Red Hat Enterprise Linux 9 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
RHEL 9 must require a boot loader superuser password.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-ap...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable the ability of systemd to spawn an interactive boot process.
<VulnDiscussion>Using interactive or recovery boot, the console user could disable auditing, firewalls, or other services, weakening system s...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes.
<VulnDiscussion>Having a nondefault grub superuser username makes password-guessing attacks less effective.</VulnDiscussion><FalsePo...Rule High Severity -
RHEL 9 must disable virtual system calls.
<VulnDiscussion>System calls are special routines in the Linux kernel, which userspace applications ask to do privileged tasks. Invoking a sy...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must clear the page allocator to prevent use-after-free attacks.
<VulnDiscussion>Poisoning writes an arbitrary value to freed pages, so any modification or reference to that page after being freed or before...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
<GroupDescription></GroupDescription>Group -
RHEL 9 must clear SLUB/SLAB objects to prevent use-after-free attacks.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations t...Rule Medium Severity -
SRG-OS-000433-GPOS-00193
<GroupDescription></GroupDescription>Group -
RHEL 9 must enable mitigations against processor-based vulnerabilities.
<VulnDiscussion>Kernel page-table isolation is a kernel feature that mitigates the Meltdown security vulnerability and hardens the kernel aga...Rule Low Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must enable auditing of processes that start prior to the audit daemon.
<VulnDiscussion>Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...Rule Low Severity -
SRG-OS-000132-GPOS-00067
<GroupDescription></GroupDescription>Group -
RHEL 9 must restrict access to the kernel message buffer.
<VulnDiscussion>Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...Rule Medium Severity -
SRG-OS-000132-GPOS-00067
<GroupDescription></GroupDescription>Group -
RHEL 9 must prevent kernel profiling by nonprivileged users.
<VulnDiscussion>Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must prevent the loading of a new kernel for later execution.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the operating system. This require...Rule Medium Severity -
SRG-OS-000132-GPOS-00067
<GroupDescription></GroupDescription>Group -
RHEL 9 must restrict exposed kernel pointer addresses access.
<VulnDiscussion>Exposing kernel pointers (through procfs or "seq_printf()") exposes kernel writeable structures, which may contain functions ...Rule Medium Severity -
SRG-OS-000312-GPOS-00123
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable core dump backtraces.
<VulnDiscussion>A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could ...Rule Medium Severity -
RHEL 9 must enable kernel parameters to enforce discretionary access control on hardlinks.
<VulnDiscussion>By enabling the fs.protected_hardlinks kernel parameter, users can no longer create soft or hard links to files they do not o...Rule Medium Severity -
SRG-OS-000312-GPOS-00123
<GroupDescription></GroupDescription>Group -
RHEL 9 must enable kernel parameters to enforce discretionary access control on symlinks.
<VulnDiscussion>By enabling the fs.protected_symlinks kernel parameter, symbolic links are permitted to be followed only when outside a stick...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable the kernel.core_pattern.
<VulnDiscussion>A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
RHEL 9 must be configured to disable the Asynchronous Transfer Mode kernel module.
<VulnDiscussion>Disabling Asynchronous Transfer Mode (ATM) protects the system against exploitation of any flaws in its implementation.</V...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
RHEL 9 must be configured to disable the Controller Area Network kernel module.
<VulnDiscussion>Disabling Controller Area Network (CAN) protects the system against exploitation of any flaws in its implementation.</Vuln...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
RHEL 9 must be configured to disable the FireWire kernel module.
<VulnDiscussion>Disabling firewire protects the system against exploitation of any flaws in its implementation.</VulnDiscussion><Fal...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/passwd- file must be owned by root.
<VulnDiscussion>The "/etc/passwd-" file is a backup file of "/etc/passwd", and as such, contains information about the users that are configu...Rule Medium Severity -
RHEL 9 must disable the Stream Control Transmission Protocol (SCTP) kernel module.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable the Transparent Inter Process Communication (TIPC) kernel module.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000433-GPOS-00193
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.
<VulnDiscussion>Address space layout randomization (ASLR) makes it more difficult for an attacker to predict the location of attack code they...Rule Medium Severity -
SRG-OS-000132-GPOS-00067
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable access to network bpf system call from nonprivileged processes.
<VulnDiscussion>Loading and accessing the packet filters programs and maps using the bpf() system call has the potential of revealing sensiti...Rule Medium Severity -
SRG-OS-000132-GPOS-00067
<GroupDescription></GroupDescription>Group -
RHEL 9 must restrict usage of ptrace to descendant processes.
<VulnDiscussion>Unrestricted usage of ptrace allows compromised binaries to run ptrace on other processes of the user. Like this, the attacke...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must ensure cryptographic verification of vendor software packages.
<VulnDiscussion>Cryptographic verification of vendor software packages ensures that all software packages are obtained from a valid source an...Rule Medium Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.