Amazon Linux 2023 STIG SCAP Benchmark
Open a previous version of this SCAP benchmark.
- RMF Control
- Severity
- H
- CCI
- CCI-003992
- Version
- AZLX-23-000115
- Vuln IDs
- V-273996
- Rule IDs
- SV-273996r1119976_rule
Fix: F-77992r1119975_fix
Configure Amazon Linux 2023 to always check the GPG signature of local software packages before installation. Add or update the following line in the [main] section of the /etc/dnf/dnf.conf file: localpkg_gpgcheck=1
- RMF Control
- Severity
- H
- CCI
- CCI-003992
- Version
- AZLX-23-000120
- Vuln IDs
- V-273997
- Rule IDs
- SV-273997r1119979_rule
Fix: F-77993r1119978_fix
Configure Amazon Linux 2023 to always check the GPG signature of software packages originating from external software repositories before installation. Add or update the following line in the [main] section of the /etc/dnf/dnf.conf file: gpgcheck=1
- RMF Control
- Severity
- H
- CCI
- CCI-003992
- Version
- AZLX-23-000125
- Vuln IDs
- V-273998
- Rule IDs
- SV-273998r1119982_rule
Fix: F-77994r1119981_fix
Configure Amazon Linux 2023 to verify the signature of packages from a repository prior to installation by setting the following option in the "/etc/yum.repos.d/[your_repo_name].repo" file: gpgcheck=1
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- AZLX-23-000130
- Vuln IDs
- V-273999
- Rule IDs
- SV-273999r1155171_rule
Fix: F-77995r1119984_fix
Configure Amazon Linux 2023 to be a vendor supported release. Upgrade to a supported version of Amazon Linux 2023.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- AZLX-23-000135
- Vuln IDs
- V-274000
- Rule IDs
- SV-274000r1119988_rule
Fix: F-77996r1119987_fix
Configure Amazon Linux 2023 to enable the systemd-journald service with the following command: $ sudo systemctl enable --now systemd-journald
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- AZLX-23-000200
- Vuln IDs
- V-274001
- Rule IDs
- SV-274001r1198253_rule
Fix: F-77997r1119990_fix
Configure Amazon Linux 2023 to restrict access to the kernel message buffer. Add or edit the following line in a system configuration file, in the "/etc/sysctl.d/" directory: kernel.dmesg_restrict = 1 Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- AZLX-23-000205
- Vuln IDs
- V-274002
- Rule IDs
- SV-274002r1198253_rule
Fix: F-77998r1119993_fix
Configure Amazon Linux 2023 to prevent kernel profiling by nonprivileged users. Add or edit the following line in a system configuration file, in the "/etc/sysctl.d/" directory: kernel.perf_event_paranoid = 2 Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- AZLX-23-000210
- Vuln IDs
- V-274003
- Rule IDs
- SV-274003r1198253_rule
Fix: F-77999r1119996_fix
Configure Amazon Linux 2023 to restrict exposed kernel pointer addresses access. Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: kernel.kptr_restrict = 1 Reload settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- AZLX-23-000215
- Vuln IDs
- V-274004
- Rule IDs
- SV-274004r1198253_rule
Fix: F-78000r1119999_fix
Configure Amazon Linux 2023 to prevent privilege escalation through the kernel by disabling access to the bpf syscall by adding the following line to a file, in the "/etc/sysctl.d" directory: kernel.unprivileged_bpf_disabled = 1 The system configuration files must be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- AZLX-23-000220
- Vuln IDs
- V-274005
- Rule IDs
- SV-274005r1198253_rule
Fix: F-78001r1120002_fix
Configure Amazon Linux 2023 to restrict usage of ptrace to descendant processes by adding the following line to a file, in the "/etc/sysctl.d" directory: kernel.yama.ptrace_scope = 1 The system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- AZLX-23-000225
- Vuln IDs
- V-274006
- Rule IDs
- SV-274006r1120006_rule
Fix: F-78002r1120005_fix
Configure Amazon Linux 2023 to enable ASLR to enhance memory protection. Enable ASLR by setting the kernel parameter with the following command: echo 2 | sudo tee /proc/sys/kernel/randomize_va_space Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: kernel.randomize_va_space = 2 Reload settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- AZLX-23-000300
- Vuln IDs
- V-274007
- Rule IDs
- SV-274007r1120009_rule
Fix: F-78003r1120008_fix
Configure Amazon Linux 2023 to not have the vsftpd package installed with the following command: $ sudo dnf -y remove vsftpd
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- AZLX-23-000305
- Vuln IDs
- V-274008
- Rule IDs
- SV-274008r1120012_rule
Fix: F-78004r1120011_fix
Configure Amazon Linux 2023 to not have the sendmail package installed with the following command: $ sudo dnf -y remove sendmail
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- AZLX-23-000310
- Vuln IDs
- V-274009
- Rule IDs
- SV-274009r1120015_rule
Fix: F-78005r1120014_fix
Configure Amazon Linux 2023 to not have the nfs-utils package installed with the following command: $ sudo dnf -y remove nfs-utils
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- AZLX-23-000315
- Vuln IDs
- V-274010
- Rule IDs
- SV-274010r1120018_rule
Fix: F-78006r1120017_fix
Configure Amazon Linux 2023 to not have the telnet-server package installed with the following command: $ sudo dnf -y remove telnet-server
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- AZLX-23-000320
- Vuln IDs
- V-274011
- Rule IDs
- SV-274011r1184000_rule
Fix: F-78007r1120020_fix
Configure Amazon Linux 2023 to not have the gssproxy package installed. The gssproxy package can be removed with the following command: $ sudo dnf -y remove gssproxy
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- AZLX-23-001000
- Vuln IDs
- V-274012
- Rule IDs
- SV-274012r1120710_rule
Fix: F-78008r1120023_fix
Configure Amazon Linux 2023 to have the sudo package installed with the following command: $ sudo dnf install -y sudo
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- AZLX-23-001005
- Vuln IDs
- V-274013
- Rule IDs
- SV-274013r1120027_rule
Fix: F-78009r1120026_fix
Configure Amazon Linux 2023 to require users to supply a password for privilege escalation. Remove any occurrences of "pam_succeed_if " in the "/etc/pam.d/sudo" file.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- AZLX-23-001015
- Vuln IDs
- V-274015
- Rule IDs
- SV-274015r1120033_rule
Fix: F-78011r1120032_fix
Configure Amazon Linux 2023 to not allow users to execute privileged actions without authenticating. Remove any occurrence of "!authenticate" found in "/etc/sudoers" file or files in the "/etc/sudoers.d" directory. $ sudo sed -i '/\!authenticate/ s/^/# /g' /etc/sudoers /etc/sudoers.d/*
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- AZLX-23-001025
- Vuln IDs
- V-274017
- Rule IDs
- SV-274017r1120039_rule
Fix: F-78013r1120038_fix
Configure Amazon Linux 2023 so that the audit service to produce audit records containing the information needed to establish when (date and time) an event occurred. Install the audit service (if the audit service is not already installed) with the following command: $ sudo dnf install -y audit
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AZLX-23-001030
- Vuln IDs
- V-274018
- Rule IDs
- SV-274018r1120042_rule
Fix: F-78014r1120041_fix
Configure Amazon Linux 2023 so that the audit service to produce audit records containing the information needed to establish when an event occurred with the following commands: $ sudo systemctl enable auditd.service $ sudo systemctl start auditd.service
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- AZLX-23-001035
- Vuln IDs
- V-274019
- Rule IDs
- SV-274019r1120045_rule
Fix: F-78015r1120044_fix
Configure Amazon Linux 2023 to have the audispd-plugins package installed. Install the audispd-plugins package with the following command: $ sudo dnf install -y audispd-plugins
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- AZLX-23-001040
- Vuln IDs
- V-274020
- Rule IDs
- SV-274020r1193303_rule
Fix: F-78016r1120047_fix
Configure Amazon Linux 2023 to monitor all remote access methods by installing rsyslog with the following command: $ sudo dnf install -y rsyslog Enable the log service with the following command: $ sudo systemctl enable --now rsyslog
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- AZLX-23-001045
- Vuln IDs
- V-274021
- Rule IDs
- SV-274021r1120695_rule
Fix: F-78017r1120050_fix
Configure Amazon Linux 2023 to monitor all remote access methods by installing rsyslog with the following command: $ sudo yum install rsyslog Then add or update the following lines to the "/etc/rsyslog.conf" file: auth.*;authpriv.*;daemon.* /var/log/secure The "rsyslog" service must be restarted for the changes to take effect. To restart the "rsyslog" service, run the following command: $ sudo systemctl restart rsyslog.service
- RMF Control
- Severity
- M
- CCI
- CCI-004923
- Version
- AZLX-23-001050
- Vuln IDs
- V-274022
- Rule IDs
- SV-274022r1120054_rule
Fix: F-78018r1120053_fix
Configure Amazon Linux 2023 to have the chrony package installed. The chrony package can be installed with the following command: $ sudo dnf install -y chrony
- RMF Control
- Severity
- M
- CCI
- CCI-004923
- Version
- AZLX-23-001055
- Vuln IDs
- V-274023
- Rule IDs
- SV-274023r1120057_rule
Fix: F-78019r1120056_fix
Configure Amazon Linux 2023 to have the chronyd service set to active with the following command: $ sudo systemctl enable --now chronyd
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-001744
- Version
- AZLX-23-001060
- Vuln IDs
- V-274024
- Rule IDs
- SV-274024r1190697_rule
Fix: F-78020r1190696_fix
Configure Amazon Linux 2023 to have the AIDE package installed. Install AIDE: $ sudo dnf install -y aide Initialize AIDE: $ sudo /usr/sbin/aide --init The new database must be renamed to be read by AIDE: $ sudo mv /var/lib/aide/aide.db.new.gz /var/lib/aide/aide.db.gz Perform a manual check: $ sudo /usr/sbin/aide --check Example output: 2023-06-05 10:16:08 -0600 (AIDE 0.16) AIDE found NO differences between database and filesystem. Looks okay!!
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- AZLX-23-001070
- Vuln IDs
- V-274026
- Rule IDs
- SV-274026r1120066_rule
Fix: F-78022r1120065_fix
Configure Amazon Linux 2023 to protect the integrity of the AIDE audit tools. Add or update the following lines to "/etc/aide.conf", to protect the integrity of the audit tools. /usr/sbin/auditctl p+i+n+u+g+s+b+acl+xattrs+sha512 /usr/sbin/auditd p+i+n+u+g+s+b+acl+xattrs+sha512 /usr/sbin/ausearch p+i+n+u+g+s+b+acl+xattrs+sha512 /usr/sbin/aureport p+i+n+u+g+s+b+acl+xattrs+sha512 /usr/sbin/autrace p+i+n+u+g+s+b+acl+xattrs+sha512 /usr/sbin/augenrules p+i+n+u+g+s+b+acl+xattrs+sha512
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- AZLX-23-001075
- Vuln IDs
- V-274027
- Rule IDs
- SV-274027r1120069_rule
Fix: F-78023r1120068_fix
Configure Amazon Linux 2023 to have the firewalld package installed with the following command: $ sudo dnf install -y firewalld
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- AZLX-23-001080
- Vuln IDs
- V-274028
- Rule IDs
- SV-274028r1190806_rule
Fix: F-78024r1120071_fix
Configure Amazon Linux 2023 to enable the firewalld service with the following command: $ sudo systemctl enable --now firewalld
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- AZLX-23-001090
- Vuln IDs
- V-274030
- Rule IDs
- SV-274030r1120078_rule
Fix: F-78026r1120077_fix
Configure Amazon Linux 2023 to manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of DoS attacks. Configure "nftables" to be the default "firewallbackend" for "firewalld" by adding or editing the following line in "etc/firewalld/firewalld.conf": FirewallBackend=nftables Establish rate-limiting rules based on organization-defined types of DoS attacks on impacted network interfaces.
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-001744
- Version
- AZLX-23-001095
- Vuln IDs
- V-274031
- Rule IDs
- SV-274031r1120081_rule
Fix: F-78027r1120080_fix
Configure Amazon Linux 2023 to have the s-nail package installed with the following command: $ sudo dnf install -y s-nail
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- AZLX-23-001105
- Vuln IDs
- V-274032
- Rule IDs
- SV-274032r1184010_rule
Fix: F-78028r1120083_fix
Configure Amazon Linux 2023 to have the libreswan package installed with the following command: $ sudo dnf install -y libreswan
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- AZLX-23-001115
- Vuln IDs
- V-274034
- Rule IDs
- SV-274034r1120090_rule
Fix: F-78030r1120089_fix
Configure Amazon Linux 2023 to have the pcsc-lite package installed with the following command: $ sudo dnf install -y pcsc-lite
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- AZLX-23-001120
- Vuln IDs
- V-274035
- Rule IDs
- SV-274035r1120093_rule
Fix: F-78031r1120092_fix
Configure Amazon Linux 2023 to have the rsyslog-openssl package installed with the following command: $ sudo dnf install -y rsyslog-openssl
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- AZLX-23-001125
- Vuln IDs
- V-274036
- Rule IDs
- SV-274036r1120096_rule
Fix: F-78032r1120095_fix
Configure Amazon Linux 2023 to have the opensc package installed with the following command: $ sudo dnf install -y opensc
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- AZLX-23-001130
- Vuln IDs
- V-274037
- Rule IDs
- SV-274037r1120099_rule
Fix: F-78033r1120098_fix
Configure Amazon Linux 2023 to have the openssl-pkcs11 package installed with the following command: $ sudo dnf install -y openssl-pkcs11
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- AZLX-23-001195
- Vuln IDs
- V-274040
- Rule IDs
- SV-274040r1184011_rule
Fix: F-78036r1120107_fix
Configure Amazon Linux 2023 to have the crypto-policies package installed with the following command: $ sudo dnf install -y crypto-policies
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-001453
- Version
- AZLX-23-001205
- Vuln IDs
- V-274042
- Rule IDs
- SV-274042r1184013_rule
Fix: F-78038r1120113_fix
Configure Amazon Linux 2023 so that the SSH server uses only ciphers employing FIPS 140-2/140-3 approved algorithms. Reinstall crypto-policies with the following command: $ sudo dnf -y reinstall crypto-policies Set the crypto-policy to FIPS with the following command: $ sudo update-crypto-policies --set FIPS Setting system policy to FIPS Note: Systemwide crypto policies are applied on application startup. It is recommended to restart the system for the change of policies to fully take place.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-001453
- Version
- AZLX-23-001210
- Vuln IDs
- V-274043
- Rule IDs
- SV-274043r1184014_rule
Fix: F-78039r1120116_fix
Configure Amazon Linux 2023 so that the SSH server uses only MACs employing FIPS 140-2/140-3 approved algorithms. Reinstall crypto-policies with the following command: $ sudo dnf -y reinstall crypto-policies Set the crypto-policy to FIPS with the following command: $ sudo update-crypto-policies --set FIPS Setting system policy to FIPS Note: Systemwide crypto policies are applied on application startup. It is recommended to restart the system for the change of policies to fully take place.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- AZLX-23-001215
- Vuln IDs
- V-274044
- Rule IDs
- SV-274044r1120120_rule
Fix: F-78040r1120119_fix
Configure Amazon Linux 2023 so that the SSH daemon does not allow GSSAPI authentication. Add or uncomment the following line to "/etc/ssh/sshd_config" or to a file in "/etc/ssh/sshd_config.d" and set the value to "no": GSSAPIAuthentication no The SSH service must be restarted for changes to take effect: $ sudo systemctl restart sshd.service
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- AZLX-23-001220
- Vuln IDs
- V-274045
- Rule IDs
- SV-274045r1120123_rule
Fix: F-78041r1120122_fix
Configure Amazon Linux 2023 so that the SSH daemon does not allow Kerberos authentication. Add the following line in "/etc/ssh/sshd_config" or to a file in "/etc/ssh/sshd_config.d" or uncomment the line and set the value to "no": KerberosAuthentication no The SSH service must be restarted for changes to take effect: $ sudo systemctl restart sshd.service
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- AZLX-23-001230
- Vuln IDs
- V-274047
- Rule IDs
- SV-274047r1120129_rule
Fix: F-78043r1120128_fix
Configure Amazon Linux 2023 to use public key authentication for SSHD by adding or modifying the following line in "/etc/ssh/sshd_config" or in a file in "/etc/ssh/sshd_config.d". PubkeyAuthentication yes Restart the SSH daemon for the settings to take effect: $ sudo systemctl restart sshd.service
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- AZLX-23-001235
- Vuln IDs
- V-274048
- Rule IDs
- SV-274048r1120132_rule
Fix: F-78044r1120131_fix
Configure Amazon Linux 2023 to prevent SSH users from logging on with blank passwords. Edit the following line in "etc/ssh/sshd_config" or in a file in "/etc/ssh/sshd_config.d": PermitEmptyPasswords no Restart the SSH daemon for the settings to take effect: $ sudo systemctl restart sshd.service
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- AZLX-23-001240
- Vuln IDs
- V-274049
- Rule IDs
- SV-274049r1120747_rule
Fix: F-78045r1120134_fix
Configure Amazon Linux 2023 to prevent SSH users from logging on directly as root add or modify the following line in "/etc/ssh/sshd_config" or in a file in "/etc/ssh/sshd_config.d". PermitRootLogin no Restart the SSH daemon for the settings to take effect: $ sudo systemctl restart sshd.service
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- AZLX-23-001245
- Vuln IDs
- V-274050
- Rule IDs
- SV-274050r1120138_rule
Fix: F-78046r1120137_fix
Configure Amazon Linux 2023 SSH server to terminate a user session automatically after the SSH client has been unresponsive for 10 minutes. Note: This setting must be applied in conjunction with "ClientAliveCountMax 1" to function correctly. Modify or append the following lines in the "/etc/ssh/sshd_config" or a dropfile in "/etc/ssh/sshd_config.d" file: ClientAliveInterval 600 For the changes to take effect, the SSH daemon must be restarted. $ sudo systemctl restart sshd.service
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- AZLX-23-001250
- Vuln IDs
- V-274051
- Rule IDs
- SV-274051r1120141_rule
Fix: F-78047r1120140_fix
Configure Amazon Linux 2023 SSHD to terminate a user session automatically after the SSH client has become unresponsive. Note: This setting must be applied in conjunction with AZLX-23-000820 to function correctly. Modify or append the following lines in the "/etc/ssh/sshd_config" file or a dropfile in "/etc/ssh/sshd_config.d": ClientAliveCountMax 1 For the changes to take effect, the SSH daemon must be restarted. $ sudo systemctl restart sshd.service
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- AZLX-23-001285
- Vuln IDs
- V-274058
- Rule IDs
- SV-274058r1186176_rule
Fix: F-78054r1120161_fix
Configure Amazon Linux 2023 to correctly implement the systemwide cryptographic policies by reinstalling the crypto-policies package contents. Reinstall crypto-policies with the following command: $ sudo dnf -y reinstall crypto-policies Set the crypto-policy to FIPS with the following command: $ sudo update-crypto-policies --set FIPS Setting system policy to FIPS Note: Systemwide crypto policies are applied on application startup. It is recommended to restart the system for the change of policies to fully take place.
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- AZLX-23-001290
- Vuln IDs
- V-274059
- Rule IDs
- SV-274059r1120165_rule
Fix: F-78055r1120164_fix
Configure Amazon Linux 2023 to have smart cards enabled in SSSD. Edit the file "/etc/sssd/sssd.conf" or a configuration file in "/etc/sssd/conf.d" and add or edit the following line: pam_cert_auth = True
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- AZLX-23-001300
- Vuln IDs
- V-274061
- Rule IDs
- SV-274061r1120171_rule
Fix: F-78057r1120170_fix
Configure Amazon Linux 2023 to implement certificate status checking for multifactor authentication. Review the "/etc/sssd/conf.d/certificate_verification.conf" file to determine if the system is configured to prevent OCSP or certificate verification. Add the following line to the "/etc/sssd/conf.d/certificate_verification.conf" file: certificate_verification = ocsp_dgst=sha512 Set the correct ownership and permissions on the "/etc/sssd/conf.d/certificate_verification.conf" file by running these commands: $ sudo chown root:root "/etc/sssd/conf.d/certificate_verification.conf" $ sudo chmod 600 "/etc/sssd/conf.d/certificate_verification.conf" The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command: $ sudo systemctl restart sssd.service
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- AZLX-23-001305
- Vuln IDs
- V-274062
- Rule IDs
- SV-274062r1120174_rule
Fix: F-78058r1120173_fix
Configure Amazon Linux 2023 SSSD service to prohibit the use of cached authentications after one day. Add or change the following line in "/etc/sssd/sssd.conf" just below the line [pam]: offline_credentials_expiration = 1
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-001384
- Version
- AZLX-23-002005
- Vuln IDs
- V-274066
- Rule IDs
- SV-274066r1120186_rule
Fix: F-78062r1120185_fix
Configure Amazon Linux 2023 to display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system via ssh. Edit the "etc/ssh/sshd_config" file or a file in "/etc/ssh/sshd_config.d" to uncomment the banner keyword and configure it to point to a file that will contain the logon banner (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor). An example configuration line is: Banner /etc/issue
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- AZLX-23-002015
- Vuln IDs
- V-274067
- Rule IDs
- SV-274067r1120653_rule
Fix: F-78063r1120652_fix
Configure Amazon Linux 2023 to provide adequate storage for at least one-week of audit logs when audit records are not immediately sent to a central audit record storage facility. If the storage partition is not large enough for at least one week of audit logs, then either: 1. Resize the partition to ensure there is enough storage capacity. 2. Create a new partition for the audit logs.
- RMF Control
- AU-4
- Severity
- L
- CCI
- CCI-001849
- Version
- AZLX-23-002020
- Vuln IDs
- V-274068
- Rule IDs
- SV-274068r1120192_rule
Fix: F-78064r1120191_fix
Configure Amazon Linux 2023 to have a separate file system/partition for the system audit data path. Migrate the system audit data path onto a separate partition.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- AZLX-23-002025
- Vuln IDs
- V-274069
- Rule IDs
- SV-274069r1120195_rule
Fix: F-78065r1120194_fix
Configure Amazon Linux 2023 to be configured so that the Audit Daemon labels all off-loaded audit logs. Edit the /etc/audit/auditd.conf file and add or update the "name_format" option: name_format = hostname The audit daemon must be restarted for changes to take effect.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- AZLX-23-002030
- Vuln IDs
- V-274070
- Rule IDs
- SV-274070r1120198_rule
Fix: F-78066r1120197_fix
Configure Amazon Linux 2023 so that the audit system takes an appropriate action when the internal event queue is full. Edit the /etc/audit/auditd.conf file and add or update the "overflow_action" option: overflow_action = syslog The audit daemon must be restarted for changes to take effect.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- AZLX-23-002035
- Vuln IDs
- V-274071
- Rule IDs
- SV-274071r1184023_rule
Fix: F-78067r1184022_fix
Configure Amazon Linux 2023 to take action when the audit log storage volume reaches 75 percent of the maximum storage capacity. Edit "/etc/audit/auditd.conf" and ensure the parameter "space_left = 25%" is configured.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- AZLX-23-002040
- Vuln IDs
- V-274072
- Rule IDs
- SV-274072r1120204_rule
Fix: F-78068r1120203_fix
Configure Amazon Linux 2023 to initiate an action to notify the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity by adding/modifying the following line in the /etc/audit/auditd.conf file. space_left_action = email
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- AZLX-23-002045
- Vuln IDs
- V-274073
- Rule IDs
- SV-274073r1120207_rule
Fix: F-78069r1120206_fix
Configure Amazon Linux 2023 to initiate an action when allocated audit record storage volume reaches 95 percent of the repository maximum audit record storage capacity by adding/modifying the following line in the /etc/audit/auditd.conf file. admin_space_left = 5%
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- AZLX-23-002050
- Vuln IDs
- V-274074
- Rule IDs
- SV-274074r1120210_rule
Fix: F-78070r1120209_fix
Configure Amazon Linux 2023 so that the auditd service takes action in the event of allocated audit record storage volume reaching 95 percent of the repository maximum audit record storage capacity. Edit the following line in "/etc/audit/auditd.conf" to ensure that the system is forced into single user mode in the event the audit record storage volume is about to reach maximum capacity: admin_space_left_action = single The audit daemon must be restarted for changes to take effect.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- AZLX-23-002065
- Vuln IDs
- V-274077
- Rule IDs
- SV-274077r1120219_rule
Fix: F-78073r1120218_fix
Configure Amazon Linux 2023 to authenticate the remote logging server for off-loading audit logs by setting the following option in "/etc/rsyslog.conf" or "/etc/rsyslog.d/[customfile].conf": $ActionSendStreamDriverAuthMode x509/name
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- AZLX-23-002070
- Vuln IDs
- V-274078
- Rule IDs
- SV-274078r1120222_rule
Fix: F-78074r1120221_fix
Configure Amazon Linux 2023 to encrypt off-loaded audit records via rsyslog by setting the following options in "/etc/rsyslog.conf" or "/etc/rsyslog.d/[customfile].conf": $ActionSendStreamDriverMode 1
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- AZLX-23-002075
- Vuln IDs
- V-274079
- Rule IDs
- SV-274079r1120724_rule
Fix: F-78075r1120224_fix
Configure Amazon Linux 2023 to use the ossl driver to encrypt offloaded audit records by setting the following options in "/etc/rsyslog.conf" or "/etc/rsyslog.d/[customfile].conf": $DefaultNetstreamDriver ossl
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- AZLX-23-002085
- Vuln IDs
- V-274081
- Rule IDs
- SV-274081r1120231_rule
Fix: F-78077r1120230_fix
Configure Amazon Linux 2023 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/sudoers -p wa -k identity To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- AZLX-23-002090
- Vuln IDs
- V-274082
- Rule IDs
- SV-274082r1120234_rule
Fix: F-78078r1120233_fix
Configure Amazon Linux 2023 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/sudoers.d/ -p wa -k identity To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- AZLX-23-002095
- Vuln IDs
- V-274083
- Rule IDs
- SV-274083r1120237_rule
Fix: F-78079r1120236_fix
Configure Amazon Linux 2023 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/group". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/group -p wa -k identity To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- AZLX-23-002100
- Vuln IDs
- V-274084
- Rule IDs
- SV-274084r1120240_rule
Fix: F-78080r1120239_fix
Configure Amazon Linux 2023 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/gshadow". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/gshadow -p wa -k identity To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- AZLX-23-002105
- Vuln IDs
- V-274085
- Rule IDs
- SV-274085r1120243_rule
Fix: F-78081r1120242_fix
Configure Amazon Linux 2023 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/security/opasswd". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/security/opasswd -p wa -k identity To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- AZLX-23-002110
- Vuln IDs
- V-274086
- Rule IDs
- SV-274086r1120246_rule
Fix: F-78082r1120245_fix
Configure Amazon Linux 2023 to audit the execution of the "execve" system call. Add or update the following file system rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k execpriv To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AZLX-23-002115
- Vuln IDs
- V-274087
- Rule IDs
- SV-274087r1120249_rule
Fix: F-78083r1120248_fix
Configure Amazon Linux 2023 to generate audit records upon successful/unsuccessful attempts to use the "chmod", "fchmod", and "fchmodat" syscalls. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b64 -S chmod,fchmod,fchmodat -F auid>=1000 -F auid!=unset -k perm_mod To load the rule to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AZLX-23-002120
- Vuln IDs
- V-274088
- Rule IDs
- SV-274088r1120252_rule
Fix: F-78084r1120251_fix
Configure Amazon Linux 2023 to generate audit records upon successful/unsuccessful attempts to use the "chown", "fchown", "fchownat", and "lchown" system calls. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b64 -S chown,fchown,fchownat,lchown -F auid>=1000 -F auid!=unset -k perm_mod To load the rule to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AZLX-23-002125
- Vuln IDs
- V-274089
- Rule IDs
- SV-274089r1120255_rule
Fix: F-78085r1120254_fix
Configure Amazon Linux 2023 to audit the execution of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b64 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid=0 -k perm_mod To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AZLX-23-002130
- Vuln IDs
- V-274090
- Rule IDs
- SV-274090r1120258_rule
Fix: F-78086r1120257_fix
Configure Amazon Linux 2023 to generate an audit event for any successful/unsuccessful use of the "truncate", "ftruncate", "creat", "open", "openat", and "open_by_handle_at" system calls by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b64 -S truncate,ftruncate,creat,open,openat,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S truncate,ftruncate,creat,open,openat,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AZLX-23-002135
- Vuln IDs
- V-274091
- Rule IDs
- SV-274091r1120261_rule
Fix: F-78087r1120260_fix
Configure Amazon Linux 2023 to generate an audit event for any successful/unsuccessful use of the "init_module" and "finit_module" system calls by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b64 -S init_module,finit_module -F auid>=1000 -F auid!=unset -k module_chng To load the rule to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AZLX-23-002140
- Vuln IDs
- V-274092
- Rule IDs
- SV-274092r1120264_rule
Fix: F-78088r1120263_fix
Configure Amazon Linux 2023 to generate audit records when successful/unsuccessful attempts to use the "create_module" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b64 -S create_module -F auid>=1000 -F auid!=unset -k module-change To load the rule to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AZLX-23-002145
- Vuln IDs
- V-274093
- Rule IDs
- SV-274093r1120267_rule
Fix: F-78089r1120266_fix
Configure Amazon Linux 2023 to generate audit records upon successful/unsuccessful attempts to use the "kmod" command by adding or updating the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/kmod -F perm=x -F auid>=1000 -F auid!=unset -k modules To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AZLX-23-002150
- Vuln IDs
- V-274094
- Rule IDs
- SV-274094r1120270_rule
Fix: F-78090r1120269_fix
Configure Amazon Linux 2023 to generate an audit event for any successful/unsuccessful use of the "rename", "unlink", "rmdir", "renameat", and "unlinkat" system calls by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b64 -S rename,unlink,rmdir,renameat,unlinkat -F auid>=1000 -F auid!=unset -k delete To load the rule to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AZLX-23-002155
- Vuln IDs
- V-274095
- Rule IDs
- SV-274095r1120273_rule
Fix: F-78091r1120272_fix
Configure Amazon Linux 2023 to generate audit records upon successful/unsuccessful attempts to use the "chcon" command by adding or updating the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/chcon -F perm=x -F auid>=1000 -F auid!=unset -k perm_mod To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002884
- Version
- AZLX-23-002160
- Vuln IDs
- V-274096
- Rule IDs
- SV-274096r1120276_rule
Fix: F-78092r1120275_fix
Configure Amazon Linux 2023 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/var/log/faillock". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /var/log/faillock -p wa -k logins To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AZLX-23-002165
- Vuln IDs
- V-274097
- Rule IDs
- SV-274097r1120279_rule
Fix: F-78093r1120278_fix
Configure Amazon Linux 2023 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/var/log/lastlog". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /var/log/lastlog -p wa -k logins To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- AZLX-23-002175
- Vuln IDs
- V-274098
- Rule IDs
- SV-274098r1120282_rule
Fix: F-78094r1120281_fix
Configure Amazon Linux 2023 so that the audit system generates an audit event for any successful/unsuccessful uses of the "init" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/init -F perm=x -F auid>=1000 -F auid!=unset -k privileged-init To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- AZLX-23-002180
- Vuln IDs
- V-274099
- Rule IDs
- SV-274099r1120285_rule
Fix: F-78095r1120284_fix
Configure Amazon Linux 2023 so that the audit system generates an audit event for any successful/unsuccessful uses of the "reboot" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/reboot -F perm=x -F auid>=1000 -F auid!=unset -k privileged-reboot To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- AZLX-23-002185
- Vuln IDs
- V-274100
- Rule IDs
- SV-274100r1120288_rule
Fix: F-78096r1120287_fix
Configure Amazon Linux 2023 so that the audit system generates an audit event for any successful/unsuccessful uses of the "shutdown" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/shutdown -F perm=x -F auid>=1000 -F auid!=unset -k privileged-shutdown To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- AZLX-23-002190
- Vuln IDs
- V-274101
- Rule IDs
- SV-274101r1120291_rule
Fix: F-78097r1120290_fix
Configure Amazon Linux 2023 audit tools to have a mode of "0755" by running the following command: $ sudo chmod 0755 [audit_tool] Replace "[audit_tool]" with each audit tool that has a more permissive mode than "0755".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- AZLX-23-002195
- Vuln IDs
- V-274102
- Rule IDs
- SV-274102r1120294_rule
Fix: F-78098r1120293_fix
Configure Amazon Linux 2023 audit tools to be owned by "root" by running the following command: $ sudo chown root [audit_tool] Replace "[audit_tool]" with each audit tool not owned by "root".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- AZLX-23-002200
- Vuln IDs
- V-274103
- Rule IDs
- SV-274103r1120297_rule
Fix: F-78099r1120296_fix
Configure Amazon Linux 2023 audit tools to be group-owned by "root" by running the following command: $ sudo chgrp root [audit_tool] Replace "[audit_tool]" with each audit tool not group-owned by "root".
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- AZLX-23-002205
- Vuln IDs
- V-274104
- Rule IDs
- SV-274104r1120300_rule
Fix: F-78100r1120299_fix
Configure Amazon Linux 2023 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/passwd". Enable the auditd daemon so that it can start at boot time: $ sudo systemctl enable auditd Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/passwd -p wa -k identity Then, restart the auditd service for the changes to take effect: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AZLX-23-002210
- Vuln IDs
- V-274105
- Rule IDs
- SV-274105r1120661_rule
Fix: F-78101r1120302_fix
Configure Amazon Linux 2023 so that the audit service generates an audit event for any successful/unsuccessful uses of the "chage" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chage -F perm=x -F auid>=1000 -F auid!=unset -k privileged-chage To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- AZLX-23-002220
- Vuln IDs
- V-274107
- Rule IDs
- SV-274107r1120309_rule
Fix: F-78103r1120308_fix
Configure Amazon Linux 2023 to off-load audit logs in the event the audit storage volume becomes full. Add or update the following line (depending on configuration "disk_full_action" can be set to "SYSLOG" or "SINGLE" depending on configuration) in "/etc/audit/auditd.conf" file: disk_full_action = SYSLOG
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- AZLX-23-002225
- Vuln IDs
- V-274108
- Rule IDs
- SV-274108r1120312_rule
Fix: F-78104r1120311_fix
Configure Amazon Linux 2023 so that audit logs are group-owned by "root" or a restricted logging group. Change the group of the directory of "/var/log/audit" to be owned by a correct group. Identify the group that is configured to own audit log: $ sudo grep -P '^[ ]*log_group[ ]+=.*$' /etc/audit/auditd.conf Change the ownership to that group: $ sudo chgrp ${GROUP} /var/log/audit
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- AZLX-23-002235
- Vuln IDs
- V-274110
- Rule IDs
- SV-274110r1120318_rule
Fix: F-78106r1120317_fix
Configure Amazon Linux 2023 so that the audit logs have a mode of "0600". Replace "[audit_log_file]" to the correct audit log path, by default this location is "/var/log/audit/audit.log". $ sudo chmod 0600 /var/log/audit/[audit_log_file] Check the group that owns the system audit logs: $ sudo grep -iw log_group /etc/audit/auditd.conf If the log_group is not defined or it is set to root, configure the permissions as follows: $ sudo chmod 0640 $log_file $ sudo chmod 0440 $log_file.* Otherwise, configure the permissions as follows: $ sudo chmod 0600 $log_file $ sudo chmod 0400 $log_file.*
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- AZLX-23-002240
- Vuln IDs
- V-274111
- Rule IDs
- SV-274111r1120321_rule
Fix: F-78107r1120320_fix
Configure Amazon Linux 2023 so that files in "/etc/audit/rules.d/" and the "/etc/audit/auditd.conf" file have a mode of "0640" or less permissive with the following commands: $ sudo chmod 0640 /etc/audit/rules.d/audit.rules $ sudo chmod 0640 /etc/audit/rules.d/[customrulesfile].rules $ sudo chmod 0640 /etc/audit/auditd.conf
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AZLX-23-002245
- Vuln IDs
- V-274112
- Rule IDs
- SV-274112r1120324_rule
Fix: F-78108r1120323_fix
Configure Amazon Linux 2023 so that the audit system generates an audit event for any successful/unsuccessful use of the "sudo" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/sudo -F perm=x -F auid>=1000 -F auid!=unset -k priv_cmd To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- AZLX-23-002250
- Vuln IDs
- V-274113
- Rule IDs
- SV-274113r1120327_rule
Fix: F-78109r1120326_fix
Configure Amazon Linux 2023 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/passwd". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/passwd -p wa -k identity To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- AZLX-23-002255
- Vuln IDs
- V-274114
- Rule IDs
- SV-274114r1120330_rule
Fix: F-78110r1120329_fix
Configure Amazon Linux 2023 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/shadow". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/shadow -p wa -k identity To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- AZLX-23-002260
- Vuln IDs
- V-274115
- Rule IDs
- SV-274115r1120333_rule
Fix: F-78111r1120332_fix
Configure Amazon Linux 2023 so that the audit system resolves audit information before writing to disk. Edit the /etc/audit/auditd.conf file and add or update the "log_format" option: log_format = ENRICHED The audit daemon must be restarted for changes to take effect.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- AZLX-23-002265
- Vuln IDs
- V-274116
- Rule IDs
- SV-274116r1120336_rule
Fix: F-78112r1120335_fix
Configure Amazon Linux 2023 to change the group of the directory of "/var/log/audit" to be owned by a correct group. Identify the group that is configured to own audit log: $ sudo grep -P '^[ ]*log_group[ ]+=.*$' /etc/audit/auditd.conf Change the ownership to that group: $ sudo chgrp ${GROUP} /var/log/audit
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- AZLX-23-002270
- Vuln IDs
- V-274117
- Rule IDs
- SV-274117r1120339_rule
Fix: F-78113r1120338_fix
Configure Amazon Linux 2023 audit logs to be protected from unauthorized read access by setting the correct owner as "root" with the following command: $ sudo chown root /var/log/audit
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- AZLX-23-002280
- Vuln IDs
- V-274119
- Rule IDs
- SV-274119r1120345_rule
Fix: F-78115r1120344_fix
Configure Amazon Linux 2023 systemwide shared library directories (/lib, /lib64, /usr/lib and /usr/lib64) to be protected from unauthorized access. Run the following command, replacing "[DIRECTORY]" with any library directory not group-owned by "root". $ sudo chgrp root [DIRECTORY]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- AZLX-23-002285
- Vuln IDs
- V-274120
- Rule IDs
- SV-274120r1120348_rule
Fix: F-78116r1120347_fix
Configure Amazon Linux 2023 systemwide shared library directories (/lib, /lib64, /usr/lib and /usr/lib64) to be protected from unauthorized access. Run the following command, replacing "[DIRECTORY]" with any library directory with a mode more permissive than "755". $ sudo chmod 755 [DIRECTORY]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- AZLX-23-002290
- Vuln IDs
- V-274121
- Rule IDs
- SV-274121r1155161_rule
Fix: F-78117r1155160_fix
Configure Amazon Linux 2023 systemwide shared library files contained in the directories "/lib", "/lib64", "/usr/lib", and "/usr/lib64" have mode 0755 or less permissive with the following command. $ sudo find /lib /lib64 /usr/lib /usr/lib64 -type f -name '*.so*' -perm /022 -exec chmod go-w {} +
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- AZLX-23-002295
- Vuln IDs
- V-274122
- Rule IDs
- SV-274122r1155164_rule
Fix: F-78118r1155163_fix
Configure Amazon Linux 2023 systemwide shared library files contained in the directories "/lib", "/lib64", "/usr/lib", and "/usr/lib64" to be owned by root with the following command: $ sudo find /lib /lib64 /usr/lib /usr/lib64 -type f -name '*.so*' ! -user root -exec chown root {} +
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- AZLX-23-002300
- Vuln IDs
- V-274123
- Rule IDs
- SV-274123r1155167_rule
Fix: F-78119r1155166_fix
Configure Amazon Linux 2023 systemwide shared library files contained in the directories "/lib", "/lib64", "/usr/lib", and "/usr/lib64" to be group owned by root with the following command: $ sudo find /lib /lib64 /usr/lib /usr/lib64 -type f -name '*.so*' ! -group root -exec chown :root {} +
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- AZLX-23-002305
- Vuln IDs
- V-274124
- Rule IDs
- SV-274124r1120360_rule
Fix: F-78120r1120359_fix
Configure Amazon Linux 2023 systemwide shared library directories within (/lib, /lib64, /usr/lib and /usr/lib64) to be protected from unauthorized access. Run the following command, replacing "[DIRECTORY]" with any library directory not owned by "root". $ sudo chown root [DIRECTORY]
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- AZLX-23-002315
- Vuln IDs
- V-274125
- Rule IDs
- SV-274125r1120363_rule
Fix: F-78121r1120362_fix
Configure Amazon Linux 2023 so that the "/var/log" directory has a mode of "0755" by running the following command: $ sudo chmod 0755 /var/log
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- AZLX-23-002320
- Vuln IDs
- V-274126
- Rule IDs
- SV-274126r1120366_rule
Fix: F-78122r1120365_fix
Configure Amazon Linux 2023 so that the directory "/var/log" is owned by "root" with the following command: $ sudo chown root /var/log
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- AZLX-23-002325
- Vuln IDs
- V-274127
- Rule IDs
- SV-274127r1120369_rule
Fix: F-78123r1120368_fix
Configure Amazon Linux 2023 so that the "/var/log" is group-owned "root" with the following command: $ sudo chgrp root /var/log
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- AZLX-23-002330
- Vuln IDs
- V-274128
- Rule IDs
- SV-274128r1120372_rule
Fix: F-78124r1120371_fix
Configure Amazon Linux 2023 so that the "/var/log/messages" file has a mode of "0640" with the following command: $ sudo chmod 0640 /var/log/messages
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- AZLX-23-002335
- Vuln IDs
- V-274129
- Rule IDs
- SV-274129r1120375_rule
Fix: F-78125r1120374_fix
Configure Amazon Linux 2023 so that the "/var/log/messages" file is group-owned "root" with the following command: $ sudo chgrp root /var/log/messages
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- AZLX-23-002340
- Vuln IDs
- V-274130
- Rule IDs
- SV-274130r1120378_rule
Fix: F-78126r1120377_fix
Configure Amazon Linux 2023 so that the "/var/log/messages" file is owned by "root" with the following command: $ sudo chown root /var/log/messages
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- AZLX-23-002345
- Vuln IDs
- V-274131
- Rule IDs
- SV-274131r1120381_rule
Fix: F-78127r1120380_fix
