I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
There must be no "shosts.equiv" files on the OL 8 operating system.
<VulnDiscussion>The "shosts.equiv" files are used to configure host-based authentication for the system via SSH. Host-based authentication is...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
There must be no ".shosts" files on the OL 8 operating system.
<VulnDiscussion>The ".shosts" files are used to configure host-based authentication for individual users or the system via SSH. Host-based au...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must enable the hardware random number generator entropy gatherer service.
<VulnDiscussion>The most important characteristic of a random number generator is its randomness, namely its ability to deliver random number...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must have the packages required to use the hardware random number generator entropy gatherer service.
<VulnDiscussion>The most important characteristic of a random number generator is its randomness, namely its ability to deliver random number...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The OL 8 SSH public host key files must have mode "0644" or less permissive.
<VulnDiscussion>If a public host key file is modified by an unauthorized user, the SSH service may be compromised.</VulnDiscussion><...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The OL 8 SSH private host key files must have mode "0640" or less permissive.
<VulnDiscussion>If an unauthorized user obtains the private SSH host key file, the host could be impersonated.</VulnDiscussion><Fals...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The OL 8 SSH daemon must perform strict mode checking of home directory configuration files.
<VulnDiscussion>If other users have access to modify user-specific SSH configuration files, they may be able to log on to the system as anoth...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The OL 8 SSH daemon must not allow authentication using known host's authentication.
<VulnDiscussion>Configuring this setting for the SSH daemon provides additional assurance that remote logon via SSH will require a password, ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The OL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.
<VulnDiscussion>Configuring this setting for the SSH daemon provides additional assurance that remote logon via SSH will require a password, ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The OL 8 SSH daemon must not allow GSSAPI authentication, except to fulfill documented and validated mission requirements.
<VulnDiscussion>Configuring this setting for the SSH daemon provides additional assurance that remote logon via SSH will require a password, ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must use a separate file system for "/var".
<VulnDiscussion>The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must use a separate file system for "/var/log".
<VulnDiscussion>The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must use a separate file system for the system audit data path.
<VulnDiscussion>The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must use a separate file system for "/tmp".
<VulnDiscussion>The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must use a separate file system for /var/tmp.
<VulnDiscussion>The use of separate file systems for different paths can protect the system from failures resulting from a file system becomi...Rule Medium Severity -
SRG-OS-000109-GPOS-00056
<GroupDescription></GroupDescription>Group -
OL 8 must not permit direct logons to the root account using remote access via SSH.
<VulnDiscussion>Although the communications channel may be encrypted, an additional layer of security is gained by extending the policy of no...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must have the rsyslog service enabled and active.
<VulnDiscussion>Configuring OL 8 to implement organization-wide security implementation guides and security checklists ensures compliance wit...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.
<VulnDiscussion>The "nosuid" mount option causes the system not to execute "setuid" and "setgid" files with owner privileges. This option mus...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.
<VulnDiscussion>The "nosuid" mount option causes the system not to execute "setuid" and "setgid" files with owner privileges. This option mus...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.
<VulnDiscussion>The "nosuid" mount option causes the system not to execute "setuid" and "setgid" files with owner privileges. This option mus...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must prevent special devices on non-root local partitions.
<VulnDiscussion>The "nodev" mount option causes the system to not interpret character or block special devices. Executing character or block ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 file systems that contain user home directories must not execute binary files.
<VulnDiscussion>The "noexec" mount option causes the system not to execute binary files. This option must be used for mounting any file syste...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 file systems must not interpret character or block special devices from untrusted file systems.
<VulnDiscussion>The "nodev" mount option causes the system not to interpret character or block special devices. Executing character or block ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 file systems must not execute binary files on removable media.
<VulnDiscussion>The "noexec" mount option causes the system not to execute binary files. This option must be used for mounting any file syste...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
<VulnDiscussion>The "nosuid" mount option causes the system not to execute "setuid" and "setgid" files with owner privileges. This option mus...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.