I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must not have unauthorized accounts.
<VulnDiscussion>Accounts providing no operational purpose provide additional opportunities for system compromise. Unnecessary accounts includ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The root account must be the only account having unrestricted access to RHEL 9 system.
<VulnDiscussion>An account has root authority if it has a user identifier (UID) of "0". Multiple accounts with a UID of "0" afford more oppor...Rule High Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
RHEL 9 must ensure account lockouts persist.
<VulnDiscussion>Having lockouts persist across reboots ensures that account is only unlocked by an administrator. If the lockouts did not per...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
<GroupDescription></GroupDescription>Group -
RHEL 9 groups must have unique Group ID (GID).
<VulnDiscussion>To ensure accountability and prevent unauthenticated access, groups must be identified uniquely to prevent potential misuse a...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Local RHEL 9 initialization files must not execute world-writable programs.
<VulnDiscussion>If user start-up files execute world-writable programs, especially in unprotected directories, they could be maliciously modi...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
RHEL 9 must automatically exit interactive command shell user sessions after 15 minutes of inactivity.
<VulnDiscussion>Terminating an idle interactive command shell user session within a short time period reduces the window of opportunity for u...Rule Medium Severity -
SRG-OS-000027-GPOS-00008
<GroupDescription></GroupDescription>Group -
RHEL 9 must limit the number of concurrent sessions to ten for all accounts and/or account types.
<VulnDiscussion>Operating system management includes the ability to control the number of users and user sessions that utilize an operating s...Rule Low Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
RHEL 9 must log username information when unsuccessful logon attempts occur.
<VulnDiscussion>Without auditing of these events, it may be harder or impossible to identify what an attacker did after an attack.</VulnDi...Rule Medium Severity -
SRG-OS-000480-GPOS-00226
<GroupDescription></GroupDescription>Group -
RHEL 9 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
<VulnDiscussion>Increasing the time between a failed authentication attempt and reprompting to enter credentials helps to slow a single-threa...Rule Medium Severity -
SRG-OS-000480-GPOS-00228
<GroupDescription></GroupDescription>Group -
RHEL 9 must define default permissions for the bash shell.
<VulnDiscussion>The umask controls the default access mode assigned to newly created files. A umask of 077 limits new files to mode 600 or le...Rule Medium Severity -
SRG-OS-000480-GPOS-00228
<GroupDescription></GroupDescription>Group -
RHEL 9 must define default permissions for the c shell.
<VulnDiscussion>The umask controls the default access mode assigned to newly created files. A umask of 077 limits new files to mode 600 or le...Rule Medium Severity -
SRG-OS-000480-GPOS-00228
<GroupDescription></GroupDescription>Group -
RHEL 9 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
<VulnDiscussion>Setting the most restrictive default permissions ensures that when new accounts are created, they do not have unnecessary acc...Rule Medium Severity -
SRG-OS-000480-GPOS-00228
<GroupDescription></GroupDescription>Group -
RHEL 9 must define default permissions for the system default profile.
<VulnDiscussion>The umask controls the default access mode assigned to newly created files. A umask of 077 limits new files to mode 600 or le...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must display the date and time of the last successful account logon upon logon.
<VulnDiscussion>Users need to be aware of activity that occurs regarding their account. Providing users with information regarding the number...Rule Low Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
RHEL 9 must terminate idle user sessions.
<VulnDiscussion>Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...Rule Medium Severity -
SRG-OS-000445-GPOS-00199
<GroupDescription></GroupDescription>Group -
RHEL 9 must use a Linux Security Module configured to enforce limits on system services.
<VulnDiscussion>Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...Rule High Severity -
SRG-OS-000445-GPOS-00199
<GroupDescription></GroupDescription>Group -
RHEL 9 must enable the SELinux targeted policy.
<VulnDiscussion>Setting the SELinux policy to "targeted" or a more specialized policy ensures the system will confine processes that are like...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
RHEL 9 must configure SELinux context type to allow the use of a nondefault faillock tally directory.
<VulnDiscussion>Not having the correct SELinux context on the faillock directory may lead to unauthorized access to the directory.</VulnDi...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must have policycoreutils package installed.
<VulnDiscussion>Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 policycoreutils-python-utils package must be installed.
<VulnDiscussion>The policycoreutils-python-utils package is required to operate and manage an SELinux environment and its policies. It provid...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
RHEL 9 must have the sudo package installed.
<VulnDiscussion>"sudo" is a program designed to allow a system administrator to give limited root privileges to users and log root activity. ...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
<GroupDescription></GroupDescription>Group -
RHEL 9 must require reauthentication when using the "sudo" command.
<VulnDiscussion>Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operat...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must use the invoking user's password for privilege escalation when using "sudo".
<VulnDiscussion>If the rootpw, targetpw, or runaspw flags are defined and not disabled, by default the operating system will prompt the invok...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
<GroupDescription></GroupDescription>Group -
RHEL 9 must require users to reauthenticate for privilege escalation.
<VulnDiscussion>Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operati...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must restrict privilege elevation to authorized personnel.
<VulnDiscussion>If the "sudoers" file is not configured correctly, any user defined on the system can initiate privileged actions on the targ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.