Configure Amazon Linux 2023 so that system commands are protected from unauthorized access. Run the following command, replacing "[FILE]" with any system command file not owned by "root". $ sudo chown root [FILE]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- AZLX-23-002350
- Vuln IDs
- V-274132
- Rule IDs
- SV-274132r1120384_rule
Fix: F-78128r1120383_fix
Configure Amazon Linux 2023 so that system commands are protected from unauthorized access. Run the following command, replacing "[FILE]" with any system command file not group-owned by "root" or a required system account. $ sudo chgrp root [FILE]
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- AZLX-23-002355
- Vuln IDs
- V-274133
- Rule IDs
- SV-274133r1120387_rule
Fix: F-78129r1120386_fix
Configure Amazon Linux 2023 to enforce password complexity by requiring that at least one uppercase character be used by setting the "ucredit" option. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory to contain the "ucredit" parameter: ucredit = -1 Remove any configurations that conflict with the above value.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- AZLX-23-002360
- Vuln IDs
- V-274134
- Rule IDs
- SV-274134r1120390_rule
Fix: F-78130r1120389_fix
Configure Amazon Linux 2023 to enforce password complexity by requiring that at least one lowercase character be used by setting the "lcredit" option. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory to contain the "lcredit" parameter: lcredit = -1 Remove any configurations that conflict with the above value.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- AZLX-23-002365
- Vuln IDs
- V-274135
- Rule IDs
- SV-274135r1120393_rule
Fix: F-78131r1120392_fix
Configure Amazon Linux 2023 to enforce password complexity by requiring that at least one numeric character be used by setting the "dcredit" option. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory to contain the "dcredit" parameter: dcredit = -1 Remove any configurations that conflict with the above value.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- AZLX-23-002370
- Vuln IDs
- V-274136
- Rule IDs
- SV-274136r1120697_rule
Fix: F-78132r1120696_fix
Configure Amazon Linux 2023 to require the change of at least eight (with a 15 character password) of the total number of characters when passwords are changed by setting the "difok" option. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory to contain the "difok" parameter: difok = 8 Remove any configurations that conflict with the above value. This value can be customized based on desired password length.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- AZLX-23-002375
- Vuln IDs
- V-274137
- Rule IDs
- SV-274137r1120725_rule
Fix: F-78133r1120398_fix
Configure Amazon Linux 2023 to enforce a minimum 15-character password length. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory to contain the "minlen" parameter: minlen = 15 Remove any configurations that conflict with the above value.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- AZLX-23-002380
- Vuln IDs
- V-274138
- Rule IDs
- SV-274138r1120402_rule
Fix: F-78134r1120401_fix
Configure Amazon Linux 2023 to enforce password complexity by requiring at least one special character be used by setting the "ocredit" option. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory to contain the "ocredit" parameter: ocredit = -1
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- AZLX-23-002385
- Vuln IDs
- V-274139
- Rule IDs
- SV-274139r1120405_rule
Fix: F-78135r1120404_fix
Configure Amazon Linux 2023 to enforce password complexity on the root account. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory to contain the "enforce_for_root" parameter: enforce_for_root
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AZLX-23-002390
- Vuln IDs
- V-274140
- Rule IDs
- SV-274140r1120408_rule
Fix: F-78136r1120407_fix
Configure Amazon Linux 2023 to prevent the use of dictionary words for passwords. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the /etc/pwquality.conf.d/ directory to contain the "dictcheck" parameter: dictcheck=1
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- AZLX-23-002395
- Vuln IDs
- V-274141
- Rule IDs
- SV-274141r1120411_rule
Fix: F-78137r1120410_fix
Configure Amazon Linux 2023 to limit the number of concurrent sessions to "10" for all accounts and/or account types. Add the following line to the top of the /etc/security/limits.conf or in a ".conf" file defined in /etc/security/limits.d/: * hard maxlogins 10
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- AZLX-23-002396
- Vuln IDs
- V-274142
- Rule IDs
- SV-274142r1120414_rule
Fix: F-78138r1120413_fix
Configure Amazon Linux 2023 to exit interactive command shell user sessions after 10 minutes of inactivity. Add or edit the following line in "/etc/profile.d/tmout.sh": #!/bin/bash declare -xr TMOUT=600
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- AZLX-23-002400
- Vuln IDs
- V-274143
- Rule IDs
- SV-274143r1120417_rule
Fix: F-78139r1120416_fix
Configure Amazon Linux 2023 to enforce 24 hours as the minimum password lifetime for new user accounts. Add the following line in "/etc/login.defs" (or modify the line to have the required value): PASS_MIN_DAYS 1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AZLX-23-002405
- Vuln IDs
- V-274144
- Rule IDs
- SV-274144r1120420_rule
Fix: F-78140r1120419_fix
Configure Amazon Linux 2023 to enforce a delay of at least four seconds between logon prompts following a failed console logon attempt. Modify the "/etc/login.defs" file to set the "FAIL_DELAY" parameter to "4" or greater: FAIL_DELAY 4
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AZLX-23-002410
- Vuln IDs
- V-274145
- Rule IDs
- SV-274145r1120423_rule
Fix: F-78141r1120422_fix
Configure Amazon Linux 2023 to define default permissions for all authenticated users in such a way that the user can only read and modify their own files. Add or edit the lines for the "UMASK" parameter in the "/etc/login.defs" file to "077": UMASK 077
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- AZLX-23-002425
- Vuln IDs
- V-274148
- Rule IDs
- SV-274148r1120432_rule
Fix: F-78144r1120431_fix
Configure Amazon Linux 2023 to set noncompliant accounts to enforce a 60-day maximum password lifetime restriction. $ sudo chage -M 60 [user]
- RMF Control
- Severity
- M
- CCI
- CCI-003627
- Version
- AZLX-23-002430
- Vuln IDs
- V-274149
- Rule IDs
- SV-274149r1120435_rule
Fix: F-78145r1120434_fix
Configure Amazon Linux 2023 to disable account identifiers after 35 days of inactivity after the password expiration. Run the following command to change the configuration for useradd: $ sudo useradd -D -f 35 The recommendation is 35 days, but a lower value is acceptable.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- AZLX-23-002440
- Vuln IDs
- V-274151
- Rule IDs
- SV-274151r1120441_rule
Fix: F-78147r1120440_fix
Configure Amazon Linux 2023 to require users to be in the "wheel" group to run "su" command. In file "/etc/pam.d/su", uncomment the following line: "#auth required pam_wheel.so use_uid" $ sudo sed '/^[[:space:]]*#[[:space:]]*auth[[:space:]]\+required[[:space:]]\+pam_wheel\.so[[:space:]]\+use_uid$/s/^[[:space:]]*#//' -i /etc/pam.d/su If necessary, create a "wheel" group and add administrative users to the group.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002696
- Version
- AZLX-23-002445
- Vuln IDs
- V-274152
- Rule IDs
- SV-274152r1120738_rule
Fix: F-78148r1120737_fix
Configure Amazon Linux 2023 to use the targeted SELINUX policy. Edit the file "/etc/selinux/config" and add or modify the following line: SELINUXTYPE=targeted A reboot is required for the changes to take effect.
- RMF Control
- SC-3
- Severity
- H
- CCI
- CCI-001084
- Version
- AZLX-23-002450
- Vuln IDs
- V-274153
- Rule IDs
- SV-274153r1120713_rule
Fix: F-78149r1120446_fix
Configure Amazon Linux 2023 to verify correct operation of security functions. Edit the file "/etc/selinux/config" and add or modify the following line: SELINUX=enforcing A reboot is required for the changes to take effect.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- AZLX-23-002455
- Vuln IDs
- V-274154
- Rule IDs
- SV-274154r1120450_rule
Fix: F-78150r1120449_fix
Configure Amazon Linux 2023 to lock an account when three unsuccessful logon attempts occur. Add/modify the "/etc/security/faillock.conf" file to match the following line: deny = 3
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- AZLX-23-002460
- Vuln IDs
- V-274155
- Rule IDs
- SV-274155r1120453_rule
Fix: F-78151r1120452_fix
Configure Amazon Linux 2023 to lock out the "root" account after a number of incorrect login attempts using "pam_faillock.so", first enable the feature using the following command: $ sudo authselect enable-feature with-faillock Then edit the "/etc/security/faillock.conf" file as follows: add or uncomment the following line: even_deny_root
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- AZLX-23-002465
- Vuln IDs
- V-274156
- Rule IDs
- SV-274156r1184029_rule
Fix: F-78152r1120455_fix
Configure Amazon Linux 2023 to automatically lock an account after three unsuccessful logon attempts in 15-minutes. First, ensure that the system is configured with authselect, i.e., using sssd profiles: $ sudo authselect select sssd [--force] Then, enable the faillock feature: $ sudo authselect enable-feature with-faillock Then edit the "/etc/security/faillock.conf" file as follows: fail_interval = 900
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- AZLX-23-002470
- Vuln IDs
- V-274157
- Rule IDs
- SV-274157r1120459_rule
Fix: F-78153r1120458_fix
Configure Amazon Linux 2023 to lock an account until released by an administrator after three unsuccessful logon attempts with the command: $ authselect enable-feature with-faillock Then edit the "/etc/security/faillock.conf" file as follows: unlock_time = 0
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- AZLX-23-002480
- Vuln IDs
- V-274159
- Rule IDs
- SV-274159r1120465_rule
Fix: F-78155r1120464_fix
Configure Amazon Linux 2023 so that all GIDs are referenced in "/etc/passwd" are defined in "/etc/group". Edit the file "/etc/passwd" and ensure that every user's GID is a valid GID.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- AZLX-23-002485
- Vuln IDs
- V-274160
- Rule IDs
- SV-274160r1120663_rule
Fix: F-78156r1120467_fix
Configure Amazon Linux 2023 to contain no duplicate UIDs for interactive users. Edit the file "/etc/passwd" and provide each interactive user account that has a duplicate UID with a unique UID.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- AZLX-23-002489
- Vuln IDs
- V-274161
- Rule IDs
- SV-274161r1120471_rule
Fix: F-78157r1120470_fix
Configure Amazon Linux 2023 to use "pwquality" to enforce password complexity rules. Add the following line to the "/etc/pam.d/password-auth" file (or modify the line to have the required value): password required pam_pwquality.so
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- AZLX-23-002490
- Vuln IDs
- V-274162
- Rule IDs
- SV-274162r1120474_rule
Fix: F-78158r1120473_fix
Configure Amazon Linux 2023 to use 100000 hashing rounds for hashing passwords. Add or modify the following line in "/etc/pam.d/password-auth" and set "rounds" to "100000". password sufficient pam_unix.so sha512 rounds=100000
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- AZLX-23-002495
- Vuln IDs
- V-274163
- Rule IDs
- SV-274163r1120477_rule
Fix: F-78159r1120476_fix
Configure Amazon Linux 2023 to use 100000 hashing rounds for hashing passwords. Add or modify the following line in "/etc/pam.d/system-auth" and set "rounds" to "100000". password sufficient pam_unix.so sha512 rounds=100000
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- AZLX-23-002510
- Vuln IDs
- V-274166
- Rule IDs
- SV-274166r1155170_rule
Fix: F-78162r1155169_fix
Configure Amazon Linux 2023 to log out idle sessions by editing the /etc/systemd/logind.conf file with the following line: StopIdleSessionSec=600 The "logind" service must be restarted for the changes to take effect. To restart the "logind" service, run the following command: $ sudo systemctl restart systemd-logind
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- AZLX-23-002520
- Vuln IDs
- V-274168
- Rule IDs
- SV-274168r1120492_rule
Fix: F-78164r1120491_fix
Configure Amazon Linux 2023 to allocate sufficient audit_backlog_limit to capture processes that start prior to the audit daemon with the following command: $ sudo grubby --update-kernel=ALL --args=audit_backlog_limit=8192
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- AZLX-23-002535
- Vuln IDs
- V-274169
- Rule IDs
- SV-274169r1120495_rule
Fix: F-78165r1120494_fix
Configure Amazon Linux 2023 to enable DAC on hardlinks with the following: Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: fs.protected_hardlinks = 1 Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- AZLX-23-002540
- Vuln IDs
- V-274170
- Rule IDs
- SV-274170r1120498_rule
Fix: F-78166r1120497_fix
Configure Amazon Linux 2023 to enable DAC on symlinks with the following: Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: fs.protected_symlinks = 1 Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- AZLX-23-002555
- Vuln IDs
- V-274173
- Rule IDs
- SV-274173r1120507_rule
Fix: F-78169r1120506_fix
Configure Amazon Linux 2023 to mask the debug-shell systemd service with the following command: $ sudo systemctl disable --now debug-shell.service $ sudo systemctl mask --now debug-shell.service
- RMF Control
- Severity
- M
- CCI
- CCI-003992
- Version
- AZLX-23-002575
- Vuln IDs
- V-274177
- Rule IDs
- SV-274177r1120519_rule
Fix: F-78173r1120518_fix
Configure Amazon Linux 2023 to disable kernel image loading. Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: kernel.kexec_load_disabled = 1 Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- AZLX-23-002585
- Vuln IDs
- V-274179
- Rule IDs
- SV-274179r1120525_rule
Fix: F-78175r1120524_fix
Configure Amazon Linux 2023 so that "/dev/shm" is mounted with the "nodev" option. Modify "/etc/fstab" to use the "nodev" option on the "/dev/shm" file system.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- AZLX-23-002590
- Vuln IDs
- V-274180
- Rule IDs
- SV-274180r1198347_rule
Fix: F-78176r1120527_fix
Configure Amazon Linux 2023 so that "/dev/shm" is mounted with the "nosuid" option. Modify "/etc/fstab" to use the "nosuid" option on the "/dev/shm" file system.
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- AZLX-23-002595
- Vuln IDs
- V-274181
- Rule IDs
- SV-274181r1120531_rule
Fix: F-78177r1120530_fix
Configure Amazon Linux 2023 so that the "pcscd" service is active with the following command: $ sudo systemctl enable --now pcscd
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- AZLX-23-002615
- Vuln IDs
- V-274185
- Rule IDs
- SV-274185r1120543_rule
Fix: F-78181r1120542_fix
Configure Amazon Linux 2023 to remove all software components after updated versions have been installed. Set the "clean_requirements_on_remove" option to "1" in the "/etc/dnf/dnf.conf" file: clean_requirements_on_remove=1
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- AZLX-23-005000
- Vuln IDs
- V-274187
- Rule IDs
- SV-274187r1120715_rule
Fix: F-78183r1120548_fix
Configure Amazon Linux 2023 auditing to prevent modification of login UIDs once they are set by adding the following line to /etc/audit/rules.d/audit.rules: --loginuid-immutable To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- AZLX-23-001286
- Vuln IDs
- V-283440
- Rule IDs
- SV-283440r1192648_rule
Fix: F-87910r1188392_fix
Configure Amazon Linux 2023 so that BIND uses the system crypto policy. Add the following line to the "options" section in "/etc/named.conf": include "/etc/crypto-policies/back-ends/bind.config";