Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000062-GPOS-00031

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enable Linux audit logging for the USBGuard daemon.

    &lt;VulnDiscussion&gt;Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...
    Rule Low Severity
  • SRG-OS-000378-GPOS-00163

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must block unauthorized peripherals before establishing a connection.

    &lt;VulnDiscussion&gt;The USBguard-daemon is the main component of the USBGuard software framework. It runs as a service in the background and enfo...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 Bluetooth must be disabled.

    &lt;VulnDiscussion&gt;This requirement applies to wireless peripheral technologies (e.g., wireless mice, keyboards, displays, etc.) used with RHEL ...
    Rule Medium Severity
  • SRG-OS-000299-GPOS-00117

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 wireless network adapters must be disabled.

    &lt;VulnDiscussion&gt;This requirement applies to wireless peripheral technologies (e.g., wireless mice, keyboards, displays, etc.) used with RHEL ...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 user account passwords for new users or password changes must have a 60-day maximum password lifetime restriction in /etc/login.defs.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked; therefore, passwords need to be changed periodically. If the ...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 user account passwords must have a 60-day maximum password lifetime restriction.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked; therefore, passwords need to be changed periodically. If RHEL...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All RHEL 9 local interactive user accounts must be assigned a home directory upon creation.

    &lt;VulnDiscussion&gt;If local interactive users are not assigned a valid home directory, there is no place for the storage and control of files th...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must set the umask value to 077 for all local interactive user accounts.

    &lt;VulnDiscussion&gt;The umask controls the default access mode assigned to newly created files. A umask of 077 limits new files to mode 600 or le...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 duplicate User IDs (UIDs) must not exist for interactive users.

    &lt;VulnDiscussion&gt;To ensure accountability and prevent unauthenticated access, interactive users must be identified and authenticated to preven...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 system accounts must not have an interactive login shell.

    &lt;VulnDiscussion&gt;Ensuring shells are not given to system accounts upon login makes it more difficult for attackers to make use of system accou...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules