Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using "sudo".

    The sudoers security policy requires that users authenticate themselves before they can use sudo. When sudoers requires authentication, it validates the invoking user's credentials. If the rootpw, ...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    Group
  • The Red Hat Enterprise Linux operating system must require re-authentication when using the "sudo" command.

    Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability,...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Red Hat Enterprise Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.

    If the system does not require valid authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all file...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • Red Hat Enterprise Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.

    If the system does not require valid authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all file...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Red Hat Enterprise Linux operating system must confine SELinux users to roles that conform to least privilege.

    Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privilege...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Red Hat Enterprise Linux operating system must not allow privileged accounts to utilize SSH.

    Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileg...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The Red Hat Enterprise Linux operating system must elevate the SELinux context when an administrator calls the sudo command.

    Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privilege...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Red Hat Enterprise Linux operating system must not have accounts configured with blank or null passwords.

    If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments.
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Red Hat Enterprise Linux operating system must specify the default "include" directory for the /etc/sudoers file.

    The "sudo" command allows authorized users to run programs (including shells) as other users, system users, and root. The "/etc/sudoers" file is used to configure authorized "sudo" users as well as...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    Group
  • The Red Hat Enterprise Linux operating system must not be configured to bypass password requirements for privilege escalation.

    Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability,...
    Rule Medium Severity
  • SRG-OS-000445-GPOS-00199

    Group
  • The Red Hat Enterprise Linux operating system must use a file integrity tool to verify correct operation of all security functions.

    Without verification of the security functions, security functions may not operate correctly, and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwa...
    Rule Medium Severity
  • SRG-OS-000123-GPOS-00064

    Group
  • The Red Hat Enterprise Linux operating system must automatically expire temporary accounts within 72 hours.

    Temporary accounts are privileged or nonprivileged accounts that are established during pressing circumstances, such as new software or hardware configuration or an incident response, where the nee...
    Rule Medium Severity
  • SRG-OS-000033-GPOS-00014

    Group
  • The Red Hat Enterprise Linux operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.

    The use of FIPS-validated cryptographic algorithms is enforced by enabling kernel FIPS mode. In the event that kernel FIPS mode is disabled, the use of nonvalidated cryptographic algorithms will be...
    Rule Medium Severity
  • SRG-OS-000029-GPOS-00010

    Group
  • The Red Hat Enterprise Linux operating system must have the screen package installed.

    A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporar...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • The Red Hat Enterprise Linux operating system must restrict access to the kernel message buffer.

    Restricting access to the kernel message buffer limits access only to root. This prevents attackers from gaining additional system information as a non-privileged user.
    Rule Low Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • The Red Hat Enterprise Linux operating system must be configured to prevent overwriting of custom authentication configuration settings by the authconfig utility.

    When using the authconfig utility to modify authentication configuration settings, the "system-auth" and "password-auth" files and any custom settings that they may contain are overwritten. This ca...
    Rule Medium Severity
  • SRG-OS-000366-GPOS-00153

    Group
  • The Red Hat Enterprise Linux operating system must ensure cryptographic verification of vendor software packages.

    Cryptographic verification of vendor software packages ensures that all software packages are obtained from a valid source and protects against spoofing that could lead to installation of malware o...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Red Hat Enterprise Linux operating system must disable the login screen user list for graphical user interfaces.

    Leaving the user list enabled is a security risk as it allows anyone with physical access to the system to enumerate known user accounts without authenticated access to the system.
    Rule Medium Severity
  • SRG-OS-000363-GPOS-00150

    Group
  • The Red Hat Enterprise Linux operating system must be configured to allow sending email notifications of configuration changes and adverse events to designated personnel.

    Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized access to the operating system. Changes to operating system configuratio...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules