Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000046-GPOS-00022

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must take appropriate action when a critical audit processing failure occurs.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-OS-000462-GPOS-00206

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 audit system must protect logon UIDs from unauthorized change.

    &lt;VulnDiscussion&gt;If modification of login user identifiers (UIDs) is not prevented, they can be changed by nonprivileged users and make auditi...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 audit system must protect auditing rules from unauthorized change.

    &lt;VulnDiscussion&gt;Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...
    Rule Medium Severity
  • SRG-OS-000033-GPOS-00014

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enable FIPS mode.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating ...
    Rule High Severity
  • SRG-OS-000073-GPOS-00041

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must employ FIPS 140-3 approved cryptographic hashing algorithms for all stored passwords.

    &lt;VulnDiscussion&gt;The system must use a strong hashing algorithm to store the password. Passwords need to be protected at all times, and encry...
    Rule Medium Severity
  • SRG-OS-000033-GPOS-00014

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 IP tunnels must use FIPS 140-2/140-3 approved cryptographic algorithms.

    &lt;VulnDiscussion&gt;Overriding the system crypto policy makes the behavior of the Libreswan service violate expectations, and makes system config...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-3 approved cryptographic hashing algorithm for system authentication.

    &lt;VulnDiscussion&gt;Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and; therefore, cannot be...
    Rule Medium Severity
  • SRG-OS-000396-GPOS-00176

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must have the crypto-policies package installed.

    &lt;VulnDiscussion&gt;Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...
    Rule Medium Severity
  • SRG-OS-000478-GPOS-00223

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 crypto policy files must match files shipped with the operating system.

    &lt;VulnDiscussion&gt;The RHEL 9 package "crypto-policies" defines the cryptography policies for the system. If the files are changed from those s...
    Rule High Severity
  • SRG-OS-000396-GPOS-00176

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 crypto policy must not be overridden.

    &lt;VulnDiscussion&gt;Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.

    &lt;VulnDiscussion&gt;Overriding the system crypto policy makes the behavior of Kerberos violate expectations, and makes system configuration more ...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must implement DOD-approved TLS encryption in the GnuTLS package.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Transport L...
    Rule High Severity
  • SRG-OS-000250-GPOS-00093

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must implement DOD-approved encryption in the OpenSSL package.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must implement DOD-approved TLS encryption in the OpenSSL package.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule Medium Severity
  • SRG-OS-000396-GPOS-00176

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must implement a system-wide encryption policy.

    &lt;VulnDiscussion&gt;Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must implement DOD-approved encryption in the bind package.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Cryptograph...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules