III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000047-GPOS-00023
<GroupDescription></GroupDescription>Group -
The RHEL 8 System must take appropriate action when an audit processing failure occurs.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000047-GPOS-00023
<GroupDescription></GroupDescription>Group -
The RHEL 8 audit system must take appropriate action when the audit storage volume is full.
<VulnDiscussion>It is critical that when RHEL 8 is at risk of failing to process audit logs as required, it takes action to mitigate the fail...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The RHEL 8 audit system must audit local events.
<VulnDiscussion>Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it...Rule Medium Severity -
SRG-OS-000342-GPOS-00133
<GroupDescription></GroupDescription>Group -
RHEL 8 must label all off-loaded audit logs before sending them to the central log server.
<VulnDiscussion>Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 8 must resolve audit information before writing to disk.
<VulnDiscussion>Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it...Rule Low Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
RHEL 8 audit logs must have a mode of 0600 or less permissive to prevent unauthorized read access.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
RHEL 8 audit logs must be owned by root to prevent unauthorized read access.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
RHEL 8 audit logs must be group-owned by root to prevent unauthorized read access.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
RHEL 8 audit log directory must be owned by root to prevent unauthorized read access.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
RHEL 8 audit log directory must be group-owned by root to prevent unauthorized read access.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.