Oracle Linux 8 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The OL 8 "/var/log/messages" file must be group-owned by root.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The OL 8 "/var/log" directory must have mode 0755 or less permissive.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The OL 8 "/var/log" directory must be owned by root.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The OL 8 "/var/log" directory must be group-owned by root.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
The OL 8 SSH daemon must be configured to use system-wide crypto policies.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
<GroupDescription></GroupDescription>Group -
The OL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote ac...Rule Medium Severity -
SRG-OS-000125-GPOS-00065
<GroupDescription></GroupDescription>Group -
OL 8 must use a separate file system for "/var".
<VulnDiscussion>The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...Rule Low Severity -
OL 8 library files must be owned by root.
<VulnDiscussion>If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing t...Rule Medium Severity -
The OL 8 SSH server must be configured to use only ciphers employing FIPS 140-2 validated cryptographic algorithms.
<VulnDiscussion>Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be r...Rule Medium Severity -
SRG-OS-000480-GPOS-00232
<GroupDescription></GroupDescription>Group -
The OL 8 SSH server must be configured to use strong entropy.
<VulnDiscussion>The most important characteristic of a random number generator is its randomness, namely its ability to deliver random number...Rule Low Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
The OL 8 operating system must implement DoD-approved encryption in the OpenSSL package.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote ac...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.