Red Hat Enterprise Linux 9 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
RHEL 9 must be configured to prevent unrestricted mail relaying.
<VulnDiscussion>If unrestricted mail relaying is permitted, unauthorized senders could use this host as a mail relay for the purpose of sendi...Rule Medium Severity -
SRG-OS-000046-GPOS-00022
<GroupDescription></GroupDescription>Group -
RHEL 9 SSH daemon must display the date and time of the last successful account logon upon an SSH logon.
<VulnDiscussion>Providing users feedback on when account accesses last occurred facilitates user recognition and reporting of unauthorized ac...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 system accounts must not have an interactive login shell.
<VulnDiscussion>Ensuring shells are not given to system accounts upon login makes it more difficult for attackers to make use of system accou...Rule Medium Severity -
SRG-OS-000123-GPOS-00064
<GroupDescription></GroupDescription>Group -
RHEL 9 must configure the use of the pam_faillock.so module in the /etc/pam.d/password-auth file.
<VulnDiscussion>If the pam_faillock.so module is not loaded, the system will not correctly lockout accounts to prevent password guessing atta...Rule Medium Severity -
SRG-OS-000069-GPOS-00037
<GroupDescription></GroupDescription>Group -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
SRG-OS-000072-GPOS-00040
<GroupDescription></GroupDescription>Group -
SRG-OS-000375-GPOS-00160
<GroupDescription></GroupDescription>Group -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
SRG-OS-000047-GPOS-00023
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/gshadow file must be group-owned by root.
<VulnDiscussion>The "/etc/gshadow" file contains group password hashes. Protection of this file is critical for system security.</VulnDisc...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /boot/grub2/grub.cfg file must be group-owned by root.
<VulnDiscussion>The "root" group is a highly privileged group. Furthermore, the group-owner of this file should not have any access privilege...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /boot/grub2/grub.cfg file must be owned by root.
<VulnDiscussion>The " /boot/grub2/grub.cfg" file stores sensitive system configuration. Protection of this file is critical for system securi...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access.
<VulnDiscussion>The "/etc/gshadow" file contains group password hashes. Protection of this file is critical for system security.</VulnDisc...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/gshadow- file must be owned by root.
<VulnDiscussion>The "/etc/gshadow-" file is a backup of "/etc/gshadow", and as such, contains group password hashes. Protection of this file ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/gshadow- file must be group-owned by root.
<VulnDiscussion>The "/etc/gshadow-" file is a backup of "/etc/gshadow", and as such, contains group password hashes. Protection of this file ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/passwd file must be owned by root.
<VulnDiscussion>The "/etc/passwd" file contains information about the users that are configured on the system. Protection of this file is cri...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/passwd file must be group-owned by root.
<VulnDiscussion>The "/etc/passwd" file contains information about the users that are configured on the system. Protection of this file is cri...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must be a vendor-supported release.
<VulnDiscussion>An operating system release is considered "supported" if the vendor continues to provide security patches for the product. Wi...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 vendor packaged system security patches and updates must be installed and up to date.
<VulnDiscussion>Installing software updates is a fundamental mitigation against the exploitation of publicly known vulnerabilities. If the mo...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
<GroupDescription></GroupDescription>Group -
RHEL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a command line user logon.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the operating system ensures privacy and se...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The graphical display manager must not be the default target on RHEL 9 unless approved.
<VulnDiscussion>Unnecessary service packages must not be installed to decrease the attack surface of the system. Graphical display managers h...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must enable the hardware random number generator entropy gatherer service.
<VulnDiscussion>The most important characteristic of a random number generator is its randomness, namely its ability to deliver random number...Rule Low Severity -
SRG-OS-000269-GPOS-00103
<GroupDescription></GroupDescription>Group -
RHEL 9 systemd-journald service must be enabled.
<VulnDiscussion>In the event of a system failure, RHEL 9 must preserve any information necessary to determine cause of failure and any inform...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The systemd Ctrl-Alt-Delete burst key sequence in RHEL 9 must be disabled.
<VulnDiscussion>A locally logged-on user who presses Ctrl-Alt-Delete when at the console can reboot the system. If accidentally pressed, as c...Rule High Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 9.
<VulnDiscussion>A locally logged-on user who presses Ctrl-Alt-Delete when at the console can reboot the system. If accidentally pressed, as c...Rule High Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
RHEL 9 debug-shell systemd service must be disabled.
<VulnDiscussion>The debug-shell requires no authentication and provides root privileges to anyone who has physical access to the machine. Whi...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.