Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must not forward IPv6 source-routed packets by default.

    &lt;VulnDiscussion&gt;Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than c...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • All RHEL 9 networked systems must have SSH installed.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected commu...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • All RHEL 9 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected commu...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must have the openssh-clients package installed.

    &lt;VulnDiscussion&gt;This package includes utilities to make encrypted connections and transfer files securely to SSH servers.&lt;/VulnDiscussion&...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a SSH logon.

    &lt;VulnDiscussion&gt;The warning message reinforces policy awareness during the logon process and facilitates possible legal action against attack...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must log SSH connection attempts and failures to the server.

    &lt;VulnDiscussion&gt;SSH provides several logging levels with varying amounts of verbosity. "DEBUG" is specifically not recommended other than str...
    Rule Medium Severity
  • SRG-OS-000105-GPOS-00052

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 SSHD must accept public key authentication.

    &lt;VulnDiscussion&gt;Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased. Multifactor a...
    Rule Medium Severity
  • SRG-OS-000106-GPOS-00053

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 SSHD must not allow blank passwords.

    &lt;VulnDiscussion&gt;If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with ...
    Rule High Severity
  • SRG-OS-000109-GPOS-00056

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must not permit direct logons to the root account using remote access via SSH.

    &lt;VulnDiscussion&gt;Even though the communications channel may be encrypted, an additional layer of security is gained by extending the policy of...
    Rule Medium Severity
  • SRG-OS-000125-GPOS-00065

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enable the Pluggable Authentication Module (PAM) interface for SSHD.

    &lt;VulnDiscussion&gt;When UsePAM is set to "yes", PAM runs through account and session types properly. This is important when restricted access to...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules