Skip to content

Oracle Linux 8 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000046-GPOS-00022

    <GroupDescription></GroupDescription>
    Group
  • The OL 8 audit log directory must be owned by root to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...
    Rule Medium Severity
  • The OL 8 Information System Security Officer (ISSO) and System Administrator (SA) (at a minimum) must have mail aliases to be notified of an audit processing failure.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-OS-000047-GPOS-00023

    <GroupDescription></GroupDescription>
    Group
  • The OL 8 System must take appropriate action when an audit processing failure occurs.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-OS-000047-GPOS-00023

    <GroupDescription></GroupDescription>
    Group
  • The OL 8 audit system must take appropriate action when the audit storage volume is full.

    &lt;VulnDiscussion&gt;It is critical that when OL 8 is at risk of failing to process audit logs as required, it takes action to mitigate the failur...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The OL 8 audit system must audit local events.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The OL 8 audit log directory must be group-owned by root to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...
    Rule Medium Severity
  • OL 8 must label all offloaded audit logs before sending them to the central log server.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred and their source, location, and outcome, it would be difficult to establish...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • OL 8 must resolve audit information before writing to disk.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred and their source, location, and outcome, it would be difficult to establish...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • OL 8 audit logs must have a mode of "0600" or less permissive to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • OL 8 audit logs must be owned by root to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules