnDiscussion>Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the...Rule Medium Severity -
SRG-OS-000375-GPOS-00160
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must implement multifactor authentication for access to privileged accounts via pluggable authentication modules (PAM).
<VulnDiscussion>Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the...Rule Medium Severity -
SRG-OS-000375-GPOS-00160
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must implement certificate status checking for PKI authentication.
<VulnDiscussion>Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the...Rule Medium Severity -
SRG-OS-000424-GPOS-00188
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must be configured so that all wireless network adapters are disabled.
<VulnDiscussion>The use of wireless networking can introduce many different attack vectors into the organization's network. Common attack vec...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.
<VulnDiscussion>Without cryptographic integrity protections, system command and files can be altered by unauthorized users without detection....Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must implement the Endpoint Security for Linux Threat Prevention tool.
<VulnDiscussion>Adding endpoint security tools can provide the capability to automatically take actions in response to malicious behavior, wh...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must use a virus scan program.
<VulnDiscussion>Virus scanning software can be used to protect a system from penetration from computer viruses and to limit their spread thro...Rule High Severity -
SRG-OS-000029-GPOS-00010
<GroupDescription></GroupDescription>Group -
The Red Hat Enterprise Linux operating system must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface.
<VulnDiscussion>A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.