STIGQter STIGQter: STIG Summary:

Red Hat Enterprise Linux 8 Security Technical Implementation Guide

Version: 1

Release: 2 Benchmark Date: 23 Apr 2021

CheckedNameTitle
SV-230221r627750_ruleRHEL 8 must be a vendor-supported release.
SV-230222r627750_ruleRHEL 8 vendor packaged system security patches and updates must be installed and up to date.
SV-230223r627750_ruleRHEL 8 must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
SV-230224r627750_ruleAll RHEL 8 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.
SV-230225r627750_ruleRHEL 8 must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a ssh logon.
SV-230226r627750_ruleRHEL 8 must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon.
SV-230227r627750_ruleRHEL 8 must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a command line user logon.
SV-230228r627750_ruleAll RHEL 8 remote access methods must be monitored.
SV-230229r627750_ruleRHEL 8, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
SV-230230r627750_ruleRHEL 8, for certificate-based authentication, must enforce authorized access to the corresponding private key.
SV-230231r627750_ruleRHEL 8 must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.
SV-230232r627750_ruleRHEL 8 must employ FIPS 140-2 approved cryptographic hashing algorithms for all stored passwords.
SV-230233r627750_ruleRHEL 8 must employ FIPS 140-2 approved cryptographic hashing algorithms for all created passwords.
SV-230234r627750_ruleRHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
SV-230235r627750_ruleRHEL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.
SV-230236r627750_ruleRHEL 8 operating systems must require authentication upon booting into emergency or rescue modes.
SV-230237r627750_ruleThe RHEL 8 pam_unix.so module must use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
SV-230238r646862_ruleRHEL 8 must prevent system daemons from using Kerberos for authentication.
SV-230239r646864_ruleThe krb5-workstation package must not be installed on RHEL 8.
SV-230240r627750_ruleRHEL 8 must use a Linux Security Module configured to enforce limits on system services.
SV-230241r627750_ruleRHEL 8 must have policycoreutils package installed.
SV-230242r627750_ruleAll RHEL 8 public directories must be owned by root or a system account to prevent unauthorized and unintended information transferred via shared system resources.
SV-230243r627750_ruleA sticky bit must be set on all RHEL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.
SV-230244r627750_ruleRHEL 8 must be configured so that all network connections associated with SSH traffic are terminated at the end of the session or after 10 minutes of inactivity, except to fulfill documented and validated mission requirements.
SV-230245r627750_ruleThe RHEL 8 /var/log/messages file must have mode 0640 or less permissive.
SV-230246r627750_ruleThe RHEL 8 /var/log/messages file must be owned by root.
SV-230247r627750_ruleThe RHEL 8 /var/log/messages file must be group-owned by root.
SV-230248r627750_ruleThe RHEL 8 /var/log directory must have mode 0755 or less permissive.
SV-230249r627750_ruleThe RHEL 8 /var/log directory must be owned by root.
SV-230250r627750_ruleThe RHEL 8 /var/log directory must be group-owned by root.
SV-230251r646866_ruleThe RHEL 8 SSH daemon must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.
SV-230252r646869_ruleThe RHEL 8 operating system must implement DoD-approved encryption to protect the confidentiality of SSH connections.
SV-230253r627750_ruleRHEL 8 must ensure the SSH server uses strong entropy.
SV-230254r627750_ruleThe RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package.
SV-230255r627750_ruleThe RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.
SV-230256r627750_ruleThe RHEL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.
SV-230257r627750_ruleRHEL 8 system commands must have mode 0755 or less permissive.
SV-230258r627750_ruleRHEL 8 system commands must be owned by root.
SV-230259r627750_ruleRHEL 8 system commands must be group-owned by root or a system account.
SV-230260r627750_ruleRHEL 8 library files must have mode 0755 or less permissive.
SV-230261r627750_ruleRHEL 8 library files must be owned by root.
SV-230262r627750_ruleRHEL 8 library files must be group-owned by root or a system account.
SV-230263r627750_ruleThe RHEL 8 file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency.
SV-230264r627750_ruleRHEL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.
SV-230265r627750_ruleRHEL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.
SV-230266r627750_ruleRHEL 8 must prevent the loading of a new kernel for later execution.
SV-230267r627750_ruleRHEL 8 must enable kernel parameters to enforce discretionary access control on symlinks.
SV-230268r627750_ruleRHEL 8 must enable kernel parameters to enforce discretionary access control on hardlinks.
SV-230269r627750_ruleRHEL 8 must restrict access to the kernel message buffer.
SV-230270r627750_ruleRHEL 8 must prevent kernel profiling by unprivileged users.
SV-230271r627750_ruleRHEL 8 must require users to provide a password for privilege escalation.
SV-230272r627750_ruleRHEL 8 must require users to reauthenticate for privilege escalation.
SV-230273r627750_ruleRHEL 8 must have the packages required for multifactor authentication installed.
SV-230274r627750_ruleRHEL 8 must implement certificate status checking for multifactor authentication.
SV-230275r627750_ruleRHEL 8 must accept Personal Identity Verification (PIV) credentials.
SV-230276r627750_ruleRHEL 8 must implement non-executable data to protect its memory from unauthorized code execution.
SV-230277r627750_ruleRHEL 8 must clear the page allocator to prevent use-after-free attacks.
SV-230278r627750_ruleRHEL 8 must disable virtual syscalls.
SV-230279r627750_ruleRHEL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks.
SV-230280r627750_ruleRHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.
SV-230281r627750_ruleYUM must remove all software components after updated versions have been installed on RHEL 8.
SV-230282r627750_ruleRHEL 8 must enable the SELinux targeted policy.
SV-230283r627750_ruleThere must be no shosts.equiv files on the RHEL 8 operating system.
SV-230284r627750_ruleThere must be no .shosts files on the RHEL 8 operating system.
SV-230285r627750_ruleRHEL 8 must enable the hardware random number generator entropy gatherer service.
SV-230286r627750_ruleThe RHEL 8 SSH public host key files must have mode 0644 or less permissive.
SV-230287r627750_ruleThe RHEL 8 SSH private host key files must have mode 0640 or less permissive.
SV-230288r627750_ruleThe RHEL 8 SSH daemon must perform strict mode checking of home directory configuration files.
SV-230289r627750_ruleThe RHEL 8 SSH daemon must not allow compression or must only allow compression after successful authentication.
SV-230290r627750_ruleThe RHEL 8 SSH daemon must not allow authentication using known host’s authentication.
SV-230291r627750_ruleThe RHEL 8 SSH daemon must not allow unused methods of authentication.
SV-230292r627750_ruleRHEL 8 must use a separate file system for /var.
SV-230293r627750_ruleRHEL 8 must use a separate file system for /var/log.
SV-230294r627750_ruleRHEL 8 must use a separate file system for the system audit data path.
SV-230295r627750_ruleA separate RHEL 8 filesystem must be used for the /tmp directory.
SV-230296r627750_ruleRHEL 8 must not permit direct logons to the root account using remote access via SSH.
SV-230297r627750_ruleThe auditd service must be running in RHEL 8.
SV-230298r627750_ruleThe rsyslog service must be running in RHEL 8.
SV-230299r627750_ruleRHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.
SV-230300r627750_ruleRHEL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.
SV-230301r627750_ruleRHEL 8 must prevent special devices on non-root local partitions.
SV-230302r627750_ruleRHEL 8 must prevent code from being executed on file systems that contain user home directories.
SV-230303r627750_ruleRHEL 8 must prevent special devices on file systems that are used with removable media.
SV-230304r627750_ruleRHEL 8 must prevent code from being executed on file systems that are used with removable media.
SV-230305r627750_ruleRHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
SV-230306r627750_ruleRHEL 8 must prevent code from being executed on file systems that are imported via Network File System (NFS).
SV-230307r627750_ruleRHEL 8 must prevent special devices on file systems that are imported via Network File System (NFS).
SV-230308r627750_ruleRHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
SV-230309r627750_ruleLocal RHEL 8 initialization files must not execute world-writable programs.
SV-230310r627750_ruleRHEL 8 must disable kernel dumps unless needed.
SV-230311r627750_ruleRHEL 8 must disable the kernel.core_pattern.
SV-230312r627750_ruleRHEL 8 must disable acquiring, saving, and processing core dumps.
SV-230313r627750_ruleRHEL 8 must disable core dumps for all users.
SV-230314r627750_ruleRHEL 8 must disable storing core dumps.
SV-230315r627750_ruleRHEL 8 must disable core dump backtraces.
SV-230316r627750_ruleFor RHEL 8 systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured.
SV-230317r627750_ruleExecutable search paths within the initialization files of all local interactive RHEL 8 users must only contain paths that resolve to the system default or the users home directory.
SV-230318r627750_ruleAll RHEL 8 world-writable directories must be owned by root, sys, bin, or an application group.
SV-230319r627750_ruleAll RHEL 8 world-writable directories must be group-owned by root, sys, bin, or an application group.
SV-230320r627750_ruleAll RHEL 8 local interactive users must have a home directory assigned in the /etc/passwd file.
SV-230321r627750_ruleAll RHEL 8 local interactive user home directories must have mode 0750 or less permissive.
SV-230322r627750_ruleAll RHEL 8 local interactive user home directories must be group-owned by the home directory owner’s primary group.
SV-230323r627750_ruleAll RHEL 8 local interactive user home directories defined in the /etc/passwd file must exist.
SV-230324r627750_ruleAll RHEL 8 local interactive user accounts must be assigned a home directory upon creation.
SV-230325r627750_ruleAll RHEL 8 local initialization files must have mode 0740 or less permissive.
SV-230326r627750_ruleAll RHEL 8 local files and directories must have a valid owner.
SV-230327r627750_ruleAll RHEL 8 local files and directories must have a valid group owner.
SV-230328r627750_ruleA separate RHEL 8 filesystem must be used for user home directories (such as /home or an equivalent).
SV-230329r627750_ruleUnattended or automatic logon via the RHEL 8 graphical user interface must not be allowed.
SV-230330r646870_ruleRHEL 8 must not allow users to override SSH environment variables.
SV-230331r627750_ruleRHEL 8 temporary user accounts must be provisioned with an expiration time of 72 hours or less.
SV-230332r627750_ruleRHEL 8 must automatically lock an account when three unsuccessful logon attempts occur.
SV-230333r627750_ruleRHEL 8 must automatically lock an account when three unsuccessful logon attempts occur.
SV-230334r627750_ruleRHEL 8 must automatically lock an account when three unsuccessful logon attempts occur during a 15-minute time period.
SV-230335r627750_ruleRHEL 8 must automatically lock an account when three unsuccessful logon attempts occur during a 15-minute time period.
SV-230336r627750_ruleRHEL 8 must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.
SV-230337r627750_ruleRHEL 8 must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.
SV-230338r627750_ruleRHEL 8 must ensure account lockouts persist.
SV-230339r627750_ruleRHEL 8 must ensure account lockouts persist.
SV-230340r627750_ruleRHEL 8 must prevent system messages from being presented when three unsuccessful logon attempts occur.
SV-230341r627750_ruleRHEL 8 must prevent system messages from being presented when three unsuccessful logon attempts occur.
SV-230342r646872_ruleRHEL 8 must log user name information when unsuccessful logon attempts occur.
SV-230343r627750_ruleRHEL 8 must log user name information when unsuccessful logon attempts occur.
SV-230344r646874_ruleRHEL 8 must include root when automatically locking an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.
SV-230345r627750_ruleRHEL 8 must include root when automatically locking an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.
SV-230346r627750_ruleRHEL 8 must limit the number of concurrent sessions to ten for all accounts and/or account types.
SV-230347r627750_ruleRHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for graphical user sessions.
SV-230348r627750_ruleRHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions.
SV-230349r627750_ruleRHEL 8 must ensure session control is automatically started at shell initialization.
SV-230350r627750_ruleRHEL 8 must prevent users from disabling session control mechanisms.
SV-230351r627750_ruleRHEL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.
SV-230352r646876_ruleRHEL 8 must automatically lock graphical user sessions after 15 minutes of inactivity.
SV-230353r627750_ruleRHEL 8 must automatically lock command line user sessions after 15 minutes of inactivity.
SV-230354r627750_ruleRHEL 8 must prevent a user from overriding graphical user interface settings.
SV-230355r627750_ruleRHEL 8 must map the authenticated identity to the user or group account for PKI-based authentication.
SV-230356r627750_ruleRHEL 8 must ensure a password complexity module is enabled.
SV-230357r627750_ruleRHEL 8 must enforce password complexity by requiring that at least one uppercase character be used.
SV-230358r627750_ruleRHEL 8 must enforce password complexity by requiring that at least one lower-case character be used.
SV-230359r627750_ruleRHEL 8 must enforce password complexity by requiring that at least one numeric character be used.
SV-230360r627750_ruleRHEL 8 must require the maximum number of repeating characters of the same character class be limited to four when passwords are changed.
SV-230361r627750_ruleRHEL 8 must require the maximum number of repeating characters be limited to three when passwords are changed.
SV-230362r627750_ruleRHEL 8 must require the change of at least four character classes when passwords are changed.
SV-230363r627750_ruleRHEL 8 must require the change of at least 8 characters when passwords are changed.
SV-230364r627750_ruleRHEL 8 passwords must have a 24 hours/1 day minimum password lifetime restriction in /etc/shadow.
SV-230365r627750_ruleRHEL 8 passwords for new users or password changes must have a 24 hours/1 day minimum password lifetime restriction in /etc/logins.def.
SV-230366r646878_ruleRHEL 8 user account passwords must have a 60-day maximum password lifetime restriction.
SV-230367r627750_ruleRHEL 8 user account passwords must be configured so that existing passwords are restricted to a 60-day maximum lifetime.
SV-230368r627750_ruleRHEL 8 passwords must be prohibited from reuse for a minimum of five generations.
SV-230369r627750_ruleRHEL 8 passwords must have a minimum of 15 characters.
SV-230370r627750_ruleRHEL 8 passwords for new users must have a minimum of 15 characters.
SV-230371r627750_ruleRHEL 8 duplicate User IDs (UIDs) must not exist for interactive users.
SV-230372r627750_ruleRHEL 8 must implement smart card logon for multifactor authentication for access to interactive accounts.
SV-230373r627750_ruleRHEL 8 account identifiers (individuals, groups, roles, and devices) must be disabled after 35 days of inactivity.
SV-230374r627750_ruleRHEL 8 emergency accounts must be automatically removed or disabled after the crisis is resolved or within 72 hours.
SV-230375r627750_ruleAll RHEL 8 passwords must contain at least one special character.
SV-230376r627750_ruleRHEL 8 must prohibit the use of cached authentications after one day.
SV-230377r627750_ruleRHEL 8 must prevent the use of dictionary words for passwords.
SV-230378r627750_ruleRHEL 8 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
SV-230379r627750_ruleRHEL 8 must not have unnecessary accounts.
SV-230380r627750_ruleRHEL 8 must not have accounts configured with blank or null passwords.
SV-230381r627750_ruleRHEL 8 must display the date and time of the last successful account logon upon logon.
SV-230382r627750_ruleRHEL 8 must display the date and time of the last successful account logon upon an SSH logon.
SV-230383r627750_ruleRHEL 8 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
SV-230384r627750_ruleRHEL 8 must set the umask value to 077 for all local interactive user accounts.
SV-230385r627750_ruleRHEL 8 must define default permissions for logon and non-logon shells.
SV-230386r627750_ruleThe RHEL 8 audit system must be configured to audit the execution of privileged functions and prevent all software from executing at higher privilege levels than users executing the software.
SV-230387r627750_ruleCron logging must be implemented in RHEL 8.
SV-230388r627750_ruleThe RHEL 8 System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) must be alerted of an audit processing failure event.
SV-230389r627750_ruleThe RHEL 8 Information System Security Officer (ISSO) and System Administrator (SA) (at a minimum) must have mail aliases to be notified of an audit processing failure.
SV-230390r627750_ruleThe RHEL 8 System must take appropriate action when an audit processing failure occurs.
SV-230391r627750_ruleThe RHEL 8 System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) must be alerted when the audit storage volume is full.
SV-230392r627750_ruleThe RHEL 8 audit system must take appropriate action when the audit storage volume is full.
SV-230393r627750_ruleThe RHEL 8 audit system must audit local events.
SV-230394r627750_ruleRHEL 8 must label all off-loaded audit logs before sending them to the central log server.
SV-230395r627750_ruleRHEL 8 must resolve audit information before writing to disk.
SV-230396r627750_ruleRHEL 8 audit logs must have a mode of 0600 or less permissive to prevent unauthorized read access.
SV-230397r627750_ruleRHEL 8 audit logs must be owned by root to prevent unauthorized read access.
SV-230398r627750_ruleRHEL 8 audit logs must be group-owned by root to prevent unauthorized read access.
SV-230399r627750_ruleRHEL 8 audit log directory must be owned by root to prevent unauthorized read access.
SV-230400r627750_ruleRHEL 8 audit log directory must be group-owned by root to prevent unauthorized read access.
SV-230401r627750_ruleRHEL 8 audit log directory must have a mode of 0700 or less permissive to prevent unauthorized read access.
SV-230402r627750_ruleRHEL 8 audit system must protect auditing rules from unauthorized change.
SV-230403r627750_ruleRHEL 8 audit system must protect logon UIDs from unauthorized change.
SV-230404r627750_ruleRHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
SV-230405r627750_ruleRHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
SV-230406r627750_ruleRHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
SV-230407r627750_ruleRHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
SV-230408r627750_ruleRHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
SV-230409r627750_ruleRHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
SV-230410r627750_ruleRHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/.
SV-230411r646881_ruleRHEL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
SV-230412r627750_ruleSuccessful/unsuccessful uses of the su command in RHEL 8 must generate an audit record.
SV-230413r627750_ruleThe RHEL 8 audit system must be configured to audit any usage of the lremovexattr system call.
SV-230414r627750_ruleThe RHEL 8 audit system must be configured to audit any usage of the removexattr system call.
SV-230415r627750_ruleThe RHEL 8 audit system must be configured to audit any usage of the lsetxattr system call.
SV-230416r627750_ruleThe RHEL 8 audit system must be configured to audit any usage of the fsetxattr system call.
SV-230417r627750_ruleThe RHEL 8 audit system must be configured to audit any usage of the fremovexattr system call.
SV-230418r627750_ruleSuccessful/unsuccessful uses of the chage command in RHEL 8 must generate an audit record.
SV-230419r627750_ruleSuccessful/unsuccessful uses of the chcon command in RHEL 8 must generate an audit record.
SV-230420r627750_ruleThe RHEL 8 audit system must be configured to audit any usage of the setxattr system call.
SV-230421r627750_ruleSuccessful/unsuccessful uses of the ssh-agent in RHEL 8 must generate an audit record.
SV-230422r627750_ruleSuccessful/unsuccessful uses of the passwd command in RHEL 8 must generate an audit record.
SV-230423r627750_ruleSuccessful/unsuccessful uses of the mount command in RHEL 8 must generate an audit record.
SV-230424r627750_ruleSuccessful/unsuccessful uses of the umount command in RHEL 8 must generate an audit record.
SV-230425r627750_ruleSuccessful/unsuccessful uses of the mount syscall in RHEL 8 must generate an audit record.
SV-230426r627750_ruleSuccessful/unsuccessful uses of the unix_update in RHEL 8 must generate an audit record.
SV-230427r627750_ruleSuccessful/unsuccessful uses of postdrop in RHEL 8 must generate an audit record.
SV-230428r627750_ruleSuccessful/unsuccessful uses of postqueue in RHEL 8 must generate an audit record.
SV-230429r627750_ruleSuccessful/unsuccessful uses of semanage in RHEL 8 must generate an audit record.
SV-230430r627750_ruleSuccessful/unsuccessful uses of setfiles in RHEL 8 must generate an audit record.
SV-230431r627750_ruleSuccessful/unsuccessful uses of userhelper in RHEL 8 must generate an audit record.
SV-230432r627750_ruleSuccessful/unsuccessful uses of setsebool in RHEL 8 must generate an audit record.
SV-230433r627750_ruleSuccessful/unsuccessful uses of unix_chkpwd in RHEL 8 must generate an audit record.
SV-230434r627750_ruleSuccessful/unsuccessful uses of the ssh-keysign in RHEL 8 must generate an audit record.
SV-230435r627750_ruleSuccessful/unsuccessful uses of the setfacl command in RHEL 8 must generate an audit record.
SV-230436r627750_ruleSuccessful/unsuccessful uses of the pam_timestamp_check command in RHEL 8 must generate an audit record.
SV-230437r627750_ruleSuccessful/unsuccessful uses of the newgrp command in RHEL 8 must generate an audit record.
SV-230438r627750_ruleSuccessful/unsuccessful uses of the init_module command in RHEL 8 must generate an audit record.
SV-230439r627750_ruleSuccessful/unsuccessful uses of the rename command in RHEL 8 must generate an audit record.
SV-230440r627750_ruleSuccessful/unsuccessful uses of the renameat command in RHEL 8 must generate an audit record.
SV-230441r627750_ruleSuccessful/unsuccessful uses of the rmdir command in RHEL 8 must generate an audit record.
SV-230442r627750_ruleSuccessful/unsuccessful uses of the unlink command in RHEL 8 must generate an audit record.
SV-230443r627750_ruleSuccessful/unsuccessful uses of the unlinkat command in RHEL 8 must generate an audit record.
SV-230444r627750_ruleSuccessful/unsuccessful uses of the gpasswd command in RHEL 8 must generate an audit record.
SV-230445r627750_ruleSuccessful/unsuccessful uses of the finit_module command in RHEL 8 must generate an audit record.
SV-230446r627750_ruleSuccessful/unsuccessful uses of the delete_module command in RHEL 8 must generate an audit record.
SV-230447r627750_ruleSuccessful/unsuccessful uses of the crontab command in RHEL 8 must generate an audit record.
SV-230448r627750_ruleSuccessful/unsuccessful uses of the chsh command in RHEL 8 must generate an audit record.
SV-230449r627750_ruleSuccessful/unsuccessful uses of the truncate command in RHEL 8 must generate an audit record.
SV-230450r627750_ruleSuccessful/unsuccessful uses of the openat system call in RHEL 8 must generate an audit record.
SV-230451r627750_ruleSuccessful/unsuccessful uses of the open system call in RHEL 8 must generate an audit record.
SV-230452r627750_ruleSuccessful/unsuccessful uses of the open_by_handle_at system call in RHEL 8 must generate an audit record.
SV-230453r627750_ruleSuccessful/unsuccessful uses of the ftruncate command in RHEL 8 must generate an audit record.
SV-230454r627750_ruleSuccessful/unsuccessful uses of the creat system call in RHEL 8 must generate an audit record.
SV-230455r627750_ruleSuccessful/unsuccessful uses of the chown command in RHEL 8 must generate an audit record.
SV-230456r627750_ruleSuccessful/unsuccessful uses of the chmod command in RHEL 8 must generate an audit record.
SV-230457r627750_ruleSuccessful/unsuccessful uses of the lchown system call in RHEL 8 must generate an audit record.
SV-230458r627750_ruleSuccessful/unsuccessful uses of the fchownat system call in RHEL 8 must generate an audit record.
SV-230459r627750_ruleSuccessful/unsuccessful uses of the fchown system call in RHEL 8 must generate an audit record.
SV-230460r627750_ruleSuccessful/unsuccessful uses of the fchmodat system call in RHEL 8 must generate an audit record.
SV-230461r627750_ruleSuccessful/unsuccessful uses of the fchmod system call in RHEL 8 must generate an audit record.
SV-230462r627750_ruleSuccessful/unsuccessful uses of the sudo command in RHEL 8 must generate an audit record.
SV-230463r627750_ruleSuccessful/unsuccessful uses of the usermod command in RHEL 8 must generate an audit record.
SV-230464r627750_ruleSuccessful/unsuccessful uses of the chacl command in RHEL 8 must generate an audit record.
SV-230465r627750_ruleSuccessful/unsuccessful uses of the kmod command in RHEL 8 must generate an audit record.
SV-230466r627750_ruleSuccessful/unsuccessful modifications to the faillock log file in RHEL 8 must generate an audit record.
SV-230467r627750_ruleSuccessful/unsuccessful modifications to the lastlog file in RHEL 8 must generate an audit record.
SV-230468r627750_ruleRHEL 8 must enable auditing of processes that start prior to the audit daemon.
SV-230469r627750_ruleRHEL 8 must allocate an audit_backlog_limit of sufficient size to capture processes that start prior to the audit daemon.
SV-230470r627750_ruleRHEL 8 must enable Linux audit logging for the USBGuard daemon.
SV-230471r627750_ruleRHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
SV-230472r627750_ruleRHEL 8 audit tools must have a mode of 0755 or less permissive.
SV-230473r627750_ruleRHEL 8 audit tools must be owned by root.
SV-230474r627750_ruleRHEL 8 audit tools must be group-owned by root.
SV-230475r627750_ruleRHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools.
SV-230476r627750_ruleRHEL 8 must allocate audit record storage capacity to store at least one week of audit records, when audit records are not immediately sent to a central audit record storage facility.
SV-230477r627750_ruleRHEL 8 must have the packages required for offloading audit logs installed.
SV-230478r627750_ruleRHEL 8 must have the packages required for encrypting offloaded audit logs installed.
SV-230479r627750_ruleThe RHEL 8 audit records must be off-loaded onto a different system or storage media from the system being audited.
SV-230480r627750_ruleRHEL 8 must take appropriate action when the internal event queue is full.
SV-230481r627750_ruleRHEL 8 must encrypt the transfer of audit records off-loaded onto a different system or media from the system being audited.
SV-230482r627750_ruleRHEL 8 must authenticate the remote logging server for off-loading audit logs.
SV-230483r627750_ruleRHEL 8 must notify the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity.
SV-230484r627750_ruleRHEL 8 must securely compare internal information system clocks at least every 24 hours with a server synchronized to an authoritative time source, such as the United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).
SV-230485r627750_ruleRHEL 8 must disable the chrony daemon from acting as a server.
SV-230486r627750_ruleRHEL 8 must disable network management of the chrony daemon.
SV-230487r627750_ruleRHEL 8 must not have the telnet-server package installed.
SV-230488r627750_ruleRHEL 8 must not have any automated bug reporting tools installed.
SV-230489r627750_ruleRHEL 8 must not have the sendmail package installed.
SV-230491r627750_ruleRHEL 8 must enable mitigations against processor-based vulnerabilities.
SV-230492r627750_ruleRHEL 8 must not have the rsh-server package installed.
SV-230493r627750_ruleRHEL 8 must cover or disable the built-in or attached camera when not in use.
SV-230494r627750_ruleRHEL 8 must disable the asynchronous transfer mode (ATM) protocol.
SV-230495r627750_ruleRHEL 8 must disable the controller area network (CAN) protocol.
SV-230496r627750_ruleRHEL 8 must disable the stream control transmission (SCTP) protocol.
SV-230497r627750_ruleRHEL 8 must disable the transparent inter-process communication (TIPC) protocol.
SV-230498r627750_ruleRHEL 8 must disable mounting of cramfs.
SV-230499r627750_ruleRHEL 8 must disable IEEE 1394 (FireWire) Support.
SV-230500r627750_ruleRHEL 8 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.
SV-230502r627750_ruleThe RHEL 8 file system automounter must be disabled unless required.
SV-230503r627750_ruleRHEL 8 must be configured to disable USB mass storage.
SV-230504r627750_ruleA RHEL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.
SV-230505r627750_ruleA firewall must be installed on RHEL 8.
SV-230506r627750_ruleRHEL 8 wireless network adapters must be disabled.
SV-230507r627750_ruleRHEL 8 Bluetooth must be disabled.
SV-230508r627750_ruleRHEL 8 must mount /dev/shm with the nodev option.
SV-230509r627750_ruleRHEL 8 must mount /dev/shm with the nosuid option.
SV-230510r627750_ruleRHEL 8 must mount /dev/shm with the noexec option.
SV-230511r627750_ruleRHEL 8 must mount /tmp with the nodev option.
SV-230512r627750_ruleRHEL 8 must mount /tmp with the nosuid option.
SV-230513r627750_ruleRHEL 8 must mount /tmp with the noexec option.
SV-230514r627750_ruleRHEL 8 must mount /var/log with the nodev option.
SV-230515r627750_ruleRHEL 8 must mount /var/log with the nosuid option.
SV-230516r627750_ruleRHEL 8 must mount /var/log with the noexec option.
SV-230517r627750_ruleRHEL 8 must mount /var/log/audit with the nodev option.
SV-230518r627750_ruleRHEL 8 must mount /var/log/audit with the nosuid option.
SV-230519r627750_ruleRHEL 8 must mount /var/log/audit with the noexec option.
SV-230520r627750_ruleRHEL 8 must mount /var/tmp with the nodev option.
SV-230521r627750_ruleRHEL 8 must mount /var/tmp with the nosuid option.
SV-230522r627750_ruleRHEL 8 must mount /var/tmp with the noexec option.
SV-230523r627750_ruleThe RHEL 8 fapolicy module must be configured to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
SV-230524r627750_ruleRHEL 8 must block unauthorized peripherals before establishing a connection.
SV-230525r627750_ruleA firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring RHEL 8 can implement rate-limiting measures on impacted network interfaces.
SV-230526r627750_ruleAll RHEL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
SV-230527r627750_ruleRHEL 8 must force a frequent session key renegotiation for SSH connections to the server.
SV-230528r627750_ruleRHEL 8 must force a frequent session key renegotiation for SSH connections by the client.
SV-230529r627750_ruleThe x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 8.
SV-230530r646883_ruleThe x86 Ctrl-Alt-Delete key sequence in RHEL 8 must be disabled if a graphical user interface is installed.
SV-230531r627750_ruleThe systemd Ctrl-Alt-Delete burst key sequence in RHEL 8 must be disabled.
SV-230532r627750_ruleThe debug-shell systemd service must be disabled on RHEL 8.
SV-230533r627750_ruleThe Trivial File Transfer Protocol (TFTP) server package must not be installed if not required for RHEL 8 operational support.
SV-230534r627750_ruleThe root account must be the only account having unrestricted access to the RHEL 8 system.
SV-230535r627750_ruleRHEL 8 must prevent Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SV-230536r627750_ruleRHEL 8 must not send Internet Control Message Protocol (ICMP) redirects.
SV-230537r627750_ruleRHEL 8 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
SV-230538r627750_ruleRHEL 8 must not forward source-routed packets.
SV-230539r627750_ruleRHEL 8 must not forward source-routed packets by default.
SV-230540r627750_ruleRHEL 8 must not be performing packet forwarding unless the system is a router.
SV-230541r627750_ruleRHEL 8 must not accept router advertisements on all IPv6 interfaces.
SV-230542r627750_ruleRHEL 8 must not accept router advertisements on all IPv6 interfaces by default.
SV-230543r627750_ruleRHEL 8 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
SV-230544r627750_ruleRHEL 8 must ignore Internet Control Message Protocol (ICMP) redirect messages.
SV-230545r627750_ruleRHEL 8 must disable access to network bpf syscall from unprivileged processes.
SV-230546r627750_ruleRHEL 8 must restrict usage of ptrace to descendant processes.
SV-230547r627750_ruleRHEL 8 must restrict exposed kernel pointer addresses access.
SV-230548r627750_ruleRHEL 8 must disable the use of user namespaces.
SV-230549r627750_ruleRHEL 8 must use reverse path filtering on all IPv4 interfaces.
SV-230550r627750_ruleRHEL 8 must be configured to prevent unrestricted mail relaying.
SV-230551r627750_ruleThe RHEL 8 file integrity tool must be configured to verify extended attributes.
SV-230552r627750_ruleThe RHEL 8 file integrity tool must be configured to verify Access Control Lists (ACLs).
SV-230553r646886_ruleThe graphical display manager must not be installed on RHEL 8 unless approved.
SV-230554r627750_ruleRHEL 8 network interfaces must not be in promiscuous mode.
SV-230555r627750_ruleRHEL 8 remote X connections for interactive users must be disabled unless to fulfill documented and validated mission requirements.
SV-230556r627750_ruleThe RHEL 8 SSH daemon must prevent remote hosts from connecting to the proxy display.
SV-230557r627750_ruleIf the Trivial File Transfer Protocol (TFTP) server is required, the RHEL 8 TFTP daemon must be configured to operate in secure mode.
SV-230558r627750_ruleA File Transfer Protocol (FTP) server package must not be installed unless mission essential on RHEL 8.
SV-230559r646887_ruleThe gssproxy package must not be installed unless mission essential on RHEL 8.
SV-230560r627750_ruleThe iprutils package must not be installed unless mission essential on RHEL 8.
SV-230561r627750_ruleThe tuned package must not be installed unless mission essential on RHEL 8.
SV-237640r646890_ruleThe krb5-server package must not be installed on RHEL 8.
SV-237641r646893_ruleRHEL 8 must restrict privilege elevation to authorized personnel.
SV-237642r646896_ruleRHEL 8 must use the invoking user's password for privilege escalation when using "sudo".
SV-237643r646899_ruleRHEL 8 must require re-authentication when using the "sudo" command.