Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000405-GPOS-00184

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.

    &lt;VulnDiscussion&gt;RHEL 9 systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorize...
    Rule High Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must disable mounting of cramfs.

    &lt;VulnDiscussion&gt;It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 must prevent special devices on non-root local partitions.

    &lt;VulnDiscussion&gt;The "nodev" mount option causes the system to not interpret character or block special devices. Executing character or block ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 system commands must have mode 755 or less permissive.

    &lt;VulnDiscussion&gt;If RHEL 9 allowed any user to make changes to software libraries, then those changes might be implemented without undergoing ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 library directories must have mode 755 or less permissive.

    &lt;VulnDiscussion&gt;If RHEL 9 allowed any user to make changes to software libraries, then those changes might be implemented without undergoing ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 library files must have mode 755 or less permissive.

    &lt;VulnDiscussion&gt;If RHEL 9 allowed any user to make changes to software libraries, then those changes might be implemented without undergoing ...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 /var/log directory must have mode 0755 or less permissive.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 /var/log/messages file must have mode 0640 or less permissive.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000256-GPOS-00097

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 audit tools must have a mode of 0755 or less permissive.

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • RHEL 9 cron configuration directories must have a mode of 0700 or less permissive.

    &lt;VulnDiscussion&gt;Service configuration files enable or disable features of their respective services that if configured incorrectly can lead t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules