Skip to content

Red Hat Enterprise Linux 7 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000070-GPOS-00038

    Group
  • SRG-OS-000071-GPOS-00039

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed or new passwords are assigned, the new password must contain at least one numeric character.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000266-GPOS-00101

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed or new passwords are established, the new password must contain at least one special character.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed a minimum of eight of the total number of characters must be changed.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed a minimum of four character classes must be changed.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    Group
  • SRG-OS-000072-GPOS-00040

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed the number of repeating characters of the same character class must not be more than four characters.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that the PAM system service is configured to store only encrypted representations of passwords.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • SRG-OS-000073-GPOS-00041

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that user and group account administration utilities are configured to store only encrypted representations of passwords.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...
    Rule Medium Severity
  • SRG-OS-000075-GPOS-00043

    Group
  • SRG-OS-000075-GPOS-00043

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that passwords are restricted to a 24 hours/1 day minimum lifetime.

    Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that passwords for new users are restricted to a 60-day maximum lifetime.

    Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that existing passwords are restricted to a 60-day maximum lifetime.

    Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...
    Rule Medium Severity
  • SRG-OS-000077-GPOS-00045

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that passwords are prohibited from reuse for a minimum of five generations.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000106-GPOS-00053

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using an empty password.

    Configuring this setting for the SSH daemon provides additional assurance that remote logon via SSH will require a password, even in the event of misconfiguration elsewhere.
    Rule High Severity
  • SRG-OS-000118-GPOS-00060

    Group
  • The Red Hat Enterprise Linux operating system must disable account identifiers (individuals, groups, roles, and devices) if the password expires.

    Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts...
    Rule Medium Severity
  • SRG-OS-000329-GPOS-00128

    Group
  • The Red Hat Enterprise Linux operating system must be configured to lock accounts for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the a...
    Rule Medium Severity
  • SRG-OS-000329-GPOS-00128

    Group
  • The Red Hat Enterprise Linux operating system must lock the associated account after three unsuccessful root logon attempts are made within a 15-minute period.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the a...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that users must provide a password for privilege escalation.

    Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability,...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    Group
  • SRG-OS-000480-GPOS-00226

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that the delay between logon prompts following a failed console logon attempt is at least four seconds.

    Configuring the operating system to implement organization-wide security implementation guides and security checklists verifies compliance with federal standards and establishes a common security b...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    Group
  • The Red Hat Enterprise Linux operating system must not allow an unattended or automatic logon to the system via a graphical user interface.

    Failure to restrict system access to authenticated users negatively impacts operating system security.
    Rule High Severity
  • SRG-OS-000480-GPOS-00229

    Group
  • The Red Hat Enterprise Linux operating system must not allow an unrestricted logon to the system.

    Failure to restrict system access to authenticated users negatively impacts operating system security.
    Rule High Severity
  • SRG-OS-000480-GPOS-00229

    Group
  • The Red Hat Enterprise Linux operating system must not allow users to override SSH environment variables.

    Failure to restrict system access to authenticated users negatively impacts operating system security.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    Group
  • The Red Hat Enterprise Linux operating system must not allow a non-certificate trusted host SSH logon to the system.

    Failure to restrict system access to authenticated users negatively impacts operating system security.
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules