Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000120-GPOS-00061

    Group
  • The krb5-workstation package must not be installed on OL 8.

    Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied on to provide confidentiality or integrity, and DoD data may be co...
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    Group
  • The krb5-server package must not be installed on OL 8.

    Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied on to provide confidentiality or integrity, and DoD data may be co...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • OL 8 must use a Linux Security Module configured to enforce limits on system services.

    Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    Group
  • OL 8 must have the "policycoreutils" package installed.

    Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...
    Rule Low Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • A sticky bit must be set on all OL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.

    Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of ...
    Rule Medium Severity
  • SRG-OS-000126-GPOS-00066

    Group
  • OL 8 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.

    Terminating an unresponsive SSH session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or con...
    Rule Medium Severity
  • SRG-OS-000126-GPOS-00066

    Group
  • OL 8 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive.

    Terminating an unresponsive SSH session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or con...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    Group
  • The OL 8 "/var/log/messages" file must have mode 0640 or less permissive.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the OL 8 system or platform...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    Group
  • The OL 8 "/var/log/messages" file must be owned by root.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the OL 8 system or platform...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    Group
  • The OL 8 "/var/log/messages" file must be group-owned by root.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the OL 8 system or platform...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    Group
  • The OL 8 "/var/log" directory must have mode 0755 or less permissive.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the OL 8 system or platform...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    Group
  • The OL 8 "/var/log" directory must be owned by root.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the OL 8 system or platform...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    Group
  • The OL 8 "/var/log" directory must be group-owned by root.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the OL 8 system or platform...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    Group
  • The OL 8 SSH daemon must be configured to use system-wide crypto policies.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an auth...
    Rule Medium Severity
  • SRG-OS-000125-GPOS-00065

    Group
  • The OL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an au...
    Rule Medium Severity
  • SRG-OS-000125-GPOS-00065

    Group
  • The OL 8 SSH server must be configured to use only ciphers employing FIPS 140-2 validated cryptographic algorithms.

    Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied on to provide confidentiality or integrity, and DoD data may be co...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00232

    Group
  • The OL 8 SSH server must be configured to use strong entropy.

    The most important characteristic of a random number generator is its randomness, namely its ability to deliver random numbers that are impossible to predict. Entropy in computer security is associ...
    Rule Low Severity
  • SRG-OS-000250-GPOS-00093

    Group
  • The OL 8 operating system must implement DoD-approved encryption in the OpenSSL package.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an au...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    Group
  • The OL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an aut...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    Group
  • The OL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Transport Layer Security (TLS) encryption is a required security setting as a num...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • OL 8 system commands must have mode 755 or less permissive.

    If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change ma...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • OL 8 system commands must be owned by root.

    If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change ma...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • OL 8 system commands must be group-owned by root or a system account.

    If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change ma...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • OL 8 library files must have mode 755 or less permissive.

    If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change ma...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • OL 8 library files must be owned by root.

    If OL 8 were to allow any user to make changes to software libraries, those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change ma...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules