Red Hat Enterprise Linux 9 v2r2

Released 2024-10-23


View as One Page
STIG IDTitle
RHEL-09-211010RHEL 9 must be a vendor-supported release.
RHEL-09-211015RHEL 9 vendor packaged system security patches and updates must be installed and up to date.
RHEL-09-211020RHEL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a command line user logon.
RHEL-09-211030The graphical display manager must not be the default target on RHEL 9 unless approved.
RHEL-09-211035RHEL 9 must enable the hardware random number generator entropy gatherer service.
RHEL-09-211040RHEL 9 systemd-journald service must be enabled.
RHEL-09-211045The systemd Ctrl-Alt-Delete burst key sequence in RHEL 9 must be disabled.
RHEL-09-211050The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 9.
RHEL-09-211055RHEL 9 debug-shell systemd service must be disabled.
RHEL-09-212010RHEL 9 must require a boot loader superuser password.
RHEL-09-212015RHEL 9 must disable the ability of systemd to spawn an interactive boot process.
RHEL-09-212020RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes.
RHEL-09-212025RHEL 9 /boot/grub2/grub.cfg file must be group-owned by root.
RHEL-09-212030RHEL 9 /boot/grub2/grub.cfg file must be owned by root.
RHEL-09-212035RHEL 9 must disable virtual system calls.
RHEL-09-212040RHEL 9 must clear the page allocator to prevent use-after-free attacks.
RHEL-09-212045RHEL 9 must clear SLUB/SLAB objects to prevent use-after-free attacks.
RHEL-09-212050RHEL 9 must enable mitigations against processor-based vulnerabilities.
RHEL-09-212055RHEL 9 must enable auditing of processes that start prior to the audit daemon.
RHEL-09-213010RHEL 9 must restrict access to the kernel message buffer.
RHEL-09-213015RHEL 9 must prevent kernel profiling by nonprivileged users.
RHEL-09-213020RHEL 9 must prevent the loading of a new kernel for later execution.
RHEL-09-213025RHEL 9 must restrict exposed kernel pointer addresses access.
RHEL-09-213030RHEL 9 must enable kernel parameters to enforce discretionary access control on hardlinks.
RHEL-09-213035RHEL 9 must enable kernel parameters to enforce discretionary access control on symlinks.
RHEL-09-213040RHEL 9 must disable the kernel.core_pattern.
RHEL-09-213045RHEL 9 must be configured to disable the Asynchronous Transfer Mode kernel module.
RHEL-09-213050RHEL 9 must be configured to disable the Controller Area Network kernel module.
RHEL-09-213055RHEL 9 must be configured to disable the FireWire kernel module.
RHEL-09-213060RHEL 9 must disable the Stream Control Transmission Protocol (SCTP) kernel module.
RHEL-09-213065RHEL 9 must disable the Transparent Inter Process Communication (TIPC) kernel module.
RHEL-09-213070RHEL 9 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.
RHEL-09-213075RHEL 9 must disable access to network bpf system call from nonprivileged processes.
RHEL-09-213080RHEL 9 must restrict usage of ptrace to descendant processes.
RHEL-09-213085RHEL 9 must disable core dump backtraces.
RHEL-09-213090RHEL 9 must disable storing core dumps.
RHEL-09-213095RHEL 9 must disable core dumps for all users.
RHEL-09-213100RHEL 9 must disable acquiring, saving, and processing core dumps.
RHEL-09-213105RHEL 9 must disable the use of user namespaces.
RHEL-09-213110RHEL 9 must implement nonexecutable data to protect its memory from unauthorized code execution.
RHEL-09-213115The kdump service on RHEL 9 must be disabled.
RHEL-09-214010RHEL 9 must ensure cryptographic verification of vendor software packages.
RHEL-09-214015RHEL 9 must check the GPG signature of software packages originating from external software repositories before installation.
RHEL-09-214020RHEL 9 must check the GPG signature of locally installed software packages before installation.
RHEL-09-214025RHEL 9 must have GPG signature verification enabled for all software repositories.
RHEL-09-214030RHEL 9 must be configured so that the cryptographic hashes of system files match vendor values.
RHEL-09-214035RHEL 9 must remove all software components after updated versions have been installed.
RHEL-09-215010RHEL 9 subscription-manager package must be installed.
RHEL-09-215015RHEL 9 must not have a File Transfer Protocol (FTP) server package installed.
RHEL-09-215020RHEL 9 must not have the sendmail package installed.
RHEL-09-215025RHEL 9 must not have the nfs-utils package installed.
RHEL-09-215030RHEL 9 must not have the ypserv package installed.
RHEL-09-215035RHEL 9 must not have the rsh-server package installed.
RHEL-09-215040RHEL 9 must not have the telnet-server package installed.
RHEL-09-215045RHEL 9 must not have the gssproxy package installed.
RHEL-09-215050RHEL 9 must not have the iprutils package installed.
RHEL-09-215055RHEL 9 must not have the tuned package installed.
RHEL-09-215060RHEL 9 must not have a Trivial File Transfer Protocol (TFTP) server package installed.
RHEL-09-215065RHEL 9 must not have the quagga package installed.
RHEL-09-215070A graphical display manager must not be installed on RHEL 9 unless approved.
RHEL-09-215075RHEL 9 must have the openssl-pkcs11 package installed.
RHEL-09-215080RHEL 9 must have the gnutls-utils package installed.
RHEL-09-215085RHEL 9 must have the nss-tools package installed.
RHEL-09-215090RHEL 9 must have the rng-tools package installed.
RHEL-09-215095RHEL 9 must have the s-nail package installed.
RHEL-09-231010A separate RHEL 9 file system must be used for user home directories (such as /home or an equivalent).
RHEL-09-231015RHEL 9 must use a separate file system for /tmp.
RHEL-09-231020RHEL 9 must use a separate file system for /var.
RHEL-09-231025RHEL 9 must use a separate file system for /var/log.
RHEL-09-231030RHEL 9 must use a separate file system for the system audit data path.
RHEL-09-231035RHEL 9 must use a separate file system for /var/tmp.
RHEL-09-231040RHEL 9 file system automount function must be disabled unless required.
RHEL-09-231045RHEL 9 must prevent device files from being interpreted on file systems that contain user home directories.
RHEL-09-231050RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.
RHEL-09-231055RHEL 9 must prevent code from being executed on file systems that contain user home directories.
RHEL-09-231065RHEL 9 must prevent special devices on file systems that are imported via Network File System (NFS).
RHEL-09-231070RHEL 9 must prevent code from being executed on file systems that are imported via Network File System (NFS).
RHEL-09-231075RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
RHEL-09-231080RHEL 9 must prevent code from being executed on file systems that are used with removable media.
RHEL-09-231085RHEL 9 must prevent special devices on file systems that are used with removable media.
RHEL-09-231090RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
RHEL-09-231095RHEL 9 must mount /boot with the nodev option.
RHEL-09-231100RHEL 9 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.
RHEL-09-231105RHEL 9 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.
RHEL-09-231110RHEL 9 must mount /dev/shm with the nodev option.
RHEL-09-231115RHEL 9 must mount /dev/shm with the noexec option.
RHEL-09-231120RHEL 9 must mount /dev/shm with the nosuid option.
RHEL-09-231125RHEL 9 must mount /tmp with the nodev option.
RHEL-09-231130RHEL 9 must mount /tmp with the noexec option.
RHEL-09-231135RHEL 9 must mount /tmp with the nosuid option.
RHEL-09-231140RHEL 9 must mount /var with the nodev option.
RHEL-09-231145RHEL 9 must mount /var/log with the nodev option.
RHEL-09-231150RHEL 9 must mount /var/log with the noexec option.
RHEL-09-231155RHEL 9 must mount /var/log with the nosuid option.
RHEL-09-231160RHEL 9 must mount /var/log/audit with the nodev option.
RHEL-09-231165RHEL 9 must mount /var/log/audit with the noexec option.
RHEL-09-231170RHEL 9 must mount /var/log/audit with the nosuid option.
RHEL-09-231175RHEL 9 must mount /var/tmp with the nodev option.
RHEL-09-231180RHEL 9 must mount /var/tmp with the noexec option.
RHEL-09-231185RHEL 9 must mount /var/tmp with the nosuid option.
RHEL-09-231190RHEL 9 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.
RHEL-09-231195RHEL 9 must disable mounting of cramfs.
RHEL-09-231200RHEL 9 must prevent special devices on non-root local partitions.
RHEL-09-232010RHEL 9 system commands must have mode 755 or less permissive.
RHEL-09-232015RHEL 9 library directories must have mode 755 or less permissive.
RHEL-09-232020RHEL 9 library files must have mode 755 or less permissive.
RHEL-09-232025RHEL 9 /var/log directory must have mode 0755 or less permissive.
RHEL-09-232030RHEL 9 /var/log/messages file must have mode 0640 or less permissive.
RHEL-09-232035RHEL 9 audit tools must have a mode of 0755 or less permissive.
RHEL-09-232040RHEL 9 cron configuration directories must have a mode of 0700 or less permissive.
RHEL-09-232045All RHEL 9 local initialization files must have mode 0740 or less permissive.
RHEL-09-232050All RHEL 9 local interactive user home directories must have mode 0750 or less permissive.
RHEL-09-232055RHEL 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232060RHEL 9 /etc/group- file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232065RHEL 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL-09-232070RHEL 9 /etc/gshadow- file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL-09-232075RHEL 9 /etc/passwd file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232080RHEL 9 /etc/passwd- file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232085RHEL 9 /etc/shadow- file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL-09-232090RHEL 9 /etc/group file must be owned by root.
RHEL-09-232095RHEL 9 /etc/group file must be group-owned by root.
RHEL-09-232100RHEL 9 /etc/group- file must be owned by root.
RHEL-09-232105RHEL 9 /etc/group- file must be group-owned by root.
RHEL-09-232110RHEL 9 /etc/gshadow file must be owned by root.
RHEL-09-232115RHEL 9 /etc/gshadow file must be group-owned by root.
RHEL-09-232120RHEL 9 /etc/gshadow- file must be owned by root.
RHEL-09-232125RHEL 9 /etc/gshadow- file must be group-owned by root.
RHEL-09-232130RHEL 9 /etc/passwd file must be owned by root.
RHEL-09-232135RHEL 9 /etc/passwd file must be group-owned by root.
RHEL-09-232140RHEL 9 /etc/passwd- file must be owned by root.
RHEL-09-232145RHEL 9 /etc/passwd- file must be group-owned by root.
RHEL-09-232150RHEL 9 /etc/shadow file must be owned by root.
RHEL-09-232155RHEL 9 /etc/shadow file must be group-owned by root.
RHEL-09-232160RHEL 9 /etc/shadow- file must be owned by root.
RHEL-09-232165RHEL 9 /etc/shadow- file must be group-owned by root.
RHEL-09-232170RHEL 9 /var/log directory must be owned by root.
RHEL-09-232175RHEL 9 /var/log directory must be group-owned by root.
RHEL-09-232180RHEL 9 /var/log/messages file must be owned by root.
RHEL-09-232185RHEL 9 /var/log/messages file must be group-owned by root.
RHEL-09-232190RHEL 9 system commands must be owned by root.
RHEL-09-232195RHEL 9 system commands must be group-owned by root or a system account.
RHEL-09-232200RHEL 9 library files must be owned by root.
RHEL-09-232205RHEL 9 library files must be group-owned by root or a system account.
RHEL-09-232210RHEL 9 library directories must be owned by root.
RHEL-09-232215RHEL 9 library directories must be group-owned by root or a system account.
RHEL-09-232220RHEL 9 audit tools must be owned by root.
RHEL-09-232225RHEL 9 audit tools must be group-owned by root.
RHEL-09-232230RHEL 9 cron configuration files directory must be owned by root.
RHEL-09-232235RHEL 9 cron configuration files directory must be group-owned by root.
RHEL-09-232240All RHEL 9 world-writable directories must be owned by root, sys, bin, or an application user.
RHEL-09-232245A sticky bit must be set on all RHEL 9 public directories.
RHEL-09-232250All RHEL 9 local files and directories must have a valid group owner.
RHEL-09-232255All RHEL 9 local files and directories must have a valid owner.
RHEL-09-232260RHEL 9 must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
RHEL-09-232265RHEL 9 /etc/crontab file must have mode 0600.
RHEL-09-232270RHEL 9 /etc/shadow file must have mode 0000 to prevent unauthorized access.
RHEL-09-251010RHEL 9 must have the firewalld package installed.
RHEL-09-251015The firewalld service on RHEL 9 must be active.
RHEL-09-251020A RHEL 9 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.
RHEL-09-251030RHEL 9 must protect against or limit the effects of denial-of-service (DoS) attacks by ensuring rate-limiting measures on impacted network interfaces are implemented.
RHEL-09-251035RHEL 9 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.
RHEL-09-251040RHEL 9 network interfaces must not be in promiscuous mode.
RHEL-09-251045RHEL 9 must enable hardening for the Berkeley Packet Filter just-in-time compiler.
RHEL-09-252010RHEL 9 must have the chrony package installed.
RHEL-09-252015RHEL 9 chronyd service must be enabled.
RHEL-09-252020RHEL 9 must securely compare internal information system clocks at least every 24 hours.
RHEL-09-252025RHEL 9 must disable the chrony daemon from acting as a server.
RHEL-09-252030RHEL 9 must disable network management of the chrony daemon.
RHEL-09-252035RHEL 9 systems using Domain Name Servers (DNS) resolution must have at least two name servers configured.
RHEL-09-252040RHEL 9 must configure a DNS processing mode in Network Manager.
RHEL-09-252045RHEL 9 must not have unauthorized IP tunnels configured.
RHEL-09-252050RHEL 9 must be configured to prevent unrestricted mail relaying.
RHEL-09-252060RHEL 9 must forward mail from postmaster to the root account using a postfix alias.
RHEL-09-252065RHEL 9 libreswan package must be installed.
RHEL-09-252070There must be no shosts.equiv files on RHEL 9.
RHEL-09-252075There must be no .shosts files on RHEL 9.
RHEL-09-253010RHEL 9 must be configured to use TCP syncookies.
RHEL-09-253015RHEL 9 must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
RHEL-09-253020RHEL 9 must not forward Internet Protocol version 4 (IPv4) source-routed packets.
RHEL-09-253025RHEL 9 must log IPv4 packets with impossible addresses.
RHEL-09-253030RHEL 9 must log IPv4 packets with impossible addresses by default.
RHEL-09-253035RHEL 9 must use reverse path filtering on all IPv4 interfaces.
RHEL-09-253040RHEL 9 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-09-253045RHEL 9 must not forward IPv4 source-routed packets by default.
RHEL-09-253050RHEL 9 must use a reverse-path filter for IPv4 network traffic when possible by default.
RHEL-09-253055RHEL 9 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
RHEL-09-253060RHEL 9 must limit the number of bogus Internet Control Message Protocol (ICMP) response errors logs.
RHEL-09-253065RHEL 9 must not send Internet Control Message Protocol (ICMP) redirects.
RHEL-09-253070RHEL 9 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
RHEL-09-253075RHEL 9 must not enable IPv4 packet forwarding unless the system is a router.
RHEL-09-254010RHEL 9 must not accept router advertisements on all IPv6 interfaces.
RHEL-09-254015RHEL 9 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
RHEL-09-254020RHEL 9 must not forward IPv6 source-routed packets.
RHEL-09-254025RHEL 9 must not enable IPv6 packet forwarding unless the system is a router.
RHEL-09-254030RHEL 9 must not accept router advertisements on all IPv6 interfaces by default.
RHEL-09-254035RHEL 9 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-09-254040RHEL 9 must not forward IPv6 source-routed packets by default.
RHEL-09-255010All RHEL 9 networked systems must have SSH installed.
RHEL-09-255015All RHEL 9 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
RHEL-09-255020RHEL 9 must have the openssh-clients package installed.
RHEL-09-255025RHEL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a SSH logon.
RHEL-09-255030RHEL 9 must log SSH connection attempts and failures to the server.
RHEL-09-255035RHEL 9 SSHD must accept public key authentication.
RHEL-09-255040RHEL 9 SSHD must not allow blank passwords.
RHEL-09-255045RHEL 9 must not permit direct logons to the root account using remote access via SSH.
RHEL-09-255050RHEL 9 must enable the Pluggable Authentication Module (PAM) interface for SSHD.
RHEL-09-255055RHEL 9 SSH daemon must be configured to use system-wide crypto policies.
RHEL-09-255060RHEL 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH client connections.
RHEL-09-255065RHEL 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH server connections.
RHEL-09-255075RHEL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
RHEL-09-255080RHEL 9 must not allow a noncertificate trusted host SSH logon to the system.
RHEL-09-255085RHEL 9 must not allow users to override SSH environment variables.
RHEL-09-255090RHEL 9 must force a frequent session key renegotiation for SSH connections to the server.
RHEL-09-255095RHEL 9 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.
RHEL-09-255100RHEL 9 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive.
RHEL-09-255105RHEL 9 SSH server configuration file must be group-owned by root.
RHEL-09-255110RHEL 9 SSH server configuration file must be owned by root.
RHEL-09-255115RHEL 9 SSH server configuration file must have mode 0600 or less permissive.
RHEL-09-255120RHEL 9 SSH private host key files must have mode 0640 or less permissive.
RHEL-09-255125RHEL 9 SSH public host key files must have mode 0644 or less permissive.
RHEL-09-255130RHEL 9 SSH daemon must not allow compression or must only allow compression after successful authentication.
RHEL-09-255135RHEL 9 SSH daemon must not allow GSSAPI authentication.
RHEL-09-255140RHEL 9 SSH daemon must not allow Kerberos authentication.
RHEL-09-255145RHEL 9 SSH daemon must not allow rhosts authentication.
RHEL-09-255150RHEL 9 SSH daemon must not allow known hosts authentication.
RHEL-09-255155RHEL 9 SSH daemon must disable remote X connections for interactive users.
RHEL-09-255160RHEL 9 SSH daemon must perform strict mode checking of home directory configuration files.
RHEL-09-255165RHEL 9 SSH daemon must display the date and time of the last successful account logon upon an SSH logon.
RHEL-09-255175RHEL 9 SSH daemon must prevent remote hosts from connecting to the proxy display.
RHEL-09-271010RHEL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon.
RHEL-09-271015RHEL 9 must prevent a user from overriding the banner-message-enable setting for the graphical user interface.
RHEL-09-271020RHEL 9 must disable the graphical user interface automount function unless required.
RHEL-09-271025RHEL 9 must prevent a user from overriding the disabling of the graphical user interface automount function.
RHEL-09-271030RHEL 9 must disable the graphical user interface autorun function unless required.
RHEL-09-271035RHEL 9 must prevent a user from overriding the disabling of the graphical user interface autorun function.
RHEL-09-271040RHEL 9 must not allow unattended or automatic logon via the graphical user interface.
RHEL-09-271045RHEL 9 must be able to initiate directly a session lock for all connection types using smart card when the smart card is removed.
RHEL-09-271050RHEL 9 must prevent a user from overriding the disabling of the graphical user smart card removal action.
RHEL-09-271055RHEL 9 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for graphical user sessions.
RHEL-09-271060RHEL 9 must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface.
RHEL-09-271065RHEL 9 must automatically lock graphical user sessions after 15 minutes of inactivity.
RHEL-09-271070RHEL 9 must prevent a user from overriding the session idle-delay setting for the graphical user interface.
RHEL-09-271075RHEL 9 must initiate a session lock for graphical user interfaces when the screensaver is activated.
RHEL-09-271080RHEL 9 must prevent a user from overriding the session lock-delay setting for the graphical user interface.
RHEL-09-271085RHEL 9 must conceal, via the session lock, information previously visible on the display with a publicly viewable image.
RHEL-09-271090RHEL 9 effective dconf policy must match the policy keyfiles.
RHEL-09-271095RHEL 9 must disable the ability of a user to restart the system from the login screen.
RHEL-09-271100RHEL 9 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface.
RHEL-09-271105RHEL 9 must disable the ability of a user to accidentally press Ctrl-Alt-Del and cause a system to shut down or reboot.
RHEL-09-271110RHEL 9 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface.
RHEL-09-271115RHEL 9 must disable the user list at logon for graphical user interfaces.
RHEL-09-291010RHEL 9 must be configured to disable USB mass storage.
RHEL-09-291015RHEL 9 must have the USBGuard package installed.
RHEL-09-291020RHEL 9 must have the USBGuard package enabled.
RHEL-09-291025RHEL 9 must enable Linux audit logging for the USBGuard daemon.
RHEL-09-291030RHEL 9 must block unauthorized peripherals before establishing a connection.
RHEL-09-291035RHEL 9 Bluetooth must be disabled.
RHEL-09-291040RHEL 9 wireless network adapters must be disabled.
RHEL-09-411010RHEL 9 user account passwords for new users or password changes must have a 60-day maximum password lifetime restriction in /etc/login.defs.
RHEL-09-411015RHEL 9 user account passwords must have a 60-day maximum password lifetime restriction.
RHEL-09-411020All RHEL 9 local interactive user accounts must be assigned a home directory upon creation.
RHEL-09-411025RHEL 9 must set the umask value to 077 for all local interactive user accounts.
RHEL-09-411030RHEL 9 duplicate User IDs (UIDs) must not exist for interactive users.
RHEL-09-411035RHEL 9 system accounts must not have an interactive login shell.
RHEL-09-411040RHEL 9 must automatically expire temporary accounts within 72 hours.
RHEL-09-411045All RHEL 9 interactive users must have a primary group that exists.
RHEL-09-411050RHEL 9 must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
RHEL-09-411055Executable search paths within the initialization files of all local interactive RHEL 9 users must only contain paths that resolve to the system default or the users home directory.
RHEL-09-411060All RHEL 9 local interactive users must have a home directory assigned in the /etc/passwd file.
RHEL-09-411065All RHEL 9 local interactive user home directories defined in the /etc/passwd file must exist.
RHEL-09-411070All RHEL 9 local interactive user home directories must be group-owned by the home directory owner's primary group.
RHEL-09-411075RHEL 9 must automatically lock an account when three unsuccessful logon attempts occur.
RHEL-09-411080RHEL 9 must automatically lock the root account until the root account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.
RHEL-09-411085RHEL 9 must automatically lock an account when three unsuccessful logon attempts occur during a 15-minute time period.
RHEL-09-411090RHEL 9 must maintain an account lock until the locked account is released by an administrator.
RHEL-09-411095RHEL 9 must not have unauthorized accounts.
RHEL-09-411100The root account must be the only account having unrestricted access to RHEL 9 system.
RHEL-09-411105RHEL 9 must ensure account lockouts persist.
RHEL-09-411110RHEL 9 groups must have unique Group ID (GID).
RHEL-09-411115Local RHEL 9 initialization files must not execute world-writable programs.
RHEL-09-412035RHEL 9 must automatically exit interactive command shell user sessions after 15 minutes of inactivity.
RHEL-09-412040RHEL 9 must limit the number of concurrent sessions to ten for all accounts and/or account types.
RHEL-09-412045RHEL 9 must log username information when unsuccessful logon attempts occur.
RHEL-09-412050RHEL 9 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
RHEL-09-412055RHEL 9 must define default permissions for the bash shell.
RHEL-09-412060RHEL 9 must define default permissions for the c shell.
RHEL-09-412065RHEL 9 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
RHEL-09-412070RHEL 9 must define default permissions for the system default profile.
RHEL-09-412075RHEL 9 must display the date and time of the last successful account logon upon logon.
RHEL-09-412080RHEL 9 must terminate idle user sessions.
RHEL-09-431010RHEL 9 must use a Linux Security Module configured to enforce limits on system services.
RHEL-09-431015RHEL 9 must enable the SELinux targeted policy.
RHEL-09-431020RHEL 9 must configure SELinux context type to allow the use of a nondefault faillock tally directory.
RHEL-09-431025RHEL 9 must have policycoreutils package installed.
RHEL-09-431030RHEL 9 policycoreutils-python-utils package must be installed.
RHEL-09-432010RHEL 9 must have the sudo package installed.
RHEL-09-432015RHEL 9 must require reauthentication when using the "sudo" command.
RHEL-09-432020RHEL 9 must use the invoking user's password for privilege escalation when using "sudo".
RHEL-09-432025RHEL 9 must require users to reauthenticate for privilege escalation.
RHEL-09-432030RHEL 9 must restrict privilege elevation to authorized personnel.
RHEL-09-432035RHEL 9 must restrict the use of the "su" command.
RHEL-09-433010RHEL 9 fapolicy module must be installed.
RHEL-09-433015RHEL 9 fapolicy module must be enabled.
RHEL-09-611010RHEL 9 must ensure the password complexity module in the system-auth file is configured for three retries or less.
RHEL-09-611025RHEL 9 must not allow blank or null passwords.
RHEL-09-611030RHEL 9 must configure the use of the pam_faillock.so module in the /etc/pam.d/system-auth file.
RHEL-09-611035RHEL 9 must configure the use of the pam_faillock.so module in the /etc/pam.d/password-auth file.
RHEL-09-611040RHEL 9 must ensure the password complexity module is enabled in the password-auth file.
RHEL-09-611045RHEL 9 must ensure the password complexity module is enabled in the system-auth file.
RHEL-09-611050RHEL 9 password-auth must be configured to use a sufficient number of hashing rounds.
RHEL-09-611055RHEL 9 system-auth must be configured to use a sufficient number of hashing rounds.
RHEL-09-611060RHEL 9 must enforce password complexity rules for the root account.
RHEL-09-611065RHEL 9 must enforce password complexity by requiring that at least one lowercase character be used.
RHEL-09-611070RHEL 9 must enforce password complexity by requiring that at least one numeric character be used.
RHEL-09-611075RHEL 9 passwords for new users or password changes must have a 24 hours minimum password lifetime restriction in /etc/login.defs.
RHEL-09-611080RHEL 9 passwords must have a 24 hours minimum password lifetime restriction in /etc/shadow.
RHEL-09-611085RHEL 9 must require users to provide a password for privilege escalation.
RHEL-09-611090RHEL 9 passwords must be created with a minimum of 15 characters.
RHEL-09-611100RHEL 9 must enforce password complexity by requiring that at least one special character be used.
RHEL-09-611105RHEL 9 must prevent the use of dictionary words for passwords.
RHEL-09-611110RHEL 9 must enforce password complexity by requiring that at least one uppercase character be used.
RHEL-09-611115RHEL 9 must require the change of at least eight characters when passwords are changed.
RHEL-09-611120RHEL 9 must require the maximum number of repeating characters of the same character class be limited to four when passwords are changed.
RHEL-09-611125RHEL 9 must require the maximum number of repeating characters be limited to three when passwords are changed.
RHEL-09-611130RHEL 9 must require the change of at least four character classes when passwords are changed.
RHEL-09-611135RHEL 9 must be configured so that user and group account administration utilities are configured to store only encrypted representations of passwords.
RHEL-09-611140RHEL 9 must be configured to use the shadow file to store only encrypted representations of passwords.
RHEL-09-611145RHEL 9 must not be configured to bypass password requirements for privilege escalation.
RHEL-09-611155RHEL 9 must not have accounts configured with blank or null passwords.
RHEL-09-611160RHEL 9 must use the common access card (CAC) smart card driver.
RHEL-09-611165RHEL 9 must enable certificate based smart card authentication.
RHEL-09-611170RHEL 9 must implement certificate status checking for multifactor authentication.
RHEL-09-611175RHEL 9 must have the pcsc-lite package installed.
RHEL-09-611180The pcscd service on RHEL 9 must be active.
RHEL-09-611185RHEL 9 must have the opensc package installed.
RHEL-09-611190RHEL 9, for PKI-based authentication, must enforce authorized access to the corresponding private key.
RHEL-09-611195RHEL 9 must require authentication to access emergency mode.
RHEL-09-611200RHEL 9 must require authentication to access single-user mode.
RHEL-09-611205RHEL 9 must prevent system daemons from using Kerberos for authentication.
RHEL-09-631010RHEL 9, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
RHEL-09-631015RHEL 9 must map the authenticated identity to the user or group account for PKI-based authentication.
RHEL-09-631020RHEL 9 must prohibit the use of cached authenticators after one day.
RHEL-09-651010RHEL 9 must have the AIDE package installed.
RHEL-09-651015RHEL 9 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered.
RHEL-09-651020RHEL 9 must use a file integrity tool that is configured to use FIPS 140-3-approved cryptographic hashes for validating file contents and directories.
RHEL-09-651025RHEL 9 must use cryptographic mechanisms to protect the integrity of audit tools.
RHEL-09-651030RHEL 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).
RHEL-09-651035RHEL 9 must be configured so that the file integrity tool verifies extended attributes.
RHEL-09-652010RHEL 9 must have the rsyslog package installed.
RHEL-09-652015RHEL 9 must have the packages required for encrypting offloaded audit logs installed.
RHEL-09-652020The rsyslog service on RHEL 9 must be active.
RHEL-09-652025RHEL 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
RHEL-09-652030All RHEL 9 remote access methods must be monitored.
RHEL-09-652035RHEL 9 must be configured to offload audit records onto a different system from the system being audited via syslog.
RHEL-09-652040RHEL 9 must authenticate the remote logging server for offloading audit logs via rsyslog.
RHEL-09-652045RHEL 9 must encrypt the transfer of audit records offloaded onto a different system or media from the system being audited via rsyslog.
RHEL-09-652050RHEL 9 must encrypt via the gtls driver the transfer of audit records offloaded onto a different system or media from the system being audited via rsyslog.
RHEL-09-652055RHEL 9 must be configured to forward audit records via TCP to a different system or media from the system being audited via rsyslog.
RHEL-09-652060RHEL 9 must use cron logging.
RHEL-09-653010RHEL 9 audit package must be installed.
RHEL-09-653015RHEL 9 audit service must be enabled.
RHEL-09-653020RHEL 9 audit system must take appropriate action when an error writing to the audit storage volume occurs.
RHEL-09-653025RHEL 9 audit system must take appropriate action when the audit storage volume is full.
RHEL-09-653030RHEL 9 must allocate audit record storage capacity to store at least one week's worth of audit records.
RHEL-09-653035RHEL 9 must take action when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity.
RHEL-09-653040RHEL 9 must notify the system administrator (SA) and information system security officer (ISSO) (at a minimum) when allocated audit record storage volume 75 percent utilization.
RHEL-09-653045RHEL 9 must take action when allocated audit record storage volume reaches 95 percent of the audit record storage capacity.
RHEL-09-653050RHEL 9 must take action when allocated audit record storage volume reaches 95 percent of the repository maximum audit record storage capacity.
RHEL-09-653055RHEL 9 audit system must take appropriate action when the audit files have reached maximum size.
RHEL-09-653060RHEL 9 must label all offloaded audit logs before sending them to the central log server.
RHEL-09-653065RHEL 9 must take appropriate action when the internal event queue is full.
RHEL-09-653070RHEL 9 System Administrator (SA) and/or information system security officer (ISSO) (at a minimum) must be alerted of an audit processing failure event.
RHEL-09-653075RHEL 9 audit system must audit local events.
RHEL-09-653080RHEL 9 audit logs must be group-owned by root or by a restricted logging group to prevent unauthorized read access.
RHEL-09-653085RHEL 9 audit log directory must be owned by root to prevent unauthorized read access.
RHEL-09-653090RHEL 9 audit logs file must have mode 0600 or less permissive to prevent unauthorized access to the audit log.
RHEL-09-653095RHEL 9 must periodically flush audit records to disk to prevent the loss of audit records.
RHEL-09-653100RHEL 9 must produce audit records containing information to establish the identity of any individual or process associated with the event.
RHEL-09-653105RHEL 9 must write audit records to disk.
RHEL-09-653110RHEL 9 must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
RHEL-09-653115RHEL 9 /etc/audit/auditd.conf file must have 0640 or less permissive to prevent unauthorized access.
RHEL-09-653120RHEL 9 must allocate an audit_backlog_limit of sufficient size to capture processes that start prior to the audit daemon.
RHEL-09-653125RHEL 9 must have mail aliases to notify the information system security officer (ISSO) and system administrator (SA) (at a minimum) in the event of an audit processing failure.
RHEL-09-653130RHEL 9 audispd-plugins package must be installed.
RHEL-09-654010RHEL 9 must audit uses of the "execve" system call.
RHEL-09-654015RHEL 9 must audit all uses of the chmod, fchmod, and fchmodat system calls.
RHEL-09-654020RHEL 9 must audit all uses of the chown, fchown, fchownat, and lchown system calls.
RHEL-09-654025RHEL 9 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
RHEL-09-654030RHEL 9 must audit all uses of umount system calls.
RHEL-09-654035RHEL 9 must audit all uses of the chacl command.
RHEL-09-654040RHEL 9 must audit all uses of the setfacl command.
RHEL-09-654045RHEL 9 must audit all uses of the chcon command.
RHEL-09-654050RHEL 9 must audit all uses of the semanage command.
RHEL-09-654055RHEL 9 must audit all uses of the setfiles command.
RHEL-09-654060RHEL 9 must audit all uses of the setsebool command.
RHEL-09-654065RHEL 9 must audit all uses of the rename, unlink, rmdir, renameat, and unlinkat system calls.
RHEL-09-654070RHEL 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.
RHEL-09-654075RHEL 9 must audit all uses of the delete_module system call.
RHEL-09-654080RHEL 9 must audit all uses of the init_module and finit_module system calls.
RHEL-09-654085RHEL 9 must audit all uses of the chage command.
RHEL-09-654090RHEL 9 must audit all uses of the chsh command.
RHEL-09-654095RHEL 9 must audit all uses of the crontab command.
RHEL-09-654100RHEL 9 must audit all uses of the gpasswd command.
RHEL-09-654105RHEL 9 must audit all uses of the kmod command.
RHEL-09-654110RHEL 9 must audit all uses of the newgrp command.
RHEL-09-654115RHEL 9 must audit all uses of the pam_timestamp_check command.
RHEL-09-654120RHEL 9 must audit all uses of the passwd command.
RHEL-09-654125RHEL 9 must audit all uses of the postdrop command.
RHEL-09-654130RHEL 9 must audit all uses of the postqueue command.
RHEL-09-654135RHEL 9 must audit all uses of the ssh-agent command.
RHEL-09-654140RHEL 9 must audit all uses of the ssh-keysign command.
RHEL-09-654145RHEL 9 must audit all uses of the su command.
RHEL-09-654150RHEL 9 must audit all uses of the sudo command.
RHEL-09-654155RHEL 9 must audit all uses of the sudoedit command.
RHEL-09-654160RHEL 9 must audit all uses of the unix_chkpwd command.
RHEL-09-654165RHEL 9 must audit all uses of the unix_update command.
RHEL-09-654170RHEL 9 must audit all uses of the userhelper command.
RHEL-09-654175RHEL 9 must audit all uses of the usermod command.
RHEL-09-654180RHEL 9 must audit all uses of the mount command.
RHEL-09-654185Successful/unsuccessful uses of the init command in RHEL 9 must generate an audit record.
RHEL-09-654190Successful/unsuccessful uses of the poweroff command in RHEL 9 must generate an audit record.
RHEL-09-654195Successful/unsuccessful uses of the reboot command in RHEL 9 must generate an audit record.
RHEL-09-654200Successful/unsuccessful uses of the shutdown command in RHEL 9 must generate an audit record.
RHEL-09-654205Successful/unsuccessful uses of the umount system call in RHEL 9 must generate an audit record.
RHEL-09-654210Successful/unsuccessful uses of the umount2 system call in RHEL 9 must generate an audit record.
RHEL-09-654215RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
RHEL-09-654220RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
RHEL-09-654225RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
RHEL-09-654230RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
RHEL-09-654235RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
RHEL-09-654240RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
RHEL-09-654245RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
RHEL-09-654250RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/faillock.
RHEL-09-654255RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.
RHEL-09-654260RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/tallylog.
RHEL-09-654265RHEL 9 must take appropriate action when a critical audit processing failure occurs.
RHEL-09-654270RHEL 9 audit system must protect logon UIDs from unauthorized change.
RHEL-09-654275RHEL 9 audit system must protect auditing rules from unauthorized change.
RHEL-09-671010RHEL 9 must enable FIPS mode.
RHEL-09-671015RHEL 9 must employ FIPS 140-3 approved cryptographic hashing algorithms for all stored passwords.
RHEL-09-671020RHEL 9 IP tunnels must use FIPS 140-2/140-3 approved cryptographic algorithms.
RHEL-09-671025RHEL 9 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-3 approved cryptographic hashing algorithm for system authentication.
RHEL-09-672010RHEL 9 must have the crypto-policies package installed.
RHEL-09-672020RHEL 9 crypto policy must not be overridden.
RHEL-09-672025RHEL 9 must use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
RHEL-09-672030RHEL 9 must implement DOD-approved TLS encryption in the GnuTLS package.
RHEL-09-672035RHEL 9 must implement DOD-approved encryption in the OpenSSL package.
RHEL-09-672040RHEL 9 must implement DOD-approved TLS encryption in the OpenSSL package.
RHEL-09-672045RHEL 9 must implement a systemwide encryption policy.
RHEL-09-672050RHEL 9 must implement DOD-approved encryption in the bind package.