Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000392-GPOS-00172

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the setfiles command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000392-GPOS-00172

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must generate audit records for all unsuccessful account access events.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000392-GPOS-00172

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must generate audit records for all successful account access events.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the passwd command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the unix_chkpwd command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the gpasswd command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the chage command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the userhelper command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the su command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the sudo command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the newgrp command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the chsh command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the mount command and syscall.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the umount command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the postdrop command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the postqueue command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the ssh-keysign command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the crontab command.

    &lt;VulnDiscussion&gt;Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...
    Rule Medium Severity
  • SRG-OS-000471-GPOS-00215

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the pam_timestamp_check command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000471-GPOS-00216

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the create_module syscall.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000471-GPOS-00216

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the init_module and finit_module syscalls.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000471-GPOS-00216

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the delete_module syscall.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000471-GPOS-00216

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must audit all uses of the kmod command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000004-GPOS-00004

    <GroupDescription></GroupDescription>
    Group
  • The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules