Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000033-GPOS-00014

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 IP tunnels must use FIPS 140-2/140-3 approved cryptographic algorithms.

    &lt;VulnDiscussion&gt;Overriding the system crypto policy makes the behavior of the Libreswan service violate expectations, and makes system config...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-3 approved cryptographic hashing algorithm for system authentication.

    &lt;VulnDiscussion&gt;Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and; therefore, cannot be...
    Rule Medium Severity
  • SRG-OS-000396-GPOS-00176

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must have the crypto-policies package installed.

    &lt;VulnDiscussion&gt;Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...
    Rule Medium Severity
  • SRG-OS-000396-GPOS-00176

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 crypto policy must not be overridden.

    &lt;VulnDiscussion&gt;Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.

    &lt;VulnDiscussion&gt;Overriding the system crypto policy makes the behavior of Kerberos violate expectations, and makes system configuration more ...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must implement DOD-approved TLS encryption in the GnuTLS package.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Transport L...
    Rule High Severity
  • SRG-OS-000250-GPOS-00093

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must implement DOD-approved encryption in the OpenSSL package.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must implement DOD-approved TLS encryption in the OpenSSL package.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule Medium Severity
  • SRG-OS-000396-GPOS-00176

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must implement a systemwide encryption policy.

    &lt;VulnDiscussion&gt;Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run ...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must implement DOD-approved encryption in the bind package.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Cryptograph...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules