Skip to content

DISA STIG for Red Hat Enterprise Linux CoreOS

Rules and Groups employed by this XCCDF Profile

  • Configure immutable Audit login UIDs

    Configure kernel to prevent modification of login UIDs once they are set. Changing login UIDs while this configuration is enforced requires special...
    Rule Medium Severity
  • Configure auditing of unsuccessful file modifications

    Ensure that unsuccessful attempts to modify a file are audited. The following rules configure audit as described above: <pre>## Unsuccessful file ...
    Rule Medium Severity
  • GRUB2 bootloader configuration

    During the boot process, the boot loader is responsible for starting the execution of the kernel and passing options to it. The boot loader allows ...
    Group
  • Disable vsyscalls

    To disable use of virtual syscalls, add the argument <code>vsyscall=none</code> to all BLS (Boot Loader Specification) entries ('options' line) for...
    Rule Medium Severity
  • Configure Syslog

    The syslog service has been the default Unix logging mechanism for many years. It has a number of downsides, including inconsistent log format, lac...
    Group
  • systemd-journald

    systemd-journald is a system service that collects and stores logging data. It creates and maintains structured, indexed journals based on logging ...
    Group
  • Verify Group Who Owns the system journal

    To properly set the group owner of <code>/var/log/journal/.*/system.journal</code>, run the command: <pre>$ sudo chgrp systemd-journal /var/log/jo...
    Rule Medium Severity
  • Verify Owner on the system journal

    To properly set the owner of <code>/var/log/journal/.*/system.journal</code>, run the command: <pre>$ sudo chown root /var/log/journal/.*/system.j...
    Rule Medium Severity
  • Verify Permissions on the system journal

    To properly set the permissions of <code>/var/log/journal/.*/system.journal</code>, run the command: <pre>$ sudo chmod 0640 /var/log/journal/.*/sy...
    Rule Medium Severity
  • File Permissions and Masks

    Traditional Unix security relies heavily on file and directory permissions to prevent unauthorized users from reading or modifying files to which t...
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules