Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must restrict the use of the "su" command.

    &lt;VulnDiscussion&gt;The "su" program allows to run commands with a substitute user and group ID. It is commonly used to run commands as the root ...
    Rule Medium Severity
  • SRG-OS-000370-GPOS-00155

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 fapolicy module must be installed.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000370-GPOS-00155

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 fapolicy module must be enabled.

    &lt;VulnDiscussion&gt;The organization must identify authorized software programs and permit execution of authorized software. The process used to ...
    Rule Medium Severity
  • SRG-OS-000069-GPOS-00037

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must ensure the password complexity module in the system-auth file is configured for three retries or less.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must not allow blank or null passwords.

    &lt;VulnDiscussion&gt;If an account has an empty password, anyone could log in and run commands with the privileges of that account. Accounts with ...
    Rule High Severity
  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must configure the use of the pam_faillock.so module in the /etc/pam.d/system-auth file.

    &lt;VulnDiscussion&gt;If the pam_faillock.so module is not loaded, the system will not correctly lockout accounts to prevent password guessing atta...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must configure the use of the pam_faillock.so module in the /etc/pam.d/password-auth file.

    &lt;VulnDiscussion&gt;If the pam_faillock.so module is not loaded, the system will not correctly lockout accounts to prevent password guessing atta...
    Rule Medium Severity
  • SRG-OS-000069-GPOS-00037

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must ensure the password complexity module is enabled in the password-auth file.

    &lt;VulnDiscussion&gt;Enabling PAM password complexity permits enforcement of strong passwords and consequently makes the system less prone to dict...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must ensure the password complexity module is enabled in the system-auth file.

    &lt;VulnDiscussion&gt;Enabling PAM password complexity permits enforcement of strong passwords and consequently makes the system less prone to dict...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 password-auth must be configured to use a sufficient number of hashing rounds.

    &lt;VulnDiscussion&gt;Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 system-auth must be configured to use a sufficient number of hashing rounds.

    &lt;VulnDiscussion&gt;Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enforce password complexity rules for the root account.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000070-GPOS-00038

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enforce password complexity by requiring that at least one lowercase character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000071-GPOS-00039

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enforce password complexity by requiring that at least one numeric character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000075-GPOS-00043

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 passwords for new users or password changes must have a 24 hours minimum password lifetime restriction in /etc/login.defs.

    &lt;VulnDiscussion&gt;Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enfo...
    Rule Medium Severity
  • SRG-OS-000075-GPOS-00043

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 passwords must have a 24 hours minimum password lifetime restriction in /etc/shadow.

    &lt;VulnDiscussion&gt;Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enfo...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must require users to provide a password for privilege escalation.

    &lt;VulnDiscussion&gt;Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operati...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 passwords must be created with a minimum of 15 characters.

    &lt;VulnDiscussion&gt;The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...
    Rule Medium Severity
  • SRG-OS-000266-GPOS-00101

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enforce password complexity by requiring that at least one special character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00225

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must prevent the use of dictionary words for passwords.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000069-GPOS-00037

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must enforce password complexity by requiring that at least one uppercase character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must require the change of at least eight characters when passwords are changed.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must require the maximum number of repeating characters of the same character class be limited to four when passwords are changed.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must require the maximum number of repeating characters be limited to three when passwords are changed.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must require the change of at least four character classes when passwords are changed.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules