Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000250-GPOS-00093

    Group
  • The RHEL 8 operating system must implement DOD-approved encryption to protect the confidentiality of SSH server connections.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DOD nonpublic information systems by an auth...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must ensure the SSH server uses strong entropy.

    The most important characteristic of a random number generator is its randomness, namely its ability to deliver random numbers that are impossible to predict. Entropy in computer security is associ...
    Rule Low Severity
  • SRG-OS-000250-GPOS-00093

    Group
  • The RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an auth...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    Group
  • The RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DoD nonpublic information systems by an auth...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    Group
  • The RHEL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Transport Layer Security (TLS) encryption is a required security setting as a numbe...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • RHEL 8 system commands must have mode 755 or less permissive.

    If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • RHEL 8 system commands must be owned by root.

    If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • RHEL 8 system commands must be group-owned by root or a system account.

    If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • RHEL 8 library files must have mode 755 or less permissive.

    If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • RHEL 8 library files must be owned by root.

    If RHEL 8 were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust ch...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules