Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The rsyslog service on RHEL 9 must be active.

    &lt;VulnDiscussion&gt;The "rsyslog" service must be running to provide logging services, which are essential to system administration.&lt;/VulnDisc...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.

    &lt;VulnDiscussion&gt;Unintentionally running a rsyslog server accepting remote messages puts the system at increased risk. Malicious rsyslog messa...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    <GroupDescription></GroupDescription>
    Group
  • All RHEL 9 remote access methods must be monitored.

    &lt;VulnDiscussion&gt;Logging remote access methods can be used to trace the decrease in the risks associated with remote user access management. I...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must be configured to offload audit records onto a different system from the system being audited via syslog.

    &lt;VulnDiscussion&gt;The auditd service does not include the ability to send audit records to a centralized server for management directly. Howeve...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must authenticate the remote logging server for offloading audit logs via rsyslog.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must encrypt the transfer of audit records offloaded onto a different system or media from the system being audited via rsyslog.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must encrypt via the gtls driver the transfer of audit records offloaded onto a different system or media from the system being audited via rsyslog.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...
    Rule Medium Severity
  • SRG-OS-000479-GPOS-00224

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must be configured to forward audit records via TCP to a different system or media from the system being audited via rsyslog.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must use cron logging.

    &lt;VulnDiscussion&gt;Cron logging can be used to trace the successful or unsuccessful execution of cron jobs. It can also be used to spot intrusio...
    Rule Medium Severity
  • SRG-OS-000062-GPOS-00031

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 audit package must be installed.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it...
    Rule Medium Severity
  • SRG-OS-000062-GPOS-00031

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 audit service must be enabled.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events ...
    Rule Medium Severity
  • SRG-OS-000047-GPOS-00023

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 audit system must take appropriate action when an error writing to the audit storage volume occurs.

    &lt;VulnDiscussion&gt;It is critical that when the operating system is at risk of failing to process audit logs as required, it takes action to mit...
    Rule Medium Severity
  • SRG-OS-000047-GPOS-00023

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 audit system must take appropriate action when the audit storage volume is full.

    &lt;VulnDiscussion&gt;It is critical that when the operating system is at risk of failing to process audit logs as required, it takes action to mit...
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must allocate audit record storage capacity to store at least one week's worth of audit records.

    &lt;VulnDiscussion&gt;To ensure RHEL 9 systems have a sufficient storage capacity in which to write the audit logs, RHEL 9 needs to be able to allo...
    Rule Medium Severity
  • SRG-OS-000343-GPOS-00134

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must take action when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity.

    &lt;VulnDiscussion&gt;If security personnel are not notified immediately when storage volume reaches 75 percent utilization, they are unable to pla...
    Rule Medium Severity
  • SRG-OS-000343-GPOS-00134

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must notify the system administrator (SA) and information system security officer (ISSO) (at a minimum) when allocated audit record storage volume 75 percent utilization.

    &lt;VulnDiscussion&gt;If security personnel are not notified immediately when storage volume reaches 75 percent utilization, they are unable to pla...
    Rule Medium Severity
  • SRG-OS-000343-GPOS-00134

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must take action when allocated audit record storage volume reaches 95 percent of the audit record storage capacity.

    &lt;VulnDiscussion&gt;If action is not taken when storage volume reaches 95 percent utilization, the auditing system may fail when the storage volu...
    Rule Medium Severity
  • SRG-OS-000343-GPOS-00134

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must take action when allocated audit record storage volume reaches 95 percent of the repository maximum audit record storage capacity.

    &lt;VulnDiscussion&gt;If action is not taken when storage volume reaches 95 percent utilization, the auditing system may fail when the storage volu...
    Rule Medium Severity
  • SRG-OS-000047-GPOS-00023

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 audit system must take appropriate action when the audit files have reached maximum size.

    &lt;VulnDiscussion&gt;It is critical that when the operating system is at risk of failing to process audit logs as required, it takes action to mit...
    Rule Medium Severity
  • SRG-OS-000039-GPOS-00017

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must label all offloaded audit logs before sending them to the central log server.

    &lt;VulnDiscussion&gt;Enriched logging is needed to determine who, what, and when events occur on a system. Without this, determining root cause of...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must take appropriate action when the internal event queue is full.

    &lt;VulnDiscussion&gt;The audit system should have an action setup in the event the internal event queue becomes full so that no data is lost. Inf...
    Rule Medium Severity
  • SRG-OS-000046-GPOS-00022

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 System Administrator (SA) and/or information system security officer (ISSO) (at a minimum) must be alerted of an audit processing failure event.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-OS-000062-GPOS-00031

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 audit system must audit local events.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 audit logs must be group-owned by root or by a restricted logging group to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 audit log directory must be owned by root to prevent unauthorized read access.

    &lt;VulnDiscussion&gt;Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules