Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the chsh command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the crontab command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the gpasswd command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the kmod command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the newgrp command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the pam_timestamp_check command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the passwd command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the postdrop command.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the postqueue command.

    &lt;VulnDiscussion&gt;Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the ssh-agent command.

    &lt;VulnDiscussion&gt;Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the ssh-keysign command.

    &lt;VulnDiscussion&gt;Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the su command.

    &lt;VulnDiscussion&gt;Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the sudo command.

    &lt;VulnDiscussion&gt;Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the sudoedit command.

    &lt;VulnDiscussion&gt;Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the unix_chkpwd command.

    &lt;VulnDiscussion&gt;Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the unix_update command.

    &lt;VulnDiscussion&gt;Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the userhelper command.

    &lt;VulnDiscussion&gt;Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the usermod command.

    &lt;VulnDiscussion&gt;Without generating audit record specific to the security and mission needs of the organization, it would be difficult to esta...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must audit all uses of the mount command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000477-GPOS-00222

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the init command in RHEL 9 must generate an audit record.

    &lt;VulnDiscussion&gt;Misuse of the init command may cause availability issues for the system.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/Fal...
    Rule Medium Severity
  • SRG-OS-000477-GPOS-00222

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the poweroff command in RHEL 9 must generate an audit record.

    &lt;VulnDiscussion&gt;Misuse of the poweroff command may cause availability issues for the system.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;...
    Rule Medium Severity
  • SRG-OS-000477-GPOS-00222

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the reboot command in RHEL 9 must generate an audit record.

    &lt;VulnDiscussion&gt;Misuse of the reboot command may cause availability issues for the system.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/F...
    Rule Medium Severity
  • SRG-OS-000477-GPOS-00222

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the shutdown command in RHEL 9 must generate an audit record.

    &lt;VulnDiscussion&gt;Misuse of the shutdown command may cause availability issues for the system.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the umount system call in RHEL 9 must generate an audit record.

    &lt;VulnDiscussion&gt;The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise ...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • Successful/unsuccessful uses of the umount2 system call in RHEL 9 must generate an audit record.

    &lt;VulnDiscussion&gt;The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules