Released 2023-07-20
STIG ID | Title |
---|---|
RHEL-08-010000 | RHEL 8 must be a vendor-supported release. |
RHEL-08-010001 | The RHEL 8 operating system must implement the Endpoint Security for Linux Threat Prevention tool. |
RHEL-08-010010 | RHEL 8 vendor packaged system security patches and updates must be installed and up to date. |
RHEL-08-010019 | RHEL 8 must ensure cryptographic verification of vendor software packages. |
RHEL-08-010020 | RHEL 8 must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. |
RHEL-08-010030 | All RHEL 8 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection. |
RHEL-08-010040 | RHEL 8 must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a ssh logon. |
RHEL-08-010049 | RHEL 8 must display a banner before granting local or remote access to the system via a graphical user logon. |
RHEL-08-010050 | RHEL 8 must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon. |
RHEL-08-010060 | RHEL 8 must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a command line user logon. |
RHEL-08-010070 | All RHEL 8 remote access methods must be monitored. |
RHEL-08-010090 | RHEL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. |
RHEL-08-010100 | RHEL 8, for certificate-based authentication, must enforce authorized access to the corresponding private key. |
RHEL-08-010110 | RHEL 8 must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm. |
RHEL-08-010120 | RHEL 8 must employ FIPS 140-2 approved cryptographic hashing algorithms for all stored passwords. |
RHEL-08-010121 | The RHEL 8 operating system must not have accounts configured with blank or null passwords. |
RHEL-08-010130 | The RHEL 8 shadow password suite must be configured to use a sufficient number of hashing rounds. |
RHEL-08-010140 | RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance. |
RHEL-08-010141 | RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require a unique superusers name upon booting into single-user mode and maintenance. |
RHEL-08-010149 | RHEL 8 operating systems booted with a BIOS must require a unique superusers name upon booting into single-user and maintenance modes. |
RHEL-08-010150 | RHEL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes. |
RHEL-08-010151 | RHEL 8 operating systems must require authentication upon booting into rescue mode. |
RHEL-08-010152 | RHEL 8 operating systems must require authentication upon booting into emergency mode. |
RHEL-08-010159 | The RHEL 8 pam_unix.so module must be configured in the system-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication. |
RHEL-08-010160 | The RHEL 8 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication. |
RHEL-08-010161 | RHEL 8 must prevent system daemons from using Kerberos for authentication. |
RHEL-08-010162 | The krb5-workstation package must not be installed on RHEL 8. |
RHEL-08-010163 | The krb5-server package must not be installed on RHEL 8. |
RHEL-08-010170 | RHEL 8 must use a Linux Security Module configured to enforce limits on system services. |
RHEL-08-010171 | RHEL 8 must have policycoreutils package installed. |
RHEL-08-010190 | A sticky bit must be set on all RHEL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources. |
RHEL-08-010200 | RHEL 8 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive. |
RHEL-08-010201 | RHEL 8 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive. |
RHEL-08-010210 | The RHEL 8 /var/log/messages file must have mode 0640 or less permissive. |
RHEL-08-010220 | The RHEL 8 /var/log/messages file must be owned by root. |
RHEL-08-010230 | The RHEL 8 /var/log/messages file must be group-owned by root. |
RHEL-08-010240 | The RHEL 8 /var/log directory must have mode 0755 or less permissive. |
RHEL-08-010250 | The RHEL 8 /var/log directory must be owned by root. |
RHEL-08-010260 | The RHEL 8 /var/log directory must be group-owned by root. |
RHEL-08-010287 | The RHEL 8 SSH daemon must be configured to use system-wide crypto policies. |
RHEL-08-010290 | The RHEL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms. |
RHEL-08-010291 | The RHEL 8 operating system must implement DoD-approved encryption to protect the confidentiality of SSH server connections. |
RHEL-08-010292 | RHEL 8 must ensure the SSH server uses strong entropy. |
RHEL-08-010293 | The RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package. |
RHEL-08-010294 | The RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package. |
RHEL-08-010295 | The RHEL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package. |
RHEL-08-010300 | RHEL 8 system commands must have mode 755 or less permissive. |
RHEL-08-010310 | RHEL 8 system commands must be owned by root. |
RHEL-08-010320 | RHEL 8 system commands must be group-owned by root or a system account. |
RHEL-08-010330 | RHEL 8 library files must have mode 755 or less permissive. |
RHEL-08-010331 | RHEL 8 library directories must have mode 755 or less permissive. |
RHEL-08-010340 | RHEL 8 library files must be owned by root. |
RHEL-08-010341 | RHEL 8 library directories must be owned by root. |
RHEL-08-010350 | RHEL 8 library files must be group-owned by root or a system account. |
RHEL-08-010351 | RHEL 8 library directories must be group-owned by root or a system account. |
RHEL-08-010358 | RHEL 8 must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel. |
RHEL-08-010359 | The RHEL 8 operating system must use a file integrity tool to verify correct operation of all security functions. |
RHEL-08-010360 | The RHEL 8 file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency. |
RHEL-08-010370 | RHEL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization. |
RHEL-08-010371 | RHEL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization. |
RHEL-08-010372 | RHEL 8 must prevent the loading of a new kernel for later execution. |
RHEL-08-010373 | RHEL 8 must enable kernel parameters to enforce discretionary access control on symlinks. |
RHEL-08-010374 | RHEL 8 must enable kernel parameters to enforce discretionary access control on hardlinks. |
RHEL-08-010375 | RHEL 8 must restrict access to the kernel message buffer. |
RHEL-08-010376 | RHEL 8 must prevent kernel profiling by unprivileged users. |
RHEL-08-010379 | RHEL 8 must specify the default "include" directory for the /etc/sudoers file. |
RHEL-08-010380 | RHEL 8 must require users to provide a password for privilege escalation. |
RHEL-08-010381 | RHEL 8 must require users to reauthenticate for privilege escalation. |
RHEL-08-010382 | RHEL 8 must restrict privilege elevation to authorized personnel. |
RHEL-08-010383 | RHEL 8 must use the invoking user's password for privilege escalation when using "sudo". |
RHEL-08-010384 | RHEL 8 must require re-authentication when using the "sudo" command. |
RHEL-08-010385 | The RHEL 8 operating system must not be configured to bypass password requirements for privilege escalation. |
RHEL-08-010390 | RHEL 8 must have the packages required for multifactor authentication installed. |
RHEL-08-010400 | RHEL 8 must implement certificate status checking for multifactor authentication. |
RHEL-08-010410 | RHEL 8 must accept Personal Identity Verification (PIV) credentials. |
RHEL-08-010420 | RHEL 8 must implement non-executable data to protect its memory from unauthorized code execution. |
RHEL-08-010421 | RHEL 8 must clear the page allocator to prevent use-after-free attacks. |
RHEL-08-010422 | RHEL 8 must disable virtual syscalls. |
RHEL-08-010423 | RHEL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks. |
RHEL-08-010430 | RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution. |
RHEL-08-010440 | YUM must remove all software components after updated versions have been installed on RHEL 8. |
RHEL-08-010450 | RHEL 8 must enable the SELinux targeted policy. |
RHEL-08-010460 | There must be no shosts.equiv files on the RHEL 8 operating system. |
RHEL-08-010470 | There must be no .shosts files on the RHEL 8 operating system. |
RHEL-08-010471 | RHEL 8 must enable the hardware random number generator entropy gatherer service. |
RHEL-08-010472 | RHEL 8 must have the packages required to use the hardware random number generator entropy gatherer service. |
RHEL-08-010480 | The RHEL 8 SSH public host key files must have mode 0644 or less permissive. |
RHEL-08-010490 | The RHEL 8 SSH private host key files must have mode 0640 or less permissive. |
RHEL-08-010500 | The RHEL 8 SSH daemon must perform strict mode checking of home directory configuration files. |
RHEL-08-010520 | The RHEL 8 SSH daemon must not allow authentication using known host’s authentication. |
RHEL-08-010521 | The RHEL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements. |
RHEL-08-010522 | The RHEL 8 SSH daemon must not allow GSSAPI authentication, except to fulfill documented and validated mission requirements. |
RHEL-08-010540 | RHEL 8 must use a separate file system for /var. |
RHEL-08-010541 | RHEL 8 must use a separate file system for /var/log. |
RHEL-08-010542 | RHEL 8 must use a separate file system for the system audit data path. |
RHEL-08-010543 | A separate RHEL 8 filesystem must be used for the /tmp directory. |
RHEL-08-010544 | RHEL 8 must use a separate file system for /var/tmp. |
RHEL-08-010550 | RHEL 8 must not permit direct logons to the root account using remote access via SSH. |
RHEL-08-010561 | The rsyslog service must be running in RHEL 8. |
RHEL-08-010570 | RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories. |
RHEL-08-010571 | RHEL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory. |
RHEL-08-010572 | RHEL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory. |
RHEL-08-010580 | RHEL 8 must prevent special devices on non-root local partitions. |
RHEL-08-010590 | RHEL 8 must prevent code from being executed on file systems that contain user home directories. |
RHEL-08-010600 | RHEL 8 must prevent special devices on file systems that are used with removable media. |
RHEL-08-010610 | RHEL 8 must prevent code from being executed on file systems that are used with removable media. |
RHEL-08-010620 | RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media. |
RHEL-08-010630 | RHEL 8 must prevent code from being executed on file systems that are imported via Network File System (NFS). |
RHEL-08-010640 | RHEL 8 must prevent special devices on file systems that are imported via Network File System (NFS). |
RHEL-08-010650 | RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS). |
RHEL-08-010660 | Local RHEL 8 initialization files must not execute world-writable programs. |
RHEL-08-010670 | RHEL 8 must disable kernel dumps unless needed. |
RHEL-08-010671 | RHEL 8 must disable the kernel.core_pattern. |
RHEL-08-010672 | RHEL 8 must disable acquiring, saving, and processing core dumps. |
RHEL-08-010673 | RHEL 8 must disable core dumps for all users. |
RHEL-08-010674 | RHEL 8 must disable storing core dumps. |
RHEL-08-010675 | RHEL 8 must disable core dump backtraces. |
RHEL-08-010680 | For RHEL 8 systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured. |
RHEL-08-010690 | Executable search paths within the initialization files of all local interactive RHEL 8 users must only contain paths that resolve to the system default or the users home directory. |
RHEL-08-010700 | All RHEL 8 world-writable directories must be owned by root, sys, bin, or an application user. |
RHEL-08-010710 | All RHEL 8 world-writable directories must be group-owned by root, sys, bin, or an application group. |
RHEL-08-010720 | All RHEL 8 local interactive users must have a home directory assigned in the /etc/passwd file. |
RHEL-08-010730 | All RHEL 8 local interactive user home directories must have mode 0750 or less permissive. |
RHEL-08-010731 | All RHEL 8 local interactive user home directory files must have mode 0750 or less permissive. |
RHEL-08-010740 | All RHEL 8 local interactive user home directories must be group-owned by the home directory owner’s primary group. |
RHEL-08-010741 | RHEL 8 must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member. |
RHEL-08-010750 | All RHEL 8 local interactive user home directories defined in the /etc/passwd file must exist. |
RHEL-08-010760 | All RHEL 8 local interactive user accounts must be assigned a home directory upon creation. |
RHEL-08-010770 | All RHEL 8 local initialization files must have mode 0740 or less permissive. |
RHEL-08-010780 | All RHEL 8 local files and directories must have a valid owner. |
RHEL-08-010790 | All RHEL 8 local files and directories must have a valid group owner. |
RHEL-08-010800 | A separate RHEL 8 filesystem must be used for user home directories (such as /home or an equivalent). |
RHEL-08-010820 | Unattended or automatic logon via the RHEL 8 graphical user interface must not be allowed. |
RHEL-08-010830 | RHEL 8 must not allow users to override SSH environment variables. |
RHEL-08-020000 | RHEL 8 temporary user accounts must be provisioned with an expiration time of 72 hours or less. |
RHEL-08-020010 | RHEL 8 must automatically lock an account when three unsuccessful logon attempts occur. |
RHEL-08-020011 | RHEL 8 must automatically lock an account when three unsuccessful logon attempts occur. |
RHEL-08-020012 | RHEL 8 must automatically lock an account when three unsuccessful logon attempts occur during a 15-minute time period. |
RHEL-08-020013 | RHEL 8 must automatically lock an account when three unsuccessful logon attempts occur during a 15-minute time period. |
RHEL-08-020014 | RHEL 8 must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period. |
RHEL-08-020015 | RHEL 8 must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period. |
RHEL-08-020016 | RHEL 8 must ensure account lockouts persist. |
RHEL-08-020017 | RHEL 8 must ensure account lockouts persist. |
RHEL-08-020018 | RHEL 8 must prevent system messages from being presented when three unsuccessful logon attempts occur. |
RHEL-08-020019 | RHEL 8 must prevent system messages from being presented when three unsuccessful logon attempts occur. |
RHEL-08-020020 | RHEL 8 must log user name information when unsuccessful logon attempts occur. |
RHEL-08-020021 | RHEL 8 must log user name information when unsuccessful logon attempts occur. |
RHEL-08-020022 | RHEL 8 must include root when automatically locking an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period. |
RHEL-08-020023 | RHEL 8 must include root when automatically locking an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period. |
RHEL-08-020024 | RHEL 8 must limit the number of concurrent sessions to ten for all accounts and/or account types. |
RHEL-08-020025 | RHEL 8 must configure the use of the pam_faillock.so module in the /etc/pam.d/system-auth file. |
RHEL-08-020026 | RHEL 8 must configure the use of the pam_faillock.so module in the /etc/pam.d/password-auth file. |
RHEL-08-020027 | RHEL 8 systems, versions 8.2 and above, must configure SELinux context type to allow the use of a non-default faillock tally directory. |
RHEL-08-020028 | RHEL 8 systems below version 8.2 must configure SELinux context type to allow the use of a non-default faillock tally directory. |
RHEL-08-020030 | RHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for graphical user sessions. |
RHEL-08-020031 | RHEL 8 must initiate a session lock for graphical user interfaces when the screensaver is activated. |
RHEL-08-020032 | RHEL 8 must disable the user list at logon for graphical user interfaces. |
RHEL-08-020035 | RHEL 8 must terminate idle user sessions. |
RHEL-08-020039 | RHEL 8 must have the tmux package installed. |
RHEL-08-020040 | RHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions. |
RHEL-08-020041 | RHEL 8 must ensure session control is automatically started at shell initialization. |
RHEL-08-020042 | RHEL 8 must prevent users from disabling session control mechanisms. |
RHEL-08-020050 | RHEL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed. |
RHEL-08-020060 | RHEL 8 must automatically lock graphical user sessions after 15 minutes of inactivity. |
RHEL-08-020070 | RHEL 8 must automatically lock command line user sessions after 15 minutes of inactivity. |
RHEL-08-020080 | RHEL 8 must prevent a user from overriding the session lock-delay setting for the graphical user interface. |
RHEL-08-020081 | RHEL 8 must prevent a user from overriding the session idle-delay setting for the graphical user interface. |
RHEL-08-020082 | RHEL 8 must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface. |
RHEL-08-020090 | RHEL 8 must map the authenticated identity to the user or group account for PKI-based authentication. |
RHEL-08-020100 | RHEL 8 must ensure the password complexity module is enabled in the password-auth file. |
RHEL-08-020101 | RHEL 8 must ensure the password complexity module is enabled in the system-auth file. |
RHEL-08-020102 | RHEL 8 systems below version 8.4 must ensure the password complexity module in the system-auth file is configured for three retries or less. |
RHEL-08-020103 | RHEL 8 systems below version 8.4 must ensure the password complexity module in the password-auth file is configured for three retries or less. |
RHEL-08-020104 | RHEL 8 systems, version 8.4 and above, must ensure the password complexity module is configured for three retries or less. |
RHEL-08-020110 | RHEL 8 must enforce password complexity by requiring that at least one uppercase character be used. |
RHEL-08-020120 | RHEL 8 must enforce password complexity by requiring that at least one lower-case character be used. |
RHEL-08-020130 | RHEL 8 must enforce password complexity by requiring that at least one numeric character be used. |
RHEL-08-020140 | RHEL 8 must require the maximum number of repeating characters of the same character class be limited to four when passwords are changed. |
RHEL-08-020150 | RHEL 8 must require the maximum number of repeating characters be limited to three when passwords are changed. |
RHEL-08-020160 | RHEL 8 must require the change of at least four character classes when passwords are changed. |
RHEL-08-020170 | RHEL 8 must require the change of at least 8 characters when passwords are changed. |
RHEL-08-020180 | RHEL 8 passwords must have a 24 hours/1 day minimum password lifetime restriction in /etc/shadow. |
RHEL-08-020190 | RHEL 8 passwords for new users or password changes must have a 24 hours/1 day minimum password lifetime restriction in /etc/login.defs. |
RHEL-08-020200 | RHEL 8 user account passwords must have a 60-day maximum password lifetime restriction. |
RHEL-08-020210 | RHEL 8 user account passwords must be configured so that existing passwords are restricted to a 60-day maximum lifetime. |
RHEL-08-020220 | RHEL 8 must be configured in the password-auth file to prohibit password reuse for a minimum of five generations. |
RHEL-08-020221 | RHEL 8 must be configured in the system-auth file to prohibit password reuse for a minimum of five generations. |
RHEL-08-020230 | RHEL 8 passwords must have a minimum of 15 characters. |
RHEL-08-020231 | RHEL 8 passwords for new users must have a minimum of 15 characters. |
RHEL-08-020240 | RHEL 8 duplicate User IDs (UIDs) must not exist for interactive users. |
RHEL-08-020250 | RHEL 8 must implement smart card logon for multifactor authentication for access to interactive accounts. |
RHEL-08-020260 | RHEL 8 account identifiers (individuals, groups, roles, and devices) must be disabled after 35 days of inactivity. |
RHEL-08-020270 | RHEL 8 must automatically expire temporary accounts within 72 hours. |
RHEL-08-020280 | All RHEL 8 passwords must contain at least one special character. |
RHEL-08-020290 | RHEL 8 must prohibit the use of cached authentications after one day. |
RHEL-08-020300 | RHEL 8 must prevent the use of dictionary words for passwords. |
RHEL-08-020310 | RHEL 8 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt. |
RHEL-08-020320 | RHEL 8 must not have unnecessary accounts. |
RHEL-08-020330 | RHEL 8 must not allow accounts configured with blank or null passwords. |
RHEL-08-020331 | RHEL 8 must not allow blank or null passwords in the system-auth file. |
RHEL-08-020332 | RHEL 8 must not allow blank or null passwords in the password-auth file. |
RHEL-08-020340 | RHEL 8 must display the date and time of the last successful account logon upon logon. |
RHEL-08-020350 | RHEL 8 must display the date and time of the last successful account logon upon an SSH logon. |
RHEL-08-020351 | RHEL 8 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files. |
RHEL-08-020352 | RHEL 8 must set the umask value to 077 for all local interactive user accounts. |
RHEL-08-020353 | RHEL 8 must define default permissions for logon and non-logon shells. |
RHEL-08-030000 | The RHEL 8 audit system must be configured to audit the execution of privileged functions and prevent all software from executing at higher privilege levels than users executing the software. |
RHEL-08-030010 | Cron logging must be implemented in RHEL 8. |
RHEL-08-030020 | The RHEL 8 System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) must be alerted of an audit processing failure event. |
RHEL-08-030030 | The RHEL 8 Information System Security Officer (ISSO) and System Administrator (SA) (at a minimum) must have mail aliases to be notified of an audit processing failure. |
RHEL-08-030040 | The RHEL 8 System must take appropriate action when an audit processing failure occurs. |
RHEL-08-030060 | The RHEL 8 audit system must take appropriate action when the audit storage volume is full. |
RHEL-08-030061 | The RHEL 8 audit system must audit local events. |
RHEL-08-030062 | RHEL 8 must label all off-loaded audit logs before sending them to the central log server. |
RHEL-08-030063 | RHEL 8 must resolve audit information before writing to disk. |
RHEL-08-030070 | RHEL 8 audit logs must have a mode of 0600 or less permissive to prevent unauthorized read access. |
RHEL-08-030080 | RHEL 8 audit logs must be owned by root to prevent unauthorized read access. |
RHEL-08-030090 | RHEL 8 audit logs must be group-owned by root to prevent unauthorized read access. |
RHEL-08-030100 | RHEL 8 audit log directory must be owned by root to prevent unauthorized read access. |
RHEL-08-030110 | RHEL 8 audit log directory must be group-owned by root to prevent unauthorized read access. |
RHEL-08-030120 | RHEL 8 audit log directory must have a mode of 0700 or less permissive to prevent unauthorized read access. |
RHEL-08-030121 | RHEL 8 audit system must protect auditing rules from unauthorized change. |
RHEL-08-030122 | RHEL 8 audit system must protect logon UIDs from unauthorized change. |
RHEL-08-030130 | RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow. |
RHEL-08-030140 | RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd. |
RHEL-08-030150 | RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd. |
RHEL-08-030160 | RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow. |
RHEL-08-030170 | RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group. |
RHEL-08-030171 | RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers. |
RHEL-08-030172 | RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/. |
RHEL-08-030180 | The RHEL 8 audit package must be installed. |
RHEL-08-030181 | RHEL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events. |
RHEL-08-030190 | Successful/unsuccessful uses of the su command in RHEL 8 must generate an audit record. |
RHEL-08-030200 | The RHEL 8 audit system must be configured to audit any usage of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls. |
RHEL-08-030250 | Successful/unsuccessful uses of the chage command in RHEL 8 must generate an audit record. |
RHEL-08-030260 | Successful/unsuccessful uses of the chcon command in RHEL 8 must generate an audit record. |
RHEL-08-030280 | Successful/unsuccessful uses of the ssh-agent in RHEL 8 must generate an audit record. |
RHEL-08-030290 | Successful/unsuccessful uses of the passwd command in RHEL 8 must generate an audit record. |
RHEL-08-030300 | Successful/unsuccessful uses of the mount command in RHEL 8 must generate an audit record. |
RHEL-08-030301 | Successful/unsuccessful uses of the umount command in RHEL 8 must generate an audit record. |
RHEL-08-030302 | Successful/unsuccessful uses of the mount syscall in RHEL 8 must generate an audit record. |
RHEL-08-030310 | Successful/unsuccessful uses of the unix_update in RHEL 8 must generate an audit record. |
RHEL-08-030311 | Successful/unsuccessful uses of postdrop in RHEL 8 must generate an audit record. |
RHEL-08-030312 | Successful/unsuccessful uses of postqueue in RHEL 8 must generate an audit record. |
RHEL-08-030313 | Successful/unsuccessful uses of semanage in RHEL 8 must generate an audit record. |
RHEL-08-030314 | Successful/unsuccessful uses of setfiles in RHEL 8 must generate an audit record. |
RHEL-08-030315 | Successful/unsuccessful uses of userhelper in RHEL 8 must generate an audit record. |
RHEL-08-030316 | Successful/unsuccessful uses of setsebool in RHEL 8 must generate an audit record. |
RHEL-08-030317 | Successful/unsuccessful uses of unix_chkpwd in RHEL 8 must generate an audit record. |
RHEL-08-030320 | Successful/unsuccessful uses of the ssh-keysign in RHEL 8 must generate an audit record. |
RHEL-08-030330 | Successful/unsuccessful uses of the setfacl command in RHEL 8 must generate an audit record. |
RHEL-08-030340 | Successful/unsuccessful uses of the pam_timestamp_check command in RHEL 8 must generate an audit record. |
RHEL-08-030350 | Successful/unsuccessful uses of the newgrp command in RHEL 8 must generate an audit record. |
RHEL-08-030360 | Successful/unsuccessful uses of the init_module and finit_module system calls in RHEL 8 must generate an audit record. |
RHEL-08-030361 | Successful/unsuccessful uses of the rename, unlink, rmdir, renameat, and unlinkat system calls in RHEL 8 must generate an audit record. |
RHEL-08-030370 | Successful/unsuccessful uses of the gpasswd command in RHEL 8 must generate an audit record. |
RHEL-08-030390 | Successful/unsuccessful uses of the delete_module command in RHEL 8 must generate an audit record. |
RHEL-08-030400 | Successful/unsuccessful uses of the crontab command in RHEL 8 must generate an audit record. |
RHEL-08-030410 | Successful/unsuccessful uses of the chsh command in RHEL 8 must generate an audit record. |
RHEL-08-030420 | Successful/unsuccessful uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls in RHEL 8 must generate an audit record. |
RHEL-08-030480 | Successful/unsuccessful uses of the chown, fchown, fchownat, and lchown system calls in RHEL 8 must generate an audit record. |
RHEL-08-030490 | Successful/unsuccessful uses of the chmod, fchmod, and fchmodat system calls in RHEL 8 must generate an audit record. |
RHEL-08-030550 | Successful/unsuccessful uses of the sudo command in RHEL 8 must generate an audit record. |
RHEL-08-030560 | Successful/unsuccessful uses of the usermod command in RHEL 8 must generate an audit record. |
RHEL-08-030570 | Successful/unsuccessful uses of the chacl command in RHEL 8 must generate an audit record. |
RHEL-08-030580 | Successful/unsuccessful uses of the kmod command in RHEL 8 must generate an audit record. |
RHEL-08-030590 | Successful/unsuccessful modifications to the faillock log file in RHEL 8 must generate an audit record. |
RHEL-08-030600 | Successful/unsuccessful modifications to the lastlog file in RHEL 8 must generate an audit record. |
RHEL-08-030601 | RHEL 8 must enable auditing of processes that start prior to the audit daemon. |
RHEL-08-030602 | RHEL 8 must allocate an audit_backlog_limit of sufficient size to capture processes that start prior to the audit daemon. |
RHEL-08-030603 | RHEL 8 must enable Linux audit logging for the USBGuard daemon. |
RHEL-08-030610 | RHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. |
RHEL-08-030620 | RHEL 8 audit tools must have a mode of 0755 or less permissive. |
RHEL-08-030630 | RHEL 8 audit tools must be owned by root. |
RHEL-08-030640 | RHEL 8 audit tools must be group-owned by root. |
RHEL-08-030650 | RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools. |
RHEL-08-030660 | RHEL 8 must allocate audit record storage capacity to store at least one week of audit records, when audit records are not immediately sent to a central audit record storage facility. |
RHEL-08-030670 | RHEL 8 must have the packages required for offloading audit logs installed. |
RHEL-08-030680 | RHEL 8 must have the packages required for encrypting offloaded audit logs installed. |
RHEL-08-030690 | The RHEL 8 audit records must be off-loaded onto a different system or storage media from the system being audited. |
RHEL-08-030700 | RHEL 8 must take appropriate action when the internal event queue is full. |
RHEL-08-030710 | RHEL 8 must encrypt the transfer of audit records off-loaded onto a different system or media from the system being audited. |
RHEL-08-030720 | RHEL 8 must authenticate the remote logging server for off-loading audit logs. |
RHEL-08-030730 | RHEL 8 must take action when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity. |
RHEL-08-030731 | RHEL 8 must notify the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) when allocated audit record storage volume 75 percent utilization. |
RHEL-08-030740 | RHEL 8 must securely compare internal information system clocks at least every 24 hours with a server synchronized to an authoritative time source, such as the United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS). |
RHEL-08-030741 | RHEL 8 must disable the chrony daemon from acting as a server. |
RHEL-08-030742 | RHEL 8 must disable network management of the chrony daemon. |
RHEL-08-040000 | RHEL 8 must not have the telnet-server package installed. |
RHEL-08-040001 | RHEL 8 must not have any automated bug reporting tools installed. |
RHEL-08-040002 | RHEL 8 must not have the sendmail package installed. |
RHEL-08-040004 | RHEL 8 must enable mitigations against processor-based vulnerabilities. |
RHEL-08-040010 | RHEL 8 must not have the rsh-server package installed. |
RHEL-08-040020 | RHEL 8 must cover or disable the built-in or attached camera when not in use. |
RHEL-08-040021 | RHEL 8 must disable the asynchronous transfer mode (ATM) protocol. |
RHEL-08-040022 | RHEL 8 must disable the controller area network (CAN) protocol. |
RHEL-08-040023 | RHEL 8 must disable the stream control transmission protocol (SCTP). |
RHEL-08-040024 | RHEL 8 must disable the transparent inter-process communication (TIPC) protocol. |
RHEL-08-040025 | RHEL 8 must disable mounting of cramfs. |
RHEL-08-040026 | RHEL 8 must disable IEEE 1394 (FireWire) Support. |
RHEL-08-040030 | RHEL 8 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments. |
RHEL-08-040070 | The RHEL 8 file system automounter must be disabled unless required. |
RHEL-08-040080 | RHEL 8 must be configured to disable USB mass storage. |
RHEL-08-040090 | A RHEL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems. |
RHEL-08-040100 | A firewall must be installed on RHEL 8. |
RHEL-08-040101 | A firewall must be active on RHEL 8. |
RHEL-08-040110 | RHEL 8 wireless network adapters must be disabled. |
RHEL-08-040111 | RHEL 8 Bluetooth must be disabled. |
RHEL-08-040120 | RHEL 8 must mount /dev/shm with the nodev option. |
RHEL-08-040121 | RHEL 8 must mount /dev/shm with the nosuid option. |
RHEL-08-040122 | RHEL 8 must mount /dev/shm with the noexec option. |
RHEL-08-040123 | RHEL 8 must mount /tmp with the nodev option. |
RHEL-08-040124 | RHEL 8 must mount /tmp with the nosuid option. |
RHEL-08-040125 | RHEL 8 must mount /tmp with the noexec option. |
RHEL-08-040126 | RHEL 8 must mount /var/log with the nodev option. |
RHEL-08-040127 | RHEL 8 must mount /var/log with the nosuid option. |
RHEL-08-040128 | RHEL 8 must mount /var/log with the noexec option. |
RHEL-08-040129 | RHEL 8 must mount /var/log/audit with the nodev option. |
RHEL-08-040130 | RHEL 8 must mount /var/log/audit with the nosuid option. |
RHEL-08-040131 | RHEL 8 must mount /var/log/audit with the noexec option. |
RHEL-08-040132 | RHEL 8 must mount /var/tmp with the nodev option. |
RHEL-08-040133 | RHEL 8 must mount /var/tmp with the nosuid option. |
RHEL-08-040134 | RHEL 8 must mount /var/tmp with the noexec option. |
RHEL-08-040135 | The RHEL 8 fapolicy module must be installed. |
RHEL-08-040136 | The RHEL 8 fapolicy module must be enabled. |
RHEL-08-040137 | The RHEL 8 fapolicy module must be configured to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs. |
RHEL-08-040139 | RHEL 8 must have the USBGuard installed. |
RHEL-08-040140 | RHEL 8 must block unauthorized peripherals before establishing a connection. |
RHEL-08-040141 | RHEL 8 must enable the USBGuard. |
RHEL-08-040150 | A firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring RHEL 8 can implement rate-limiting measures on impacted network interfaces. |
RHEL-08-040159 | All RHEL 8 networked systems must have SSH installed. |
RHEL-08-040160 | All RHEL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission. |
RHEL-08-040161 | RHEL 8 must force a frequent session key renegotiation for SSH connections to the server. |
RHEL-08-040170 | The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 8. |
RHEL-08-040171 | The x86 Ctrl-Alt-Delete key sequence in RHEL 8 must be disabled if a graphical user interface is installed. |
RHEL-08-040172 | The systemd Ctrl-Alt-Delete burst key sequence in RHEL 8 must be disabled. |
RHEL-08-040180 | The debug-shell systemd service must be disabled on RHEL 8. |
RHEL-08-040190 | The Trivial File Transfer Protocol (TFTP) server package must not be installed if not required for RHEL 8 operational support. |
RHEL-08-040200 | The root account must be the only account having unrestricted access to the RHEL 8 system. |
RHEL-08-040209 | RHEL 8 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted. |
RHEL-08-040210 | RHEL 8 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted. |
RHEL-08-040220 | RHEL 8 must not send Internet Control Message Protocol (ICMP) redirects. |
RHEL-08-040230 | RHEL 8 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address. |
RHEL-08-040239 | RHEL 8 must not forward IPv4 source-routed packets. |
RHEL-08-040240 | RHEL 8 must not forward IPv6 source-routed packets. |
RHEL-08-040249 | RHEL 8 must not forward IPv4 source-routed packets by default. |
RHEL-08-040250 | RHEL 8 must not forward IPv6 source-routed packets by default. |
RHEL-08-040259 | RHEL 8 must not enable IPv4 packet forwarding unless the system is a router. |
RHEL-08-040260 | RHEL 8 must not enable IPv6 packet forwarding unless the system is a router. |
RHEL-08-040261 | RHEL 8 must not accept router advertisements on all IPv6 interfaces. |
RHEL-08-040262 | RHEL 8 must not accept router advertisements on all IPv6 interfaces by default. |
RHEL-08-040270 | RHEL 8 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default. |
RHEL-08-040279 | RHEL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages. |
RHEL-08-040280 | RHEL 8 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages. |
RHEL-08-040281 | RHEL 8 must disable access to network bpf syscall from unprivileged processes. |
RHEL-08-040282 | RHEL 8 must restrict usage of ptrace to descendant processes. |
RHEL-08-040283 | RHEL 8 must restrict exposed kernel pointer addresses access. |
RHEL-08-040284 | RHEL 8 must disable the use of user namespaces. |
RHEL-08-040285 | RHEL 8 must use reverse path filtering on all IPv4 interfaces. |
RHEL-08-040286 | RHEL 8 must enable hardening for the Berkeley Packet Filter Just-in-time compiler. |
RHEL-08-040290 | RHEL 8 must be configured to prevent unrestricted mail relaying. |
RHEL-08-040300 | The RHEL 8 file integrity tool must be configured to verify extended attributes. |
RHEL-08-040310 | The RHEL 8 file integrity tool must be configured to verify Access Control Lists (ACLs). |
RHEL-08-040320 | The graphical display manager must not be installed on RHEL 8 unless approved. |
RHEL-08-040321 | The graphical display manager must not be the default target on RHEL 8 unless approved. |
RHEL-08-040330 | RHEL 8 network interfaces must not be in promiscuous mode. |
RHEL-08-040340 | RHEL 8 remote X connections for interactive users must be disabled unless to fulfill documented and validated mission requirements. |
RHEL-08-040341 | The RHEL 8 SSH daemon must prevent remote hosts from connecting to the proxy display. |
RHEL-08-040342 | RHEL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms. |
RHEL-08-040350 | If the Trivial File Transfer Protocol (TFTP) server is required, the RHEL 8 TFTP daemon must be configured to operate in secure mode. |
RHEL-08-040360 | A File Transfer Protocol (FTP) server package must not be installed unless mission essential on RHEL 8. |
RHEL-08-040370 | The gssproxy package must not be installed unless mission essential on RHEL 8. |
RHEL-08-040380 | The iprutils package must not be installed unless mission essential on RHEL 8. |
RHEL-08-040390 | The tuned package must not be installed unless mission essential on RHEL 8. |
RHEL-08-040400 | RHEL 8 must prevent non-privileged users from executing privileged functions, including disabling, circumventing, or altering implemented security safeguards/countermeasures. |