Skip to content

Red Hat Enterprise Linux 8 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • RHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.

    <VulnDiscussion>Without the capability to restrict the roles and individuals that can select which events are audited, unauthorized personnel...
    Rule Medium Severity
  • SRG-OS-000256-GPOS-00097

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 audit tools must have a mode of 0755 or less permissive.

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000256-GPOS-00097

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 audit tools must be owned by root.

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000256-GPOS-00097

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 audit tools must be group-owned by root.

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000278-GPOS-00108

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools.

    &lt;VulnDiscussion&gt;Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit in...
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must allocate audit record storage capacity to store at least one week of audit records, when audit records are not immediately sent to a central audit record storage facility.

    &lt;VulnDiscussion&gt;To ensure RHEL 8 systems have a sufficient storage capacity in which to write the audit logs, RHEL 8 needs to be able to allo...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must encrypt the transfer of audit records off-loaded onto a different system or media from the system being audited.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must have the packages required for offloading audit logs installed.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must have the packages required for encrypting offloaded audit logs installed.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • The RHEL 8 audit records must be off-loaded onto a different system or storage media from the system being audited.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules