Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured.

    IP tunneling mechanisms can be used to bypass network filtering. If tunneling is required, it must be documented with the Information System Security Officer (ISSO).
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Red Hat Enterprise Linux operating system must not forward IPv6 source-routed packets.

    Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security me...
    Rule Medium Severity
  • SRG-OS-000375-GPOS-00160

    Group
  • The Red Hat Enterprise Linux operating system must have the required packages for multifactor authentication installed.

    Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the information system is compromised, that compromise will not affect cred...
    Rule Medium Severity
  • SRG-OS-000375-GPOS-00160

    Group
  • The Red Hat Enterprise Linux operating system must implement multifactor authentication for access to privileged accounts via pluggable authentication modules (PAM).

    Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the information system is compromised, that compromise will not affect cred...
    Rule Medium Severity
  • SRG-OS-000375-GPOS-00160

    Group
  • The Red Hat Enterprise Linux operating system must implement certificate status checking for PKI authentication.

    Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the information system is compromised, that compromise will not affect cred...
    Rule Medium Severity
  • SRG-OS-000424-GPOS-00188

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that all wireless network adapters are disabled.

    The use of wireless networking can introduce many different attack vectors into the organization's network. Common attack vectors such as malicious association and ad hoc networks will allow an att...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Red Hat Enterprise Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.

    Without cryptographic integrity protections, system command and files can be altered by unauthorized users without detection. Cryptographic mechanisms used for protecting the integrity of informat...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Red Hat Enterprise Linux operating system must implement the Endpoint Security for Linux Threat Prevention tool.

    Adding endpoint security tools can provide the capability to automatically take actions in response to malicious behavior, which can provide additional agility in reacting to network threats. These...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Red Hat Enterprise Linux operating system must use a virus scan program.

    Virus scanning software can be used to protect a system from penetration from computer viruses and to limit their spread through intermediate systems. The virus scanning software should be confi...
    Rule High Severity
  • SRG-OS-000029-GPOS-00010

    Group
  • The Red Hat Enterprise Linux operating system must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface.

    A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not want to log out because of the temporary...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules