Skip to content

Red Hat Enterprise Linux 9 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • RHEL 9 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-3 approved cryptographic hashing algorithm for system authentication.

    <VulnDiscussion>Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and; therefore, cannot be...
    Rule Medium Severity
  • SRG-OS-000396-GPOS-00176

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must have the crypto-policies package installed.

    &lt;VulnDiscussion&gt;Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...
    Rule Medium Severity
  • SRG-OS-000396-GPOS-00176

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 crypto policy must not be overridden.

    &lt;VulnDiscussion&gt;Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules