Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must not have unnecessary accounts.

    Accounts providing no operational purpose provide additional opportunities for system compromise. Unnecessary accounts include user accounts for individuals not requiring access to the system and a...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must not allow accounts configured with blank or null passwords.

    If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments.
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must display the date and time of the last successful account logon upon logon.

    Providing users with feedback on when account accesses last occurred facilitates user recognition and reporting of unauthorized account use.
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must display the date and time of the last successful account logon upon an SSH logon.

    Providing users with feedback on when account accesses via SSH last occurred facilitates user recognition and reporting of unauthorized account use.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00228

    Group
  • RHEL 8 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.

    Setting the most restrictive default permissions ensures that when new accounts are created, they do not have unnecessary access.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00228

    Group
  • RHEL 8 must set the umask value to 077 for all local interactive user accounts.

    The umask controls the default access mode assigned to newly created files. A umask of 077 limits new files to mode 600 or less permissive. Although umask can be represented as a four-digit number,...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must define default permissions for logon and non-logon shells.

    The umask controls the default access mode assigned to newly created files. A umask of 077 limits new files to mode 600 or less permissive. Although umask can be represented as a four-digit number,...
    Rule Medium Severity
  • SRG-OS-000326-GPOS-00126

    Group
  • The RHEL 8 audit system must be configured to audit the execution of privileged functions and prevent all software from executing at higher privilege levels than users executing the software.

    Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • Cron logging must be implemented in RHEL 8.

    Cron logging can be used to trace the successful or unsuccessful execution of cron jobs. It can also be used to spot intrusions into the use of the cron facility by unauthorized and malicious users.
    Rule Medium Severity
  • SRG-OS-000046-GPOS-00022

    Group
  • The RHEL 8 System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) must be alerted of an audit processing failure event.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...
    Rule Medium Severity
  • SRG-OS-000046-GPOS-00022

    Group
  • The RHEL 8 Information System Security Officer (ISSO) and System Administrator (SA) (at a minimum) must have mail aliases to be notified of an audit processing failure.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...
    Rule Medium Severity
  • SRG-OS-000047-GPOS-00023

    Group
  • The RHEL 8 System must take appropriate action when an audit processing failure occurs.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...
    Rule Medium Severity
  • SRG-OS-000047-GPOS-00023

    Group
  • The RHEL 8 audit system must take appropriate action when the audit storage volume is full.

    It is critical that when RHEL 8 is at risk of failing to process audit logs as required, it takes action to mitigate the failure. Audit processing failures include software/hardware errors; failure...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The RHEL 8 audit system must audit local events.

    Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it would be difficult to establish, correlate, and investigate the events ...
    Rule Medium Severity
  • SRG-OS-000342-GPOS-00133

    Group
  • RHEL 8 must label all off-loaded audit logs before sending them to the central log server.

    Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it would be difficult to establish, correlate, and investigate the events ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 8 must resolve audit information before writing to disk.

    Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it would be difficult to establish, correlate, and investigate the events ...
    Rule Low Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • RHEL 8 audit logs must have a mode of 0600 or less permissive to prevent unauthorized read access.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the RHEL 8 system or platfo...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • RHEL 8 audit logs must be owned by root to prevent unauthorized read access.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the RHEL 8 system or platfo...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • RHEL 8 audit logs must be group-owned by root to prevent unauthorized read access.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • RHEL 8 audit log directory must be owned by root to prevent unauthorized read access.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • RHEL 8 audit log directory must be group-owned by root to prevent unauthorized read access.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • RHEL 8 audit log directory must have a mode of 0700 or less permissive to prevent unauthorized read access.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • RHEL 8 audit system must protect auditing rules from unauthorized change.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • RHEL 8 audit system must protect logon UIDs from unauthorized change.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000062-GPOS-00031

    Group
  • RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules