Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 9 must be a vendor-supported release.

    An operating system release is considered "supported" if the vendor continues to provide security patches for the product. With an unsupported release, it will not be possible to resolve security i...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 9 vendor packaged system security patches and updates must be installed and up to date.

    Installing software updates is a fundamental mitigation against the exploitation of publicly known vulnerabilities. If the most recent security patches and updates are not installed, unauthorized u...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    Group
  • RHEL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a command line user logon.

    Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbiage used is consistent with applicable federal ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The graphical display manager must not be the default target on RHEL 9 unless approved.

    Unnecessary service packages must not be installed to decrease the attack surface of the system. Graphical display managers have a long history of security vulnerabilities and must not be used, unl...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • RHEL 9 must enable the hardware random number generator entropy gatherer service.

    The most important characteristic of a random number generator is its randomness, namely its ability to deliver random numbers that are impossible to predict. Entropy in computer security is associ...
    Rule Low Severity
  • SRG-OS-000269-GPOS-00103

    Group
  • RHEL 9 systemd-journald service must be enabled.

    In the event of a system failure, RHEL 9 must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to system ...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The systemd Ctrl-Alt-Delete burst key sequence in RHEL 9 must be disabled.

    A locally logged-on user who presses Ctrl-Alt-Delete when at the console can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the r...
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 9.

    A locally logged-on user who presses Ctrl-Alt-Delete when at the console can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the r...
    Rule High Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • RHEL 9 debug-shell systemd service must be disabled.

    The debug-shell requires no authentication and provides root privileges to anyone who has physical access to the machine. While this feature is disabled by default, masking it adds an additional la...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • RHEL 9 must require a boot loader superuser password.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-approved PKIs, all DOD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules