Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must be a vendor-supported release.

    &lt;VulnDiscussion&gt;An operating system release is considered "supported" if the vendor continues to provide security patches for the product. Wi...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 vendor packaged system security patches and updates must be installed and up to date.

    &lt;VulnDiscussion&gt;Installing software updates is a fundamental mitigation against the exploitation of publicly known vulnerabilities. If the mo...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a command line user logon.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the operating system ensures privacy and se...
    Rule Medium Severity
  • SRG-OS-000191-GPOS-00080

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must implement the Endpoint Security for Linux Threat Prevention tool.

    &lt;VulnDiscussion&gt;Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the operating syste...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The graphical display manager must not be the default target on RHEL 9 unless approved.

    &lt;VulnDiscussion&gt;Unnecessary service packages must not be installed to decrease the attack surface of the system. Graphical display managers h...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enable the hardware random number generator entropy gatherer service.

    &lt;VulnDiscussion&gt;The most important characteristic of a random number generator is its randomness, namely its ability to deliver random number...
    Rule Low Severity
  • SRG-OS-000269-GPOS-00103

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 systemd-journald service must be enabled.

    &lt;VulnDiscussion&gt;In the event of a system failure, RHEL 9 must preserve any information necessary to determine cause of failure and any inform...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • The systemd Ctrl-Alt-Delete burst key sequence in RHEL 9 must be disabled.

    &lt;VulnDiscussion&gt;A locally logged-on user who presses Ctrl-Alt-Delete when at the console can reboot the system. If accidentally pressed, as c...
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 9.

    &lt;VulnDiscussion&gt;A locally logged-on user who presses Ctrl-Alt-Delete when at the console can reboot the system. If accidentally pressed, as c...
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 debug-shell systemd service must be disabled.

    &lt;VulnDiscussion&gt;The debug-shell requires no authentication and provides root privileges to anyone who has physical access to the machine. Whi...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must require a boot loader superuser password.

    &lt;VulnDiscussion&gt;To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-ap...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must disable the ability of systemd to spawn an interactive boot process.

    &lt;VulnDiscussion&gt;Using interactive or recovery boot, the console user could disable auditing, firewalls, or other services, weakening system s...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes.

    &lt;VulnDiscussion&gt;Having a nondefault grub superuser username makes password-guessing attacks less effective.&lt;/VulnDiscussion&gt;&lt;FalsePo...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 /boot/grub2/grub.cfg file must be group-owned by root.

    &lt;VulnDiscussion&gt;The "root" group is a highly privileged group. Furthermore, the group-owner of this file should not have any access privilege...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 /boot/grub2/grub.cfg file must be owned by root.

    &lt;VulnDiscussion&gt;The " /boot/grub2/grub.cfg" file stores sensitive system configuration. Protection of this file is critical for system securi...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must disable virtual system calls.

    &lt;VulnDiscussion&gt;System calls are special routines in the Linux kernel, which userspace applications ask to do privileged tasks. Invoking a sy...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must clear the page allocator to prevent use-after-free attacks.

    &lt;VulnDiscussion&gt;Poisoning writes an arbitrary value to freed pages, so any modification or reference to that page after being freed or before...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00192

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must clear SLUB/SLAB objects to prevent use-after-free attacks.

    &lt;VulnDiscussion&gt;Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations t...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00193

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enable mitigations against processor-based vulnerabilities.

    &lt;VulnDiscussion&gt;Kernel page-table isolation is a kernel feature that mitigates the Meltdown security vulnerability and hardens the kernel aga...
    Rule Low Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enable auditing of processes that start prior to the audit daemon.

    &lt;VulnDiscussion&gt;Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...
    Rule Low Severity
  • SRG-OS-000132-GPOS-00067

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must restrict access to the kernel message buffer.

    &lt;VulnDiscussion&gt;Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...
    Rule Medium Severity
  • SRG-OS-000132-GPOS-00067

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must prevent kernel profiling by nonprivileged users.

    &lt;VulnDiscussion&gt;Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must prevent the loading of a new kernel for later execution.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the operating system. This require...
    Rule Medium Severity
  • SRG-OS-000132-GPOS-00067

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must restrict exposed kernel pointer addresses access.

    &lt;VulnDiscussion&gt;Exposing kernel pointers (through procfs or "seq_printf()") exposes kernel writeable structures, which may contain functions ...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00123

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enable kernel parameters to enforce discretionary access control on hardlinks.

    &lt;VulnDiscussion&gt;By enabling the fs.protected_hardlinks kernel parameter, users can no longer create soft or hard links to files they do not o...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules