I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable the kernel.core_pattern.
<VulnDiscussion>A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
RHEL 9 must be configured to disable the Asynchronous Transfer Mode kernel module.
<VulnDiscussion>Disabling Asynchronous Transfer Mode (ATM) protects the system against exploitation of any flaws in its implementation.</V...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
RHEL 9 must be configured to disable the Controller Area Network kernel module.
<VulnDiscussion>Disabling Controller Area Network (CAN) protects the system against exploitation of any flaws in its implementation.</Vuln...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
RHEL 9 must be configured to disable the FireWire kernel module.
<VulnDiscussion>Disabling firewire protects the system against exploitation of any flaws in its implementation.</VulnDiscussion><Fal...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable the Stream Control Transmission Protocol (SCTP) kernel module.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable the Transparent Inter Process Communication (TIPC) kernel module.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000433-GPOS-00193
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.
<VulnDiscussion>Address space layout randomization (ASLR) makes it more difficult for an attacker to predict the location of attack code they...Rule Medium Severity -
SRG-OS-000132-GPOS-00067
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable access to network bpf system call from nonprivileged processes.
<VulnDiscussion>Loading and accessing the packet filters programs and maps using the bpf() system call has the potential of revealing sensiti...Rule Medium Severity -
SRG-OS-000132-GPOS-00067
<GroupDescription></GroupDescription>Group -
RHEL 9 must restrict usage of ptrace to descendant processes.
<VulnDiscussion>Unrestricted usage of ptrace allows compromised binaries to run ptrace on other processes of the user. Like this, the attacke...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable core dump backtraces.
<VulnDiscussion>A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable storing core dumps.
<VulnDiscussion>A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable core dumps for all users.
<VulnDiscussion>A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable acquiring, saving, and processing core dumps.
<VulnDiscussion>A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must disable the use of user namespaces.
<VulnDiscussion>User namespaces are used primarily for Linux containers. The value "0" disallows the use of user namespaces.</VulnDiscussi...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
<GroupDescription></GroupDescription>Group -
RHEL 9 must implement nonexecutable data to protect its memory from unauthorized code execution.
<VulnDiscussion>ExecShield uses the segmentation feature on all x86 systems to prevent execution in memory higher than a certain address. It ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The kdump service on RHEL 9 must be disabled.
<VulnDiscussion>Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps consume a consid...Rule Medium Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
RHEL 9 must ensure cryptographic verification of vendor software packages.
<VulnDiscussion>Cryptographic verification of vendor software packages ensures that all software packages are obtained from a valid source an...Rule Medium Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
RHEL 9 must check the GPG signature of software packages originating from external software repositories before installation.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the operating system. This require...Rule High Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
RHEL 9 must check the GPG signature of locally installed software packages before installation.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the operating system. This require...Rule High Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
RHEL 9 must have GPG signature verification enabled for all software repositories.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the operating system. This require...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must be configured so that the cryptographic hashes of system files match vendor values.
<VulnDiscussion>The hashes of important files like system executables should match the information given by the RPM database. Executables wit...Rule Medium Severity -
SRG-OS-000437-GPOS-00194
<GroupDescription></GroupDescription>Group -
RHEL 9 must remove all software components after updated versions have been installed.
<VulnDiscussion>Previous versions of software components that are not removed from the information system after updates have been installed m...Rule Low Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
RHEL 9 subscription-manager package must be installed.
<VulnDiscussion>The Red Hat Subscription Manager application manages software subscriptions and software repositories for installed software ...Rule Medium Severity -
SRG-OS-000074-GPOS-00042
<GroupDescription></GroupDescription>Group -
RHEL 9 must not have a File Transfer Protocol (FTP) server package installed.
<VulnDiscussion>The FTP service provides an unencrypted remote access that does not provide for the confidentiality and integrity of user pas...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
RHEL 9 must not have the sendmail package installed.
<VulnDiscussion>The sendmail software was not developed with security in mind, and its design prevents it from being effectively contained by...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.