Red Hat Enterprise Linux 9 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the init_module and finit_module system calls.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the chage command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
<VulnDiscussion>The actions taken by system administrators must be audited to keep a record of what was executed on the system, as well as fo...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the chsh command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the crontab command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the gpasswd command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
<VulnDiscussion>The actions taken by system administrators must be audited to keep a record of what was executed on the system, as well as fo...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the kmod command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the newgrp command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the pam_timestamp_check command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
<VulnDiscussion>In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modification...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the passwd command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the postdrop command.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the postqueue command.
<VulnDiscussion>Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
<VulnDiscussion>In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modification...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the ssh-agent command.
<VulnDiscussion>Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the ssh-keysign command.
<VulnDiscussion>Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the su command.
<VulnDiscussion>Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
<VulnDiscussion>In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modification...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the sudo command.
<VulnDiscussion>Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the sudoedit command.
<VulnDiscussion>Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the unix_chkpwd command.
<VulnDiscussion>Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
<VulnDiscussion>In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modification...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the unix_update command.
<VulnDiscussion>Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the userhelper command.
<VulnDiscussion>Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.