Red Hat Enterprise Linux 8 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The RHEL 8 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
<VulnDiscussion>Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be r...Rule Medium Severity -
SRG-OS-000120-GPOS-00061
<GroupDescription></GroupDescription>Group -
RHEL 8 must prevent system daemons from using Kerberos for authentication.
<VulnDiscussion>Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be r...Rule Medium Severity -
SRG-OS-000120-GPOS-00061
<GroupDescription></GroupDescription>Group -
The krb5-workstation package must not be installed on RHEL 8.
<VulnDiscussion>Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be r...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
<GroupDescription></GroupDescription>Group -
RHEL 8 must use a Linux Security Module configured to enforce limits on system services.
<VulnDiscussion>Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
<GroupDescription></GroupDescription>Group -
RHEL 8 must have policycoreutils package installed.
<VulnDiscussion>Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...Rule Low Severity -
A sticky bit must be set on all RHEL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.
<VulnDiscussion>Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
RHEL 8 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.
<VulnDiscussion>Terminating an unresponsive SSH session within a short time period reduces the window of opportunity for unauthorized personn...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The RHEL 8 /var/log/messages file must have mode 0640 or less permissive.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The RHEL 8 /var/log/messages file must be owned by root.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The RHEL 8 /var/log/messages file must be group-owned by root.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The RHEL 8 /var/log directory must have mode 0755 or less permissive.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The RHEL 8 /var/log directory must be owned by root.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The RHEL 8 /var/log directory must be group-owned by root.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
The RHEL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule Medium Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
The RHEL 8 operating system must implement DoD-approved encryption to protect the confidentiality of SSH server connections.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 8 must ensure the SSH server uses strong entropy.
<VulnDiscussion>The most important characteristic of a random number generator is its randomness, namely its ability to deliver random number...Rule Low Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
The RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule Medium Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
The RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule Medium Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
SRG-OS-000376-GPOS-00161
<GroupDescription></GroupDescription>Group -
RHEL 8 must accept Personal Identity Verification (PIV) credentials.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. The DoD has mandated the...Rule Medium Severity -
The RHEL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Transport L...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
RHEL 8 system commands must have mode 755 or less permissive.
<VulnDiscussion>If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without under...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
RHEL 8 system commands must be owned by root.
<VulnDiscussion>If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without under...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
RHEL 8 system commands must be group-owned by root or a system account.
<VulnDiscussion>If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without under...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
RHEL 8 library files must have mode 755 or less permissive.
<VulnDiscussion>If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without under...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
SRG-OS-000433-GPOS-00192
<GroupDescription></GroupDescription>Group -
RHEL 8 library files must be owned by root.
<VulnDiscussion>If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without under...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.