Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000075-GPOS-00043

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that passwords for new users are restricted to a 24 hours/1 day minimum lifetime.

    Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually...
    Rule Medium Severity
  • SRG-OS-000075-GPOS-00043

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that passwords are restricted to a 24 hours/1 day minimum lifetime.

    Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that passwords for new users are restricted to a 60-day maximum lifetime.

    Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that existing passwords are restricted to a 60-day maximum lifetime.

    Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...
    Rule Medium Severity
  • SRG-OS-000077-GPOS-00045

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that passwords are prohibited from reuse for a minimum of five generations.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that passwords are a minimum of 15 characters in length.

    The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Red Hat Enterprise Linux operating system must not allow accounts configured with blank or null passwords.

    If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments.
    Rule High Severity
  • SRG-OS-000106-GPOS-00053

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using an empty password.

    Configuring this setting for the SSH daemon provides additional assurance that remote logon via SSH will require a password, even in the event of misconfiguration elsewhere.
    Rule High Severity
  • SRG-OS-000118-GPOS-00060

    Group
  • The Red Hat Enterprise Linux operating system must disable account identifiers (individuals, groups, roles, and devices) if the password expires.

    Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts...
    Rule Medium Severity
  • SRG-OS-000329-GPOS-00128

    Group
  • The Red Hat Enterprise Linux operating system must be configured to lock accounts for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the a...
    Rule Medium Severity
  • SRG-OS-000329-GPOS-00128

    Group
  • The Red Hat Enterprise Linux operating system must lock the associated account after three unsuccessful root logon attempts are made within a 15-minute period.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the a...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that users must provide a password for privilege escalation.

    Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability,...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that users must re-authenticate for privilege escalation.

    Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability,...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00226

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that the delay between logon prompts following a failed console logon attempt is at least four seconds.

    Configuring the operating system to implement organization-wide security implementation guides and security checklists verifies compliance with federal standards and establishes a common security b...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    Group
  • The Red Hat Enterprise Linux operating system must not allow an unattended or automatic logon to the system via a graphical user interface.

    Failure to restrict system access to authenticated users negatively impacts operating system security.
    Rule High Severity
  • SRG-OS-000480-GPOS-00229

    Group
  • The Red Hat Enterprise Linux operating system must not allow an unrestricted logon to the system.

    Failure to restrict system access to authenticated users negatively impacts operating system security.
    Rule High Severity
  • SRG-OS-000480-GPOS-00229

    Group
  • The Red Hat Enterprise Linux operating system must not allow users to override SSH environment variables.

    Failure to restrict system access to authenticated users negatively impacts operating system security.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    Group
  • The Red Hat Enterprise Linux operating system must not allow a non-certificate trusted host SSH logon to the system.

    Failure to restrict system access to authenticated users negatively impacts operating system security.
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • The Red Hat Enterprise Linux operating system must require authentication upon booting into single-user and maintenance modes.

    If the system does not require valid root authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Red Hat Enterprise Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.

    If the system does not require valid authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all file...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Red Hat Enterprise Linux operating systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes.

    If the system does not require valid authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all file...
    Rule High Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • The Red Hat Enterprise Linux operating system must uniquely identify and must authenticate organizational users (or processes acting on behalf of organizational users) using multifactor authentication.

    To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The Red Hat Enterprise Linux operating system must not have the rsh-server package installed.

    It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooke...
    Rule High Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The Red Hat Enterprise Linux operating system must not have the ypserv package installed.

    Removing the "ypserv" package decreases the risk of the accidental (or intentional) activation of NIS or NIS+ services.
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Red Hat Enterprise Linux operating system must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privilege...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules