Skip to content

Red Hat Enterprise Linux 9 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • RHEL 9 must protect against or limit the effects of denial-of-service (DoS) attacks by ensuring rate-limiting measures on impacted network interfaces are implemented.

    <VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-OS-000096-GPOS-00050

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enable hardening for the Berkeley Packet Filter just-in-time compiler.

    &lt;VulnDiscussion&gt;When hardened, the extended Berkeley Packet Filter (BPF) just-in-time (JIT) compiler will randomize any kernel addresses in t...
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must have the chrony package installed.

    &lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 chronyd service must be enabled.

    &lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must securely compare internal information system clocks at least every 24 hours.

    &lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...
    Rule Medium Severity
  • SRG-OS-000096-GPOS-00050

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must disable the chrony daemon from acting as a server.

    &lt;VulnDiscussion&gt;Minimizing the exposure of the server functionality of the chrony daemon diminishes the attack surface. Satisfies: SRG-OS-00...
    Rule Low Severity
  • SRG-OS-000096-GPOS-00050

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must disable network management of the chrony daemon.

    &lt;VulnDiscussion&gt;Not exposing the management interface of the chrony daemon on the network diminishes the attack space. Satisfies: SRG-OS-000...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 systems using Domain Name Servers (DNS) resolution must have at least two name servers configured.

    &lt;VulnDiscussion&gt;To provide availability for name resolution services, multiple redundant name servers are mandated. A failure in name resolut...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must configure a DNS processing mode in Network Manager.

    &lt;VulnDiscussion&gt;In order to ensure that DNS resolver settings are respected, a DNS mode in Network Manager must be configured.&lt;/VulnDiscus...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must forward mail from postmaster to the root account using a postfix alias.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules