I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000373-GPOS-00156
Group -
RHEL 8 must require users to reauthenticate for privilege escalation.
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, i...Rule Medium Severity -
SRG-OS-000375-GPOS-00160
Group -
RHEL 8 must have the packages required for multifactor authentication installed.
Using an authentication device, such as a DoD Common Access Card (CAC) or token that is separate from the information system, ensures that even if the information system is compromised, credentials...Rule Medium Severity -
SRG-OS-000375-GPOS-00160
Group -
RHEL 8 must implement certificate status checking for multifactor authentication.
Using an authentication device, such as a DoD Common Access Card (CAC) or token that is separate from the information system, ensures that even if the information system is compromised, credentials...Rule Medium Severity -
SRG-OS-000376-GPOS-00161
Group -
RHEL 8 must accept Personal Identity Verification (PIV) credentials.
The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. The DoD has mandated the use of the Common Access Card (CAC) to support identity management and ...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
Group -
RHEL 8 must implement non-executable data to protect its memory from unauthorized code execution.
Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory incl...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
Group -
RHEL 8 must clear the page allocator to prevent use-after-free attacks.
Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory incl...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
Group -
RHEL 8 must disable virtual syscalls.
Syscalls are special routines in the Linux kernel, which userspace applications ask to do privileged tasks. Invoking a system call is an expensive operation because the processor must interrupt th...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
Group -
RHEL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks.
Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory inclu...Rule Medium Severity -
SRG-OS-000433-GPOS-00193
Group -
RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.
Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory incl...Rule Medium Severity -
SRG-OS-000437-GPOS-00194
Group -
YUM must remove all software components after updated versions have been installed on RHEL 8.
Previous versions of software components that are not removed from the information system after updates have been installed may be exploited by adversaries. Some information technology products may...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.