Skip to content

Guide to the Secure Configuration of Red Hat Enterprise Linux 8

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Record Unsuccessful Access Attempts to Files - creat

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Unsuccessful Permission Changes to Files - fchmod

    The audit system should collect unsuccessful file permission change attempts for all users and root. If the <code>auditd</code> daemon is configure...
    Rule Medium Severity
  • Record Unsuccessful Permission Changes to Files - fchmodat

    The audit system should collect unsuccessful file permission change attempts for all users and root. If the <code>auditd</code> daemon is configure...
    Rule Medium Severity
  • Record Unsuccessful Ownership Changes to Files - fchown

    The audit system should collect unsuccessful file ownership change attempts for all users and root. If the <code>auditd</code> daemon is configured...
    Rule Medium Severity
  • Record Unsuccessful Ownership Changes to Files - fchownat

    The audit system should collect unsuccessful file ownership change attempts for all users and root. If the <code>auditd</code> daemon is configured...
    Rule Medium Severity
  • Record Unsuccessful Permission Changes to Files - fremovexattr

    The audit system should collect unsuccessful file permission change attempts for all users and root. If the <code>auditd</code> daemon is configure...
    Rule Medium Severity
  • Record Unsuccessful Permission Changes to Files - fsetxattr

    The audit system should collect unsuccessful file permission change attempts for all users and root. If the <code>auditd</code> daemon is configure...
    Rule Medium Severity
  • Record Unsuccessful Access Attempts to Files - ftruncate

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Unsuccessful Ownership Changes to Files - lchown

    The audit system should collect unsuccessful file ownership change attempts for all users and root. If the <code>auditd</code> daemon is configure...
    Rule Medium Severity
  • Record Unsuccessful Permission Changes to Files - lremovexattr

    The audit system should collect unsuccessful file permission change attempts for all users and root. If the <code>auditd</code> daemon is configure...
    Rule Medium Severity
  • Record Unsuccessful Permission Changes to Files - lsetxattr

    The audit system should collect unsuccessful file permission change attempts for all users and root. If the <code>auditd</code> daemon is configure...
    Rule Medium Severity
  • Record Unsuccessful Access Attempts to Files - open

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Unsuccessful Access Attempts to Files - open_by_handle_at

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Verify /boot/grub2/user.cfg Group Ownership

    The file <code>/boot/grub2/user.cfg</code> should be group-owned by the <code>root</code> group to prevent reading or modification of the file. To...
    Rule Medium Severity
  • Record Unsuccessful Creation Attempts to Files - open_by_handle_at O_CREAT

    The audit system should collect unauthorized file accesses for all users and root. The <code>open_by_handle_at</code> syscall can be used to create...
    Rule Medium Severity
  • Record Unsuccessful Modification Attempts to Files - open_by_handle_at O_TRUNC_WRITE

    The audit system should collect detailed unauthorized file accesses for all users and root. The <code>open_by_handle_at</code> syscall can be used ...
    Rule Medium Severity
  • Ensure auditd Unauthorized Access Attempts To open_by_handle_at Are Ordered Correctly

    The audit system should collect detailed unauthorized file accesses for all users and root. To correctly identify unsuccessful creation, unsuccessf...
    Rule Medium Severity
  • Record Unsuccessful Creation Attempts to Files - open O_CREAT

    The audit system should collect unauthorized file accesses for all users and root. The <code>open</code> syscall can be used to create new files wh...
    Rule Medium Severity
  • Verify /boot/grub2/grub.cfg User Ownership

    The file <code>/boot/grub2/grub.cfg</code> should be owned by the <code>root</code> user to prevent destruction or modification of the file. To pr...
    Rule Medium Severity
  • container_connect_any SELinux Boolean

    default - Default SELinux boolean setting.
    on - SELinux boolean is enabled.
    off - SELinux boolean is disabled.
    Value

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules