I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
RHEL 8 must mount /var/log/audit with the nosuid option.
<VulnDiscussion>The organization must identify authorized software programs and permit execution of authorized software. The process used to ...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
RHEL 8 must mount /var/log/audit with the noexec option.
<VulnDiscussion>The organization must identify authorized software programs and permit execution of authorized software. The process used to ...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
RHEL 8 must mount /var/tmp with the nodev option.
<VulnDiscussion>The organization must identify authorized software programs and permit execution of authorized software. The process used to ...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
RHEL 8 must mount /var/tmp with the nosuid option.
<VulnDiscussion>The organization must identify authorized software programs and permit execution of authorized software. The process used to ...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
RHEL 8 must mount /var/tmp with the noexec option.
<VulnDiscussion>The organization must identify authorized software programs and permit execution of authorized software. The process used to ...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
The RHEL 8 fapolicy module must be installed.
<VulnDiscussion>The organization must identify authorized software programs and permit execution of authorized software. The process used to ...Rule Medium Severity -
SRG-OS-000378-GPOS-00163
<GroupDescription></GroupDescription>Group -
RHEL 8 must block unauthorized peripherals before establishing a connection.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...Rule Medium Severity -
SRG-OS-000420-GPOS-00186
<GroupDescription></GroupDescription>Group -
A firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring RHEL 8 can implement rate-limiting measures on impacted network interfaces.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
All RHEL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected commu...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
RHEL 8 must force a frequent session key renegotiation for SSH connections to the server.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected commu...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.