Red Hat Enterprise Linux 9 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
RHEL 9 must disable storing core dumps.
<VulnDiscussion>A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable core dumps for all users.
<VulnDiscussion>A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable acquiring, saving, and processing core dumps.
<VulnDiscussion>A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable the use of user namespaces.
<VulnDiscussion>User namespaces are used primarily for Linux containers. The value "0" disallows the use of user namespaces.</VulnDiscussi...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement nonexecutable data to protect its memory from unauthorized code execution.
<VulnDiscussion>ExecShield uses the segmentation feature on all x86 systems to prevent execution in memory higher than a certain address. It ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The kdump service on RHEL 9 must be disabled.
<VulnDiscussion>Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps consume a consid...Rule Medium Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
RHEL 9 must not have unauthorized IP tunnels configured.
<VulnDiscussion>IP tunneling mechanisms can be used to bypass network filtering. If tunneling is required, it must be documented with the inf...Rule Medium Severity -
RHEL 9 must check the GPG signature of software packages originating from external software repositories before installation.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the operating system. This require...Rule High Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
RHEL 9 must check the GPG signature of locally installed software packages before installation.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the operating system. This require...Rule High Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
RHEL 9 must have GPG signature verification enabled for all software repositories.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the operating system. This require...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must be configured so that the cryptographic hashes of system files match vendor values.
<VulnDiscussion>The hashes of important files like system executables should match the information given by the RPM database. Executables wit...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.