III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
RHEL 9 must mount /var/tmp with the noexec option.
<VulnDiscussion>The "noexec" mount option causes the system to not execute binary files. This option must be used for mounting any file syste...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
RHEL 9 must mount /var/tmp with the nosuid option.
<VulnDiscussion>The "nosuid" mount option causes the system to not execute "setuid" and "setgid" files with owner privileges. This option mus...Rule Medium Severity -
SRG-OS-000405-GPOS-00184
<GroupDescription></GroupDescription>Group -
RHEL 9 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.
<VulnDiscussion>RHEL 9 systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorize...Rule High Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable mounting of cramfs.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must prevent special devices on non-root local partitions.
<VulnDiscussion>The "nodev" mount option causes the system to not interpret character or block special devices. Executing character or block ...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
RHEL 9 system commands must have mode 755 or less permissive.
<VulnDiscussion>If RHEL 9 allowed any user to make changes to software libraries, then those changes might be implemented without undergoing ...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
RHEL 9 library directories must have mode 755 or less permissive.
<VulnDiscussion>If RHEL 9 allowed any user to make changes to software libraries, then those changes might be implemented without undergoing ...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
RHEL 9 library files must have mode 755 or less permissive.
<VulnDiscussion>If RHEL 9 allowed any user to make changes to software libraries, then those changes might be implemented without undergoing ...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
RHEL 9 /var/log directory must have mode 0755 or less permissive.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
RHEL 9 /var/log/messages file must have mode 0640 or less permissive.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000256-GPOS-00097
<GroupDescription></GroupDescription>Group -
RHEL 9 audit tools must have a mode of 0755 or less permissive.
<VulnDiscussion>Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 cron configuration directories must have a mode of 0700 or less permissive.
<VulnDiscussion>Service configuration files enable or disable features of their respective services that if configured incorrectly can lead t...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
All RHEL 9 local initialization files must have mode 0740 or less permissive.
<VulnDiscussion>Local initialization files are used to configure the user's shell environment upon logon. Malicious modification of these fil...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
All RHEL 9 local interactive user home directories must have mode 0750 or less permissive.
<VulnDiscussion>Excessive permissions on local interactive user home directories may allow unauthorized access to user files by other users.&...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access.
<VulnDiscussion>The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is imp...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/group- file must have mode 0644 or less permissive to prevent unauthorized access.
<VulnDiscussion>The "/etc/group-" file is a backup file of "/etc/group", and as such, contains information regarding groups that are configur...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access.
<VulnDiscussion>The "/etc/gshadow" file contains group password hashes. Protection of this file is critical for system security.</VulnDisc...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/gshadow- file must have mode 0000 or less permissive to prevent unauthorized access.
<VulnDiscussion>The "/etc/gshadow-" file is a backup of "/etc/gshadow", and as such, contains group password hashes. Protection of this file ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/passwd file must have mode 0644 or less permissive to prevent unauthorized access.
<VulnDiscussion>If the "/etc/passwd" file is writable by a group-owner or the world the risk of its compromise is increased. The file contain...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/passwd- file must have mode 0644 or less permissive to prevent unauthorized access.
<VulnDiscussion>The "/etc/passwd-" file is a backup file of "/etc/passwd", and as such, contains information about the users that are configu...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/shadow- file must have mode 0000 or less permissive to prevent unauthorized access.
<VulnDiscussion>The "/etc/shadow-" file is a backup file of "/etc/shadow", and as such, contains the list of local system accounts and passwo...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/group file must be owned by root.
<VulnDiscussion>The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is imp...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/group file must be group-owned by root.
<VulnDiscussion>The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is imp...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/group- file must be owned by root.
<VulnDiscussion>The "/etc/group-" file is a backup file of "/etc/group", and as such, contains information regarding groups that are configur...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 /etc/group- file must be group-owned by root.
<VulnDiscussion>The "/etc/group-" file is a backup file of "/etc/group", and as such, contains information regarding groups that are configur...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.