Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must disable the transparent inter-process communication (TIPC) protocol.

    &lt;VulnDiscussion&gt;It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...
    Rule Low Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must disable mounting of cramfs.

    &lt;VulnDiscussion&gt;It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...
    Rule Low Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must disable IEEE 1394 (FireWire) Support.

    &lt;VulnDiscussion&gt;It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...
    Rule Low Severity
  • SRG-OS-000096-GPOS-00050

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity
  • SRG-OS-000114-GPOS-00059

    <GroupDescription></GroupDescription>
    Group
  • The RHEL 8 file system automounter must be disabled unless required.

    &lt;VulnDiscussion&gt;Automatically mounting file systems permits easy introduction of unknown devices, thereby facilitating malicious activity.&lt...
    Rule Medium Severity
  • SRG-OS-000114-GPOS-00059

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must be configured to disable USB mass storage.

    &lt;VulnDiscussion&gt;USB mass storage permits easy introduction of unknown devices, thereby facilitating malicious activity. Satisfies: SRG-OS-00...
    Rule Medium Severity
  • SRG-OS-000297-GPOS-00115

    <GroupDescription></GroupDescription>
    Group
  • A RHEL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.

    &lt;VulnDiscussion&gt;Failure to restrict network connectivity only to authorized systems permits inbound connections from malicious systems. It al...
    Rule Medium Severity
  • SRG-OS-000297-GPOS-00115

    <GroupDescription></GroupDescription>
    Group
  • A firewall must be installed on RHEL 8.

    &lt;VulnDiscussion&gt;"Firewalld" provides an easy and effective way to block/limit remote access to the system via ports, services, and protocols....
    Rule Medium Severity
  • SRG-OS-000299-GPOS-00117

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 wireless network adapters must be disabled.

    &lt;VulnDiscussion&gt;Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unpr...
    Rule Medium Severity
  • SRG-OS-000300-GPOS-00118

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 Bluetooth must be disabled.

    &lt;VulnDiscussion&gt;Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unpr...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /dev/shm with the nodev option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /dev/shm with the nosuid option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /dev/shm with the noexec option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /tmp with the nodev option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /tmp with the nosuid option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /tmp with the noexec option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /var/log with the nodev option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /var/log with the nosuid option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /var/log with the noexec option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /var/log/audit with the nodev option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /var/log/audit with the nosuid option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /var/log/audit with the noexec option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /var/tmp with the nodev option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /var/tmp with the nosuid option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • RHEL 8 must mount /var/tmp with the noexec option.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules