Red Hat Enterprise Linux 9 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the usermod command.
<VulnDiscussion>Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
<VulnDiscussion>In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modification...Rule Medium Severity -
SRG-OS-000392-GPOS-00172
<GroupDescription></GroupDescription>Group -
RHEL 9 must audit all uses of the mount command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000477-GPOS-00222
<GroupDescription></GroupDescription>Group -
Successful/unsuccessful uses of the init command in RHEL 9 must generate an audit record.
<VulnDiscussion>Misuse of the init command may cause availability issues for the system.</VulnDiscussion><FalsePositives></Fal...Rule Medium Severity -
SRG-OS-000477-GPOS-00222
<GroupDescription></GroupDescription>Group -
Successful/unsuccessful uses of the poweroff command in RHEL 9 must generate an audit record.
<VulnDiscussion>Misuse of the poweroff command may cause availability issues for the system.</VulnDiscussion><FalsePositives><...Rule Medium Severity -
SRG-OS-000477-GPOS-00222
<GroupDescription></GroupDescription>Group -
Successful/unsuccessful uses of the reboot command in RHEL 9 must generate an audit record.
<VulnDiscussion>Misuse of the reboot command may cause availability issues for the system.</VulnDiscussion><FalsePositives></F...Rule Medium Severity -
SRG-OS-000477-GPOS-00222
<GroupDescription></GroupDescription>Group -
Successful/unsuccessful uses of the shutdown command in RHEL 9 must generate an audit record.
<VulnDiscussion>Misuse of the shutdown command may cause availability issues for the system.</VulnDiscussion><FalsePositives><...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
Successful/unsuccessful uses of the umount system call in RHEL 9 must generate an audit record.
<VulnDiscussion>The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise ...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/faillock.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000392-GPOS-00172
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/tallylog.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000046-GPOS-00022
<GroupDescription></GroupDescription>Group -
RHEL 9 must take appropriate action when a critical audit processing failure occurs.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000462-GPOS-00206
<GroupDescription></GroupDescription>Group -
RHEL 9 audit system must protect logon UIDs from unauthorized change.
<VulnDiscussion>If modification of login user identifiers (UIDs) is not prevented, they can be changed by nonprivileged users and make auditi...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
RHEL 9 audit system must protect auditing rules from unauthorized change.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity -
RHEL 9 must enable FIPS mode.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating ...Rule High Severity -
SRG-OS-000073-GPOS-00041
<GroupDescription></GroupDescription>Group -
RHEL 9 must employ FIPS 140-3 approved cryptographic hashing algorithms for all stored passwords.
<VulnDiscussion>The system must use a strong hashing algorithm to store the password. Passwords need to be protected at all times, and encry...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
RHEL 9 IP tunnels must use FIPS 140-2/140-3 approved cryptographic algorithms.
<VulnDiscussion>Overriding the system crypto policy makes the behavior of the Libreswan service violate expectations, and makes system config...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
<GroupDescription></GroupDescription>Group -
RHEL 9 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-3 approved cryptographic hashing algorithm for system authentication.
<VulnDiscussion>Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and; therefore, cannot be...Rule Medium Severity -
SRG-OS-000396-GPOS-00176
<GroupDescription></GroupDescription>Group -
RHEL 9 must have the crypto-policies package installed.
<VulnDiscussion>Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...Rule Medium Severity -
SRG-OS-000396-GPOS-00176
<GroupDescription></GroupDescription>Group -
RHEL 9 crypto policy must not be overridden.
<VulnDiscussion>Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...Rule Medium Severity -
SRG-OS-000120-GPOS-00061
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement DOD-approved TLS encryption in the GnuTLS package.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Transport L...Rule High Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement DOD-approved encryption in the OpenSSL package.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule Medium Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement DOD-approved TLS encryption in the OpenSSL package.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule Medium Severity -
SRG-OS-000396-GPOS-00176
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement a systemwide encryption policy.
<VulnDiscussion>Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement DOD-approved encryption in the bind package.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Cryptograph...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.