I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
<VulnDiscussion>The actions taken by system administrators must be audited to keep a record of what was executed on the system, as well as fo...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
<VulnDiscussion>The actions taken by system administrators must be audited to keep a record of what was executed on the system, as well as fo...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
<VulnDiscussion>In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modification...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
<VulnDiscussion>In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modification...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
<VulnDiscussion>In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modification...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
<VulnDiscussion>In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modification...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
<VulnDiscussion>In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modification...Rule Medium Severity -
SRG-OS-000392-GPOS-00172
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/faillock.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000392-GPOS-00172
<GroupDescription></GroupDescription>Group -
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/tallylog.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-OS-000046-GPOS-00022
<GroupDescription></GroupDescription>Group -
RHEL 9 must take appropriate action when a critical audit processing failure occurs.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000462-GPOS-00206
<GroupDescription></GroupDescription>Group -
RHEL 9 audit system must protect logon UIDs from unauthorized change.
<VulnDiscussion>If modification of login user identifiers (UIDs) is not prevented, they can be changed by nonprivileged users and make auditi...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
RHEL 9 audit system must protect auditing rules from unauthorized change.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
RHEL 9 must enable FIPS mode.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating ...Rule High Severity -
SRG-OS-000073-GPOS-00041
<GroupDescription></GroupDescription>Group -
RHEL 9 must employ FIPS 140-3 approved cryptographic hashing algorithms for all stored passwords.
<VulnDiscussion>The system must use a strong hashing algorithm to store the password. Passwords need to be protected at all times, and encry...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
RHEL 9 IP tunnels must use FIPS 140-2/140-3 approved cryptographic algorithms.
<VulnDiscussion>Overriding the system crypto policy makes the behavior of the Libreswan service violate expectations, and makes system config...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
<GroupDescription></GroupDescription>Group -
RHEL 9 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-3 approved cryptographic hashing algorithm for system authentication.
<VulnDiscussion>Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and; therefore, cannot be...Rule Medium Severity -
SRG-OS-000396-GPOS-00176
<GroupDescription></GroupDescription>Group -
RHEL 9 must have the crypto-policies package installed.
<VulnDiscussion>Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...Rule Medium Severity -
SRG-OS-000396-GPOS-00176
<GroupDescription></GroupDescription>Group -
RHEL 9 crypto policy must not be overridden.
<VulnDiscussion>Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...Rule Medium Severity -
SRG-OS-000120-GPOS-00061
<GroupDescription></GroupDescription>Group -
RHEL 9 must use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
<VulnDiscussion>Overriding the system crypto policy makes the behavior of Kerberos violate expectations, and makes system configuration more ...Rule Medium Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement DOD-approved TLS encryption in the GnuTLS package.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Transport L...Rule High Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement DOD-approved encryption in the OpenSSL package.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule Medium Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement DOD-approved TLS encryption in the OpenSSL package.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...Rule Medium Severity -
SRG-OS-000396-GPOS-00176
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement a systemwide encryption policy.
<VulnDiscussion>Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement DOD-approved encryption in the bind package.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Cryptograph...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.