Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the chmod, fchmod, and fchmodat system calls.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the chown, fchown, fchownat, and lchown system calls.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of umount system calls.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the chacl command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the setfacl command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the chcon command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the semanage command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the setfiles command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the setsebool command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the rename, unlink, rmdir, renameat, and unlinkat system calls.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the delete_module system call.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the init_module and finit_module system calls.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the chage command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the chsh command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the crontab command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the gpasswd command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the kmod command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the newgrp command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the pam_timestamp_check command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the passwd command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the postdrop command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the postqueue command.

    &lt;VulnDiscussion&gt;Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the ssh-agent command.

    &lt;VulnDiscussion&gt;Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules