Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000132-GPOS-00067

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must restrict access to the kernel message buffer.

    &lt;VulnDiscussion&gt;Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...
    Rule Medium Severity
  • SRG-OS-000132-GPOS-00067

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must prevent kernel profiling by nonprivileged users.

    &lt;VulnDiscussion&gt;Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must prevent the loading of a new kernel for later execution.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the operating system. This require...
    Rule Medium Severity
  • SRG-OS-000132-GPOS-00067

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must restrict exposed kernel pointer addresses access.

    &lt;VulnDiscussion&gt;Exposing kernel pointers (through procfs or "seq_printf()") exposes kernel writeable structures, which may contain functions ...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00123

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enable kernel parameters to enforce discretionary access control on hardlinks.

    &lt;VulnDiscussion&gt;By enabling the fs.protected_hardlinks kernel parameter, users can no longer create soft or hard links to files they do not o...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00123

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enable kernel parameters to enforce discretionary access control on symlinks.

    &lt;VulnDiscussion&gt;By enabling the fs.protected_symlinks kernel parameter, symbolic links are permitted to be followed only when outside a stick...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must disable the kernel.core_pattern.

    &lt;VulnDiscussion&gt;A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must be configured to disable the Asynchronous Transfer Mode kernel module.

    &lt;VulnDiscussion&gt;Disabling Asynchronous Transfer Mode (ATM) protects the system against exploitation of any flaws in its implementation.&lt;/V...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must be configured to disable the Controller Area Network kernel module.

    &lt;VulnDiscussion&gt;Disabling Controller Area Network (CAN) protects the system against exploitation of any flaws in its implementation.&lt;/Vuln...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must be configured to disable the FireWire kernel module.

    &lt;VulnDiscussion&gt;Disabling firewire protects the system against exploitation of any flaws in its implementation.&lt;/VulnDiscussion&gt;&lt;Fal...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules