Oracle Linux 7 Security Technical Implementation Guide
Open a previous version of this SCAP benchmark.
- RMF Control
- CM-5
- Severity
- H
- CCI
- CCI-001749
- Version
- OL07-00-010020
- Vuln IDs
- V-221653
- Rule IDs
- SV-221653r505922_rule
Fix: F-23357r499439_fix
Run the following command to determine which package owns the file: # rpm -qf <filename> The package can be reinstalled from a yum repository using the command: # sudo yum reinstall <packagename> Alternatively, the package can be reinstalled from trusted media using the command: # sudo rpm -Uvh <packagename>
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- OL07-00-010030
- Vuln IDs
- V-221654
- Rule IDs
- SV-221654r505922_rule
Fix: F-23358r419035_fix
Configure the operating system to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. Note: If the system does not have GNOME installed, this requirement is Not Applicable. Create a database to contain the system-wide graphical user logon settings (if it does not already exist) with the following command: # touch /etc/dconf/db/local.d/01-banner-message Add the following line to the [org/gnome/login-screen] section of the "/etc/dconf/db/local.d/01-banner-message": [org/gnome/login-screen] banner-message-enable=true Update the system databases: # dconf update Users must log out, and then log in again before the system-wide settings take effect.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000058
- Version
- OL07-00-010060
- Vuln IDs
- V-221657
- Rule IDs
- SV-221657r505922_rule
Fix: F-23361r419044_fix
Configure the operating system to enable a user's session lock until that user re-establishes access using established identification and authentication procedures. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following example: # touch /etc/dconf/db/local.d/00-screensaver Edit the "[org/gnome/desktop/screensaver]" section of the database file and add or update the following lines: # Set this to true to lock the screen when the screensaver activates lock-enabled=true Update the system databases: # dconf update Users must log out and then log in again before the system-wide settings take effect.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- OL07-00-010061
- Vuln IDs
- V-221658
- Rule IDs
- SV-221658r505922_rule
Fix: F-23362r419047_fix
Configure the operating system to uniquely identify and authenticate users using multifactor authentication via a graphical user logon. Note: If the system does not have GNOME installed, this requirement is Not Applicable. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: Note: The example is using the local system database, so if the system is using another database in "/etc/dconf/profile/user", create the file under the appropriate subdirectory. # touch /etc/dconf/db/local.d/00-defaults Edit "[org/gnome/login-screen]" and add or update the following line: enable-smartcard-authentication=true Update the system databases: # dconf update
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- OL07-00-010070
- Vuln IDs
- V-221660
- Rule IDs
- SV-221660r505922_rule
Fix: F-23364r419053_fix
Configure the operating system to initiate a screensaver after a 15-minute period of inactivity for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: # touch /etc/dconf/db/local.d/00-screensaver Edit /etc/dconf/db/local.d/00-screensaver and add or update the following lines: [org/gnome/desktop/session] # Set the lock time out to 900 seconds before the session is considered idle idle-delay=uint32 900 You must include the "uint32" along with the integer key values as shown. Update the system databases: # dconf update Users must log out and then log in again before the system-wide settings take effect.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- OL07-00-010081
- Vuln IDs
- V-221661
- Rule IDs
- SV-221661r505922_rule
Fix: F-23365r419056_fix
Configure the operating system to prevent a user from overriding a screensaver lock after a 15-minute period of inactivity for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: Note: The example below is using the database "local" for the system, so if the system is using another database in "/etc/dconf/profile/user", the file should be created under the appropriate subdirectory. # touch /etc/dconf/db/local.d/locks/session Add the setting to lock the screensaver lock delay: /org/gnome/desktop/screensaver/lock-delay
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- OL07-00-010100
- Vuln IDs
- V-221664
- Rule IDs
- SV-221664r505922_rule
Fix: F-23368r499445_fix
Configure the operating system to initiate a session lock after a 15-minute period of inactivity for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: # touch /etc/dconf/db/local.d/00-screensaver Add the setting to enable screensaver locking after 15 minutes of inactivity: [org/gnome/desktop/screensaver] idle-activation-enabled=true Update the system databases: # dconf update Users must log out and back in again before the system-wide settings take effect.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- OL07-00-010101
- Vuln IDs
- V-221665
- Rule IDs
- SV-221665r505922_rule
Fix: F-23369r419068_fix
Configure the operating system to prevent a user from overriding a screensaver lock after a 15-minute period of inactivity for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: Note: The example below is using the database "local" for the system, so if the system is using another database in "/etc/dconf/profile/user", the file should be created under the appropriate subdirectory. # touch /etc/dconf/db/local.d/locks/session Add the setting to lock the screensaver idle-activation-enabled setting: /org/gnome/desktop/screensaver/idle-activation-enabled
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- OL07-00-010110
- Vuln IDs
- V-221666
- Rule IDs
- SV-221666r505922_rule
Fix: F-23370r419071_fix
Configure the operating system to initiate a session lock for graphical user interfaces when a screensaver is activated. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: # touch /etc/dconf/db/local.d/00-screensaver Add the setting to enable session locking when a screensaver is activated: [org/gnome/desktop/screensaver] lock-delay=uint32 5 The "uint32" must be included along with the integer key values as shown. Update the system databases: # dconf update Users must log out and then log in again before the system-wide settings take effect.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- OL07-00-010118
- Vuln IDs
- V-221667
- Rule IDs
- SV-221667r505922_rule
Fix: F-23371r419074_fix
Configure PAM to utilize /etc/pam.d/system-auth when changing passwords. Add the following line to "/etc/pam.d/passwd" (or modify the line to have the required value): password substack system-auth
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- OL07-00-010119
- Vuln IDs
- V-221668
- Rule IDs
- SV-221668r505922_rule
Fix: F-23372r419077_fix
Configure the operating system to use "pwquality" to enforce password complexity rules. Add the following line to "/etc/pam.d/system-auth" (or modify the line to have the required value): password required pam_pwquality.so retry=3 Note: The value of "retry" should be between "1" and "3".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- OL07-00-010120
- Vuln IDs
- V-221669
- Rule IDs
- SV-221669r505922_rule
Fix: F-23373r419080_fix
Configure the operating system to enforce password complexity by requiring that at least one upper-case character be used by setting the "ucredit" option. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): ucredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- OL07-00-010130
- Vuln IDs
- V-221670
- Rule IDs
- SV-221670r505922_rule
Fix: F-23374r419083_fix
Configure the system to require at least one lower-case character when creating or changing a password. Add or modify the following line in "/etc/security/pwquality.conf": lcredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- OL07-00-010140
- Vuln IDs
- V-221671
- Rule IDs
- SV-221671r505922_rule
Fix: F-23375r419086_fix
Configure the operating system to enforce password complexity by requiring that at least one numeric character be used by setting the "dcredit" option. Add the following line to /etc/security/pwquality.conf (or modify the line to have the required value): dcredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- OL07-00-010150
- Vuln IDs
- V-221672
- Rule IDs
- SV-221672r505922_rule
Fix: F-23376r419089_fix
Configure the operating system to enforce password complexity by requiring that at least one special character be used by setting the "ocredit" option. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): ocredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- OL07-00-010160
- Vuln IDs
- V-221673
- Rule IDs
- SV-221673r505922_rule
Fix: F-23377r419092_fix
Configure the operating system to require the change of at least eight of the total number of characters when passwords are changed by setting the "difok" option. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): difok = 8
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- OL07-00-010170
- Vuln IDs
- V-221674
- Rule IDs
- SV-221674r505922_rule
Fix: F-23378r419095_fix
Configure the operating system to require the change of at least four character classes when passwords are changed by setting the "minclass" option. Add the following line to "/etc/security/pwquality.conf conf" (or modify the line to have the required value): minclass = 4
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- OL07-00-010180
- Vuln IDs
- V-221675
- Rule IDs
- SV-221675r505922_rule
Fix: F-23379r419098_fix
Configure the operating system to require the change of the number of repeating consecutive characters when passwords are changed by setting the "maxrepeat" option. Add the following line to "/etc/security/pwquality.conf conf" (or modify the line to have the required value): maxrepeat = 3
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- OL07-00-010190
- Vuln IDs
- V-221676
- Rule IDs
- SV-221676r505922_rule
Fix: F-23380r419101_fix
Configure the operating system to require the change of the number of repeating characters of the same character class when passwords are changed by setting the "maxclassrepeat" option. Add the following line to "/etc/security/pwquality.conf" conf (or modify the line to have the required value): maxclassrepeat = 4
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- OL07-00-010200
- Vuln IDs
- V-221677
- Rule IDs
- SV-221677r505922_rule
Fix: F-23381r419104_fix
Configure the operating system to store only SHA512 encrypted representations of passwords. Add the following line in "/etc/pam.d/system-auth": pam_unix.so sha512 shadow try_first_pass use_authtok Add the following line in "/etc/pam.d/password-auth": pam_unix.so sha512 shadow try_first_pass use_authtok Note: Manual changes to the listed files may be overwritten by the "authconfig" program. The "authconfig" program should not be used to update the configurations listed in this requirement.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- OL07-00-010210
- Vuln IDs
- V-221678
- Rule IDs
- SV-221678r505922_rule
Fix: F-23382r419107_fix
Configure the operating system to store only SHA512 encrypted representations of passwords. Add or update the following line in "/etc/login.defs": ENCRYPT_METHOD SHA512
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- OL07-00-010220
- Vuln IDs
- V-221680
- Rule IDs
- SV-221680r505922_rule
Fix: F-23384r419113_fix
Configure the operating system to store only SHA512 encrypted representations of passwords. Add or update the following line in "/etc/libuser.conf" in the [defaults] section: crypt_style = sha512
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- OL07-00-010230
- Vuln IDs
- V-221681
- Rule IDs
- SV-221681r505922_rule
Fix: F-23385r419116_fix
Configure the operating system to enforce 24 hours/1 day as the minimum password lifetime. Add the following line in "/etc/login.defs" (or modify the line to have the required value): PASS_MIN_DAYS 1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- OL07-00-010240
- Vuln IDs
- V-221682
- Rule IDs
- SV-221682r505922_rule
Fix: F-23386r419119_fix
Configure non-compliant accounts to enforce a 24 hours/1 day minimum password lifetime: # chage -m 1 [user]
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- OL07-00-010250
- Vuln IDs
- V-221683
- Rule IDs
- SV-221683r505922_rule
Fix: F-23387r419122_fix
Configure the operating system to enforce a 60-day maximum password lifetime restriction. Add the following line in "/etc/login.defs" (or modify the line to have the required value): PASS_MAX_DAYS 60
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- OL07-00-010260
- Vuln IDs
- V-221684
- Rule IDs
- SV-221684r505922_rule
Fix: F-23388r419125_fix
Configure non-compliant accounts to enforce a 60-day maximum password lifetime restriction. # chage -M 60 [user]
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- OL07-00-010270
- Vuln IDs
- V-221685
- Rule IDs
- SV-221685r505922_rule
Fix: F-23389r419128_fix
Configure the operating system to prohibit password reuse for a minimum of five generations. Add the following line in "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" (or modify the line to have the required value): password requisite pam_pwhistory.so use_authtok remember=5 retry=3 Note: Manual changes to the listed files may be overwritten by the "authconfig" program. The "authconfig" program should not be used to update the configurations listed in this requirement.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- OL07-00-010280
- Vuln IDs
- V-221686
- Rule IDs
- SV-221686r505922_rule
Fix: F-23390r419131_fix
Configure operating system to enforce a minimum 15-character password length. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): minlen = 15
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-010290
- Vuln IDs
- V-221687
- Rule IDs
- SV-221687r505922_rule
Fix: F-23391r419134_fix
If an account is configured for password authentication but does not have an assigned password, it may be possible to log on to the account without authenticating. Remove any instances of the "nullok" option in "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" to prevent logons with empty passwords. Note: Manual changes to the listed files may be overwritten by the "authconfig" program. The "authconfig" program should not be used to update the configurations listed in this requirement.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000766
- Version
- OL07-00-010300
- Vuln IDs
- V-221688
- Rule IDs
- SV-221688r505922_rule
Fix: F-23392r419137_fix
To explicitly disallow remote logon from accounts with empty passwords, add or correct the following line in "/etc/ssh/sshd_config": PermitEmptyPasswords no The SSH service must be restarted for changes to take effect. Any accounts with empty passwords should be disabled immediately, and PAM configuration should prevent users from being able to assign themselves empty passwords.
- RMF Control
- IA-4
- Severity
- M
- CCI
- CCI-000795
- Version
- OL07-00-010310
- Vuln IDs
- V-221689
- Rule IDs
- SV-221689r505922_rule
Fix: F-23393r419140_fix
Configure the operating system to disable account identifiers (individuals, groups, roles, and devices) after the password expires. Add the following line to "/etc/default/useradd" (or modify the line to have the required value): INACTIVE=0
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- OL07-00-010340
- Vuln IDs
- V-221692
- Rule IDs
- SV-221692r505922_rule
Fix: F-23396r499451_fix
Configure the operating system to require users to supply a password for privilege escalation. Check the configuration of the "/etc/sudoers" file with the following command: # visudo Remove any occurrences of "NOPASSWD" tags in the file. Check the configuration of the /etc/sudoers.d/* files with the following command: # grep -i nopasswd /etc/sudoers.d/* Remove any occurrences of "NOPASSWD" tags in the file.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-010430
- Vuln IDs
- V-221693
- Rule IDs
- SV-221693r505922_rule
Fix: F-23397r419152_fix
Configure the operating system to enforce a delay of at least four seconds between logon prompts following a failed console logon attempt. Modify the "/etc/login.defs" file to set the "FAIL_DELAY" parameter to "4" or greater: FAIL_DELAY 4
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-010440
- Vuln IDs
- V-221694
- Rule IDs
- SV-221694r505922_rule
Fix: F-23398r419155_fix
Configure the operating system not to allow an unattended or automatic logon to the system via a graphical user interface. Note: If the system does not have GNOME installed, this requirement is Not Applicable. Add or edit the line for the "AutomaticLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false": [daemon] AutomaticLoginEnable=false
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-010450
- Vuln IDs
- V-221695
- Rule IDs
- SV-221695r505922_rule
Fix: F-23399r419158_fix
Configure the operating system not to allow an unrestricted account to log on to the system via a graphical user interface. Note: If the system does not have GNOME installed, this requirement is Not Applicable. Add or edit the line for the "TimedLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false": [daemon] TimedLoginEnable=false
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-010460
- Vuln IDs
- V-221696
- Rule IDs
- SV-221696r505922_rule
Fix: F-23400r419161_fix
Configure the operating system not to allow users to override environment variables to the SSH daemon. Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for "PermitUserEnvironment" keyword and set the value to "no": PermitUserEnvironment no The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-010470
- Vuln IDs
- V-221697
- Rule IDs
- SV-221697r505922_rule
Fix: F-23401r419164_fix
Configure the operating system not to allow a non-certificate trusted host SSH logon to the system. Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for "HostbasedAuthentication" keyword and set the value to "no": HostbasedAuthentication no The SSH service must be restarted for changes to take effect.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- OL07-00-010480
- Vuln IDs
- V-221698
- Rule IDs
- SV-221698r505922_rule
Fix: F-23402r419167_fix
Configure the system to encrypt the boot password for root. Generate an encrypted grub2 password for root with the following command: Note: The hash generated is an example. # grub2-mkpasswd-pbkdf2 Enter Password: Reenter Password: PBKDF2 hash of your password is grub.pbkdf2.sha512.10000.F3A7CFAA5A51EED123BE8238C23B25B2A6909AFC9812F0D45 Edit "/etc/grub.d/40_custom" and add the following lines below the comments: # vi /etc/grub.d/40_custom set superusers="root" password_pbkdf2 root {hash from grub2-mkpasswd-pbkdf2 command} Generate a new "grub.conf" file with the new password with the following commands: # grub2-mkconfig --output=/tmp/grub2.cfg # mv /tmp/grub2.cfg /boot/grub2/grub.cfg
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- OL07-00-010481
- Vuln IDs
- V-221699
- Rule IDs
- SV-221699r505922_rule
Fix: F-23403r419170_fix
Configure the operating system to require authentication upon booting into single-user and maintenance modes. Add or modify the "ExecStart" line in "/usr/lib/systemd/system/rescue.service" to include "/usr/sbin/sulogin": ExecStart=-/bin/sh -c "/usr/sbin/sulogin; /usr/bin/systemctl --fail --no-block default"
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- OL07-00-010482
- Vuln IDs
- V-221700
- Rule IDs
- SV-221700r505922_rule
Fix: F-23404r419173_fix
Configure the system to encrypt the boot password for root. Generate an encrypted grub2 password for root with the following command: Note: The hash generated is an example. # grub2-setpassword Enter password: Confirm password: Edit the /boot/grub2/grub.cfg file and add or modify the following lines in the "### BEGIN /etc/grub.d/01_users ###" section: set superusers="root" export superusers
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- OL07-00-010490
- Vuln IDs
- V-221701
- Rule IDs
- SV-221701r505922_rule
Fix: F-23405r419176_fix
Configure the system to encrypt the boot password for root. Generate an encrypted grub2 password for root with the following command: Note: The hash generated is an example. # grub2-mkpasswd-pbkdf2 Enter Password: Reenter Password: PBKDF2 hash of your password is grub.pbkdf2.sha512.10000.F3A7CFAA5A51EED123BE8238C23B25B2A6909AFC9812F0D45 Edit "/etc/grub.d/40_custom" and add the following lines below the comments: # vi /etc/grub.d/40_custom set superusers="root" password_pbkdf2 root {hash from grub2-mkpasswd-pbkdf2 command} Generate a new "grub.conf" file with the new password with the following commands: # grub2-mkconfig --output=/tmp/grub2.cfg # mv /tmp/grub2.cfg /boot/efi/EFI/redhat/grub.cfg
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- OL07-00-010491
- Vuln IDs
- V-221702
- Rule IDs
- SV-221702r505922_rule
Fix: F-23406r419179_fix
Configure the system to encrypt the boot password for root. Generate an encrypted grub2 password for root with the following command: Note: The hash generated is an example. # grub2-setpassword Enter password: Confirm password: Edit the /boot/efi/EFI/redhat/grub.cfg file and add or modify the following lines in the "### BEGIN /etc/grub.d/01_users ###" section: set superusers="root" export superusers
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- OL07-00-020000
- Vuln IDs
- V-221704
- Rule IDs
- SV-221704r505922_rule
Fix: F-23408r419185_fix
Configure the operating system to disable non-essential capabilities by removing the rsh-server package from the system with the following command: # yum remove rsh-server
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- OL07-00-020010
- Vuln IDs
- V-221705
- Rule IDs
- SV-221705r505922_rule
Fix: F-23409r419188_fix
Configure the operating system to disable non-essential capabilities by removing the "ypserv" package from the system with the following command: # yum remove ypserv
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-001744
- Version
- OL07-00-020030
- Vuln IDs
- V-221708
- Rule IDs
- SV-221708r505922_rule
Fix: F-23412r499457_fix
Configure the file integrity tool to run automatically on the system at least weekly. The following example output is generic. It will set cron to run AIDE daily, but other file integrity tools may be used: # more /etc/cron.daily/aide #!/bin/bash /usr/sbin/aide --check | /bin/mail -s "$HOSTNAME - Daily aide integrity check run" root@sysname.mil
- RMF Control
- CM-5
- Severity
- H
- CCI
- CCI-001749
- Version
- OL07-00-020050
- Vuln IDs
- V-221710
- Rule IDs
- SV-221710r505922_rule
Fix: F-23414r462702_fix
Configure the operating system to verify the signature of packages from a repository prior to install by setting the following option in the "/etc/yum.conf" file: gpgcheck=1
- RMF Control
- CM-5
- Severity
- H
- CCI
- CCI-001749
- Version
- OL07-00-020060
- Vuln IDs
- V-221711
- Rule IDs
- SV-221711r505922_rule
Fix: F-23415r462705_fix
Configure the operating system to verify the signature of local packages prior to install by setting the following option in the "/etc/yum.conf" file: localpkg_gpgcheck=1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-020100
- Vuln IDs
- V-221712
- Rule IDs
- SV-221712r505922_rule
Fix: F-23416r499463_fix
Configure the operating system to disable the ability to use the USB Storage kernel module. Create a file under "/etc/modprobe.d" with the following command: # touch /etc/modprobe.d/usb-storage.conf Add the following line to the created file: install usb-storage /bin/true Configure the operating system to disable the ability to use USB mass storage devices. # vi /etc/modprobe.d/blacklist.conf Add or update the line: blacklist usb-storage
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- OL07-00-020101
- Vuln IDs
- V-221713
- Rule IDs
- SV-221713r505922_rule
Fix: F-23417r499466_fix
Configure the operating system to disable the ability to use the DCCP kernel module. Create a file under "/etc/modprobe.d" with the following command: # touch /etc/modprobe.d/dccp.conf Add the following line to the created file: install dccp /bin/true Ensure that the DCCP module is blacklisted: # vi /etc/modprobe.d/blacklist.conf Add or update the line: blacklist dccp
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- OL07-00-020110
- Vuln IDs
- V-221714
- Rule IDs
- SV-221714r505922_rule
Fix: F-23418r419215_fix
Configure the operating system to disable the ability to automount devices. Turn off the automount service with the following commands: # systemctl stop autofs # systemctl disable autofs If "autofs" is required for Network File System (NFS), it must be documented with the ISSO.
- RMF Control
- SI-2
- Severity
- L
- CCI
- CCI-002617
- Version
- OL07-00-020200
- Vuln IDs
- V-221715
- Rule IDs
- SV-221715r505922_rule
Fix: F-23419r419218_fix
Configure the operating system to remove all software components after updated versions have been installed. Set the "clean_requirements_on_remove" option to "1" in the "/etc/yum.conf" file: clean_requirements_on_remove=1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-020240
- Vuln IDs
- V-221718
- Rule IDs
- SV-221718r505922_rule
Fix: F-23422r419227_fix
Configure the operating system to define default permissions for all authenticated users in such a way that the user can only read and modify their own files. Add or edit the line for the "UMASK" parameter in "/etc/login.defs" file to "077": UMASK 077
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-020250
- Vuln IDs
- V-221719
- Rule IDs
- SV-221719r505922_rule
Fix: F-23423r419230_fix
Upgrade to a supported version of the operating system.
- RMF Control
- IA-2
- Severity
- L
- CCI
- CCI-000764
- Version
- OL07-00-020300
- Vuln IDs
- V-221722
- Rule IDs
- SV-221722r505922_rule
Fix: F-23426r419239_fix
Configure the system to define all GIDs found in the "/etc/passwd" file by modifying the "/etc/group" file to add any non-existent group referenced in the "/etc/passwd" file, or change the GIDs referenced in the "/etc/passwd" file to a group that exists in "/etc/group".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-020310
- Vuln IDs
- V-221723
- Rule IDs
- SV-221723r505922_rule
Fix: F-23427r419242_fix
Change the UID of any account on the system, other than root, that has a UID of "0". If the account is associated with system commands or applications, the UID should be changed to one greater than "0" but less than "1000". Otherwise, assign a UID of greater than "1000" that has not already been assigned.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-020610
- Vuln IDs
- V-221727
- Rule IDs
- SV-221727r505922_rule
Fix: F-23431r419254_fix
Configure the operating system to assign home directories to all new local interactive users by setting the "CREATE_HOME" parameter in "/etc/login.defs" to "yes" as follows. CREATE_HOME yes
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-020620
- Vuln IDs
- V-221728
- Rule IDs
- SV-221728r505922_rule
Fix: F-23432r499475_fix
Create home directories to all local interactive users that currently do not have a home directory assigned. Use the following commands to create the user home directory assigned in "/etc/ passwd": Note: The example will be for the user smithj, who has a home directory of "/home/smithj", a UID of "smithj", and a Group Identifier (GID) of "users" assigned in "/etc/passwd". # mkdir /home/smithj # chown smithj /home/smithj # chgrp users /home/smithj # chmod 0750 /home/smithj
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-021020
- Vuln IDs
- V-221743
- Rule IDs
- SV-221743r505922_rule
Fix: F-23447r419302_fix
Configure the "/etc/fstab" to use the "nosuid" option on file systems that are being imported via NFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-021021
- Vuln IDs
- V-221744
- Rule IDs
- SV-221744r505922_rule
Fix: F-23448r419305_fix
Configure the "/etc/fstab" to use the "noexec" option on file systems that are being imported via NFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-021030
- Vuln IDs
- V-221748
- Rule IDs
- SV-221748r505922_rule
Fix: F-23452r499490_fix
All directories in local partitions which are world-writable should be group-owned by root or another system account. If any world-writable directories are not group-owned by a system account, this should be investigated. Following this, the directories should be deleted or assigned to an appropriate group.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-021110
- Vuln IDs
- V-221751
- Rule IDs
- SV-221751r505922_rule
Fix: F-23455r419326_fix
Set the owner on the "/etc/cron.allow" file to root with the following command: # chown root /etc/cron.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-021120
- Vuln IDs
- V-221752
- Rule IDs
- SV-221752r505922_rule
Fix: F-23456r419329_fix
Set the group owner on the "/etc/cron.allow" file to root with the following command: # chgrp root /etc/cron.allow
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL07-00-021310
- Vuln IDs
- V-221754
- Rule IDs
- SV-221754r505922_rule
Fix: F-23458r419335_fix
Migrate the "/home" directory onto a separate file system/partition.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL07-00-021320
- Vuln IDs
- V-221755
- Rule IDs
- SV-221755r505922_rule
Fix: F-23459r419338_fix
Migrate the "/var" path onto a separate file system.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL07-00-021340
- Vuln IDs
- V-221757
- Rule IDs
- SV-221757r505922_rule
Fix: F-23461r499493_fix
Start the "tmp.mount" service with the following command: # systemctl enable tmp.mount OR Edit the "/etc/fstab" file and ensure the "/tmp" directory is defined in the fstab with a device and mount point.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- OL07-00-021350
- Vuln IDs
- V-221758
- Rule IDs
- SV-221758r505922_rule
Fix: F-23462r499637_fix
Configure the operating system to implement DoD-approved encryption by installing the dracut-fips package. To enable strict FIPS compliance, the fips=1 kernel option needs to be added to the kernel command line during system installation so key generation is done with FIPS-approved algorithms and continuous monitoring tests in place. Configure the operating system to implement DoD-approved encryption by following the steps below: The fips=1 kernel option needs to be added to the kernel command line during system installation so that key generation is done with FIPS-approved algorithms and continuous monitoring tests in place. Users should also ensure that the system has plenty of entropy during the installation process by moving the mouse around, or if no mouse is available, ensuring that many keystrokes are typed. The recommended amount of keystrokes is 256 and more. Less than 256 keystrokes may generate a non-unique key. Install the dracut-fips package with the following command: # yum install dracut-fips Recreate the "initramfs" file with the following command: Note: This command will overwrite the existing "initramfs" file. # dracut -f Modify the kernel command line of the current kernel in the "grub.cfg" file by adding the following option to the GRUB_CMDLINE_LINUX key in the "/etc/default/grub" file and then rebuild the "grub.cfg" file: fips=1 Changes to "/etc/default/grub" require rebuilding the "grub.cfg" file as follows: On BIOS-based machines, use the following command: # grub2-mkconfig -o /boot/grub2/grub.cfg On UEFI-based machines, use the following command: # grub2-mkconfig -o /boot/efi/EFI/redhat/grub.cfg If /boot or /boot/efi reside on separate partitions, the kernel parameter boot=<partition of /boot or /boot/efi> must be added to the kernel command line. You can identify a partition by running the df /boot or df /boot/efi command: # df /boot Filesystem 1K-blocks Used Available Use% Mounted on /dev/sda1 495844 53780 416464 12% /boot To ensure the "boot=" configuration option will work even if device naming changes occur between boots, identify the universally unique identifier (UUID) of the partition with the following command: # blkid /dev/sda1 /dev/sda1: UUID="05c000f1-a213-759e-c7a2-f11b7424c797" TYPE="ext4" For the example above, append the following string to the kernel command line: boot=UUID=05c000f1-a213-759e-c7a2-f11b7424c797 If the file /etc/system-fips does not exists, recreate it: # touch /etc/ system-fips Reboot the system for the changes to take effect.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- OL07-00-021710
- Vuln IDs
- V-221763
- Rule IDs
- SV-221763r505922_rule
Fix: F-23467r419362_fix
Configure the operating system to disable non-essential capabilities by removing the telnet-server package from the system with the following command: # yum remove telnet-server
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- OL07-00-030000
- Vuln IDs
- V-221764
- Rule IDs
- SV-221764r505922_rule
Fix: F-23468r499640_fix
Configure the operating system to produce audit records containing information to establish when (date and time) the events occurred. Enable the auditd service with the following command: # systemctl start auditd.service
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- OL07-00-030010
- Vuln IDs
- V-221765
- Rule IDs
- SV-221765r505922_rule
Fix: F-23469r499643_fix
Configure the operating system to shut down in the event of an audit processing failure. Add or correct the option to shut down the operating system with the following command: # auditctl -f 2 Edit the "/etc/audit/rules.d/audit.rules" file and add the following line: -f 2 If availability has been determined to be more important, and this decision is documented with the ISSO, configure the operating system to notify system administration staff and ISSO staff in the event of an audit processing failure with the following command: # auditctl -f 1 Edit the "/etc/audit/rules.d/audit.rules" file and add the following line: -f 1 Kernel log monitoring must also be configured to properly alert designated staff. The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030201
- Vuln IDs
- V-221767
- Rule IDs
- SV-221767r505922_rule
Fix: F-23471r499508_fix
Edit the /etc/audisp/plugins.d/au-remote.conf file and add or update the following values: direction = out path = /sbin/audisp-remote type = always The audit daemon must be restarted for changes to take effect: # service auditd restart
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030210
- Vuln IDs
- V-221768
- Rule IDs
- SV-221768r505922_rule
Fix: F-23472r499511_fix
Edit the /etc/audisp/audispd.conf file and add or update the "overflow_action" option: overflow_action = syslog The audit daemon must be restarted for changes to take effect: # service auditd restart
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030211
- Vuln IDs
- V-221769
- Rule IDs
- SV-221769r505922_rule
Fix: F-23473r499514_fix
Edit the /etc/audisp/audispd.conf file and add or update the "name_format" option: name_format = hostname The audit daemon must be restarted for changes to take effect: # service auditd restart
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030300
- Vuln IDs
- V-221770
- Rule IDs
- SV-221770r505922_rule
Fix: F-23474r419383_fix
Configure the operating system to off-load audit records onto a different system or media from the system being audited. Set the remote server option in "/etc/audisp/audisp-remote.conf" with the IP address of the log aggregation server.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030310
- Vuln IDs
- V-221771
- Rule IDs
- SV-221771r505922_rule
Fix: F-23475r419386_fix
Configure the operating system to encrypt the transfer of off-loaded audit records onto a different system or media from the system being audited. Uncomment the "enable_krb5" option in "/etc/audisp/audisp-remote.conf" and set it with the following line: enable_krb5 = yes
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030320
- Vuln IDs
- V-221772
- Rule IDs
- SV-221772r505922_rule
Fix: F-23476r499517_fix
Configure the action the operating system takes if the disk the audit records are written to becomes full. Uncomment or edit the "disk_full_action" option in "/etc/audisp/audisp-remote.conf" and set it to "syslog", "single", or "halt", such as the following line: disk_full_action = single
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030321
- Vuln IDs
- V-221773
- Rule IDs
- SV-221773r505922_rule
Fix: F-23477r499520_fix
Configure the action the operating system takes if there is an error sending audit records to a remote system. Uncomment the "network_failure_action" option in "/etc/audisp/audisp-remote.conf" and set it to "syslog", "single", or "halt". network_failure_action = syslog
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- OL07-00-030340
- Vuln IDs
- V-221775
- Rule IDs
- SV-221775r505922_rule
Fix: F-23479r419398_fix
Configure the operating system to immediately notify the SA and ISSO (at a minimum) when the threshold for the repository maximum audit record storage capacity is reached. Uncomment or edit the "space_left_action" keyword in "/etc/audit/auditd.conf" and set it to "email". space_left_action = email
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- OL07-00-030350
- Vuln IDs
- V-221776
- Rule IDs
- SV-221776r505922_rule
Fix: F-23480r419401_fix
Configure the operating system to immediately notify the SA and ISSO (at a minimum) when the threshold for the repository maximum audit record storage capacity is reached. Uncomment or edit the "action_mail_acct" keyword in "/etc/audit/auditd.conf" and set it to root and any other accounts associated with security personnel. action_mail_acct = root
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- OL07-00-030360
- Vuln IDs
- V-221777
- Rule IDs
- SV-221777r505922_rule
Fix: F-23481r499526_fix
Configure the operating system to audit the execution of privileged functions. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k setuid -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k setuid -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k setgid -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k setgid The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- OL07-00-030370
- Vuln IDs
- V-221778
- Rule IDs
- SV-221778r505922_rule
Fix: F-23482r499529_fix
Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S chown -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S chown -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- OL07-00-030380
- Vuln IDs
- V-221779
- Rule IDs
- SV-221779r505922_rule
Fix: F-23483r499532_fix
Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S fchown -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S fchown -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- OL07-00-030390
- Vuln IDs
- V-221780
- Rule IDs
- SV-221780r505922_rule
Fix: F-23484r499535_fix
Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S lchown -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S lchown -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- OL07-00-030400
- Vuln IDs
- V-221781
- Rule IDs
- SV-221781r505922_rule
Fix: F-23485r499538_fix
Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S fchownat -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S fchownat -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030410
- Vuln IDs
- V-221782
- Rule IDs
- SV-221782r505922_rule
Fix: F-23486r499541_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "chmod" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S chmod -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S chmod -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030420
- Vuln IDs
- V-221783
- Rule IDs
- SV-221783r505922_rule
Fix: F-23487r499544_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "fchmod" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S fchmod -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S fchmod -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030430
- Vuln IDs
- V-221784
- Rule IDs
- SV-221784r505922_rule
Fix: F-23488r499547_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "fchmodat" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S fchmodat -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S fchmodat -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030440
- Vuln IDs
- V-221785
- Rule IDs
- SV-221785r505922_rule
Fix: F-23489r499550_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "setxattr" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S setxattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S setxattr -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030450
- Vuln IDs
- V-221786
- Rule IDs
- SV-221786r505922_rule
Fix: F-23490r499553_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "fsetxattr" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S fsetxattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S fsetxattr -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030460
- Vuln IDs
- V-221787
- Rule IDs
- SV-221787r505922_rule
Fix: F-23491r499556_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "lsetxattr" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S lsetxattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S lsetxattr -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030470
- Vuln IDs
- V-221788
- Rule IDs
- SV-221788r505922_rule
Fix: F-23492r499559_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "removexattr" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S removexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S removexattr -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030480
- Vuln IDs
- V-221789
- Rule IDs
- SV-221789r505922_rule
Fix: F-23493r499562_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "fremovexattr" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S fremovexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S fremovexattr -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030490
- Vuln IDs
- V-221790
- Rule IDs
- SV-221790r505922_rule
Fix: F-23494r499565_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "lremovexattr" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S lremovexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S lremovexattr -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030500
- Vuln IDs
- V-221791
- Rule IDs
- SV-221791r505922_rule
Fix: F-23495r499568_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "creat" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules: -a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030510
- Vuln IDs
- V-221792
- Rule IDs
- SV-221792r505922_rule
Fix: F-23496r499571_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "open" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S open -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b32 -S open -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S open -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S open -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030520
- Vuln IDs
- V-221793
- Rule IDs
- SV-221793r505922_rule
Fix: F-23497r499574_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "openat" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S openat -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b32 -S openat -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S openat -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S openat -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030530
- Vuln IDs
- V-221794
- Rule IDs
- SV-221794r505922_rule
Fix: F-23498r499577_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "open_by_handle_at" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b32 -S open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030540
- Vuln IDs
- V-221795
- Rule IDs
- SV-221795r505922_rule
Fix: F-23499r499580_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "truncate" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S truncate -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b32 -S truncate -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S truncate -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S truncate -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030550
- Vuln IDs
- V-221796
- Rule IDs
- SV-221796r505922_rule
Fix: F-23500r499583_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "ftruncate" syscall occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S ftruncate -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b32 -S ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S ftruncate -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030560
- Vuln IDs
- V-221797
- Rule IDs
- SV-221797r505922_rule
Fix: F-23501r419464_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "semanage" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/semanage -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002884
- Version
- OL07-00-030570
- Vuln IDs
- V-221798
- Rule IDs
- SV-221798r505922_rule
Fix: F-23502r419467_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "setsebool" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/setsebool -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002884
- Version
- OL07-00-030580
- Vuln IDs
- V-221799
- Rule IDs
- SV-221799r505922_rule
Fix: F-23503r419470_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "chcon" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/chcon -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002884
- Version
- OL07-00-030590
- Vuln IDs
- V-221800
- Rule IDs
- SV-221800r505922_rule
Fix: F-23504r419473_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "setfiles" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/setfiles -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030610
- Vuln IDs
- V-221801
- Rule IDs
- SV-221801r505922_rule
Fix: F-23505r419476_fix
Configure the operating system to generate audit records when unsuccessful account access events occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /var/run/faillock -p wa -k logins The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030620
- Vuln IDs
- V-221802
- Rule IDs
- SV-221802r505922_rule
Fix: F-23506r419479_fix
Configure the operating system to generate audit records when successful account access events occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /var/log/lastlog -p wa -k logins The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030630
- Vuln IDs
- V-221803
- Rule IDs
- SV-221803r505922_rule
Fix: F-23507r419482_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "passwd" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/passwd -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030640
- Vuln IDs
- V-221804
- Rule IDs
- SV-221804r505922_rule
Fix: F-23508r419485_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "unix_chkpwd" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/unix_chkpwd -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030650
- Vuln IDs
- V-221805
- Rule IDs
- SV-221805r505922_rule
Fix: F-23509r419488_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "gpasswd" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/gpasswd -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030660
- Vuln IDs
- V-221806
- Rule IDs
- SV-221806r505922_rule
Fix: F-23510r419491_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "chage" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/chage -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030670
- Vuln IDs
- V-221807
- Rule IDs
- SV-221807r505922_rule
Fix: F-23511r419494_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "userhelper" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/userhelper -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030680
- Vuln IDs
- V-221808
- Rule IDs
- SV-221808r505922_rule
Fix: F-23512r419497_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "su" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/su -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL07-00-030690
- Vuln IDs
- V-221809
- Rule IDs
- SV-221809r505922_rule
Fix: F-23513r419500_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "sudo" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/sudo -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030700
- Vuln IDs
- V-221810
- Rule IDs
- SV-221810r505922_rule
Fix: F-23514r419503_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to access the "/etc/sudoers" file and files in the "/etc/sudoers.d/" directory. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /etc/sudoers -p wa -k privileged-actions -w /etc/sudoers.d/ -p wa -k privileged-actions The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030710
- Vuln IDs
- V-221811
- Rule IDs
- SV-221811r505922_rule
Fix: F-23515r419506_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "newgrp" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/newgrp -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL07-00-030720
- Vuln IDs
- V-221812
- Rule IDs
- SV-221812r505922_rule
Fix: F-23516r419509_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "chsh" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/chsh -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030740
- Vuln IDs
- V-221813
- Rule IDs
- SV-221813r505922_rule
Fix: F-23517r499586_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "mount" command and syscall occur. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S mount -F auid>=1000 -F auid!=unset -k privileged-mount -a always,exit -F arch=b64 -S mount -F auid>=1000 -F auid!=unset -k privileged-mount -a always,exit -F path=/usr/bin/mount -F auid>=1000 -F auid!=unset -k privileged-mount The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030750
- Vuln IDs
- V-221814
- Rule IDs
- SV-221814r505922_rule
Fix: F-23518r419515_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "umount" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/umount -F auid>=1000 -F auid!=unset -k privileged-mount The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030760
- Vuln IDs
- V-221815
- Rule IDs
- SV-221815r505922_rule
Fix: F-23519r419518_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "postdrop" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/postdrop -F auid>=1000 -F auid!=unset -k privileged-postfix The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030770
- Vuln IDs
- V-221816
- Rule IDs
- SV-221816r505922_rule
Fix: F-23520r419521_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "postqueue" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/postqueue -F auid>=1000 -F auid!=unset -k privileged-postfix The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030780
- Vuln IDs
- V-221817
- Rule IDs
- SV-221817r505922_rule
Fix: F-23521r419524_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "ssh-keysign" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/libexec/openssh/ssh-keysign -F auid>=1000 -F auid!=unset -k privileged-ssh The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030800
- Vuln IDs
- V-221818
- Rule IDs
- SV-221818r505922_rule
Fix: F-23522r419527_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "crontab" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/crontab -F auid>=1000 -F auid!=unset -k privileged-cron The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030810
- Vuln IDs
- V-221819
- Rule IDs
- SV-221819r505922_rule
Fix: F-23523r419530_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "pam_timestamp_check" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/pam_timestamp_check -F auid>=1000 -F auid!=unset -k privileged-pam The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030819
- Vuln IDs
- V-221820
- Rule IDs
- SV-221820r505922_rule
Fix: F-23524r499589_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "create_module" syscall occur. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S create_module -k module-change -a always,exit -F arch=b64 -S create_module -k module-change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030820
- Vuln IDs
- V-221821
- Rule IDs
- SV-221821r505922_rule
Fix: F-23525r419536_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "init_module" syscall occur. Add or update the following rules in "/etc/audit/rules.d/audit.rules": Note: The rules are duplicated to cover both 32-bit and 64-bit architectures. Only the lines appropriate for the system architecture must be configured. -a always,exit -F arch=b32 -S init_module -k module-change -a always,exit -F arch=b64 -S init_module -k module-change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030821
- Vuln IDs
- V-221822
- Rule IDs
- SV-221822r505922_rule
Fix: F-23526r499592_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "finit_module" syscall occur. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S finit_module -k module-change -a always,exit -F arch=b64 -S finit_module -k module-change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030830
- Vuln IDs
- V-221823
- Rule IDs
- SV-221823r505922_rule
Fix: F-23527r419542_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "delete_module" syscall occur. Add or update the following rules in "/etc/audit/rules.d/audit.rules": Note: The rules are duplicated to cover both 32-bit and 64-bit architectures. Only the lines appropriate for the system architecture must be configured. -a always,exit -F arch=b32 -S delete_module -k module-change -a always,exit -F arch=b64 -S delete_module -k module-change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030840
- Vuln IDs
- V-221824
- Rule IDs
- SV-221824r505922_rule
Fix: F-23528r419545_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "kmod" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /usr/bin/kmod -p x -F auid!=unset -k module-change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030870
- Vuln IDs
- V-221825
- Rule IDs
- SV-221825r505922_rule
Fix: F-23529r419548_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/passwd". Add or update the following rule "/etc/audit/rules.d/audit.rules": -w /etc/passwd -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL07-00-030871
- Vuln IDs
- V-221826
- Rule IDs
- SV-221826r505922_rule
Fix: F-23530r419551_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/group". Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /etc/group -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL07-00-030872
- Vuln IDs
- V-221827
- Rule IDs
- SV-221827r505922_rule
Fix: F-23531r419554_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/gshadow". Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /etc/gshadow -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL07-00-030873
- Vuln IDs
- V-221828
- Rule IDs
- SV-221828r505922_rule
Fix: F-23532r419557_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow. Add or update the following file system rule in "/etc/audit/rules.d/audit.rules": -w /etc/shadow -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL07-00-030874
- Vuln IDs
- V-221829
- Rule IDs
- SV-221829r505922_rule
Fix: F-23533r419560_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd. Add or update the following file system rule in "/etc/audit/rules.d/audit.rules": -w /etc/security/opasswd -p wa -k identity The audit daemon must be restarted for the changes to take effect: # systemctl restart auditd
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030880
- Vuln IDs
- V-221830
- Rule IDs
- SV-221830r505922_rule
Fix: F-23534r499595_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "rename" syscall occur. Add the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S rename -F auid>=1000 -F auid!=unset -k delete -a always,exit -F arch=b64 -S rename -F auid>=1000 -F auid!=unset -k delete The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030890
- Vuln IDs
- V-221831
- Rule IDs
- SV-221831r505922_rule
Fix: F-23535r499598_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "renameat" syscall occur. Add the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S renameat -F auid>=1000 -F auid!=unset -k delete -a always,exit -F arch=b64 -S renameat -F auid>=1000 -F auid!=unset -k delete The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030900
- Vuln IDs
- V-221832
- Rule IDs
- SV-221832r505922_rule
Fix: F-23536r499601_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "rmdir" syscall occur. Add the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S rmdir -F auid>=1000 -F auid!=unset -k delete -a always,exit -F arch=b64 -S rmdir -F auid>=1000 -F auid!=unset -k delete The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030910
- Vuln IDs
- V-221833
- Rule IDs
- SV-221833r505922_rule
Fix: F-23537r499604_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "unlink" syscall occur. Add the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S unlink -F auid>=1000 -F auid!=unset -k delete -a always,exit -F arch=b64 -S unlink -F auid>=1000 -F auid!=unset -k delete The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030920
- Vuln IDs
- V-221834
- Rule IDs
- SV-221834r505922_rule
Fix: F-23538r499607_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "unlinkat" syscall occur. Add the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S unlinkat -F auid>=1000 -F auid!=unset -k delete -a always,exit -F arch=b64 -S unlinkat -F auid>=1000 -F auid!=unset -k delete The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- OL07-00-040000
- Vuln IDs
- V-221838
- Rule IDs
- SV-221838r505922_rule
Fix: F-23542r499610_fix
Configure the operating system to limit the number of concurrent sessions to "10" for all accounts and/or account types. Add the following line to the top of the /etc/security/limits.conf or in a ".conf" file defined in /etc/security/limits.d/ : * hard maxlogins 10
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- OL07-00-040110
- Vuln IDs
- V-221840
- Rule IDs
- SV-221840r505922_rule
Fix: F-23544r419593_fix
Configure SSH to use FIPS 140-2 approved cryptographic algorithms. Add the following line (or modify the line to have the required value) to the "/etc/ssh/sshd_config" file (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor). Ciphers aes128-ctr,aes192-ctr,aes256-ctr The SSH service must be restarted for changes to take effect.
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- OL07-00-040201
- Vuln IDs
- V-221846
- Rule IDs
- SV-221846r505922_rule
Fix: F-23550r419611_fix
Configure the operating system implement virtual address space randomization. Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a config file in the /etc/sysctl.d/ directory (or modify the line to have the required value): kernel.randomize_va_space = 2 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- OL07-00-040300
- Vuln IDs
- V-221847
- Rule IDs
- SV-221847r505922_rule
Fix: F-23551r419614_fix
Install SSH packages onto the host with the following commands: # yum install openssh-server.x86_64
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- OL07-00-040320
- Vuln IDs
- V-221849
- Rule IDs
- SV-221849r505922_rule
Fix: F-23553r419620_fix
Configure the operating system to terminate a user session automatically after inactivity time-outs have expired or at shutdown. Add the following line (or modify the line to have the required value) to the "/etc/ssh/sshd_config" file (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): ClientAliveInterval 600 The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040330
- Vuln IDs
- V-221850
- Rule IDs
- SV-221850r505922_rule
Fix: F-23554r419623_fix
Configure the SSH daemon to not allow authentication using RSA rhosts authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "no": RhostsRSAAuthentication no The SSH service must be restarted for changes to take effect.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- OL07-00-040340
- Vuln IDs
- V-221851
- Rule IDs
- SV-221851r505922_rule
Fix: F-23555r419626_fix
Configure the operating system to terminate automatically a user session after inactivity time-outs have expired or at shutdown. Add the following line (or modify the line to have the required value) to the "/etc/ssh/sshd_config" file (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): ClientAliveCountMax 0 The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040350
- Vuln IDs
- V-221852
- Rule IDs
- SV-221852r505922_rule
Fix: F-23556r419629_fix
Configure the SSH daemon to not allow authentication using known hosts authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "yes": IgnoreRhosts yes
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040360
- Vuln IDs
- V-221853
- Rule IDs
- SV-221853r505922_rule
Fix: F-23557r419632_fix
Configure SSH to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/sshd" or in the "sshd_config" file used by the system ("/etc/ssh/sshd_config" will be used in the example) (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor). Modify the "PrintLastLog" line in "/etc/ssh/sshd_config" to match the following: PrintLastLog yes The SSH service must be restarted for changes to "sshd_config" to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040370
- Vuln IDs
- V-221854
- Rule IDs
- SV-221854r505922_rule
Fix: F-23558r419635_fix
Configure SSH to stop users from logging on remotely as the root user. Edit the appropriate "/etc/ssh/sshd_config" file to uncomment or add the line for the "PermitRootLogin" keyword and set its value to "no" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): PermitRootLogin no The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040380
- Vuln IDs
- V-221855
- Rule IDs
- SV-221855r505922_rule
Fix: F-23559r419638_fix
Configure the SSH daemon to not allow authentication using known hosts authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "yes": IgnoreUserKnownHosts yes The SSH service must be restarted for changes to take effect.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- OL07-00-040390
- Vuln IDs
- V-221856
- Rule IDs
- SV-221856r505922_rule
Fix: F-23560r419641_fix
Remove all Protocol lines that reference version "1" in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor). The "Protocol" line must be as follows: Protocol 2 The SSH service must be restarted for changes to take effect.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- OL07-00-040400
- Vuln IDs
- V-221857
- Rule IDs
- SV-221857r505922_rule
Fix: F-23561r419644_fix
Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "MACs" keyword and set its value to "hmac-sha2-256" and/or "hmac-sha2-512" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): MACs hmac-sha2-256,hmac-sha2-512 The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040410
- Vuln IDs
- V-221858
- Rule IDs
- SV-221858r505922_rule
Fix: F-23562r419647_fix
Note: SSH public key files may be found in other directories on the system depending on the installation. Change the mode of public host key files under "/etc/ssh" to "0644" with the following command: # chmod 0644 /etc/ssh/*.key.pub
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040420
- Vuln IDs
- V-221859
- Rule IDs
- SV-221859r505922_rule
Fix: F-23563r419650_fix
Configure the mode of SSH private host key files under "/etc/ssh" to "0640" with the following command: # chmod 0640 /path/to/file/ssh_host*key
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- OL07-00-040430
- Vuln IDs
- V-221860
- Rule IDs
- SV-221860r505922_rule
Fix: F-23564r419653_fix
Uncomment the "GSSAPIAuthentication" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to "no": GSSAPIAuthentication no The SSH service must be restarted for changes to take effect. If GSSAPI authentication is required, it must be documented, to include the location of the configuration file, with the ISSO.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- OL07-00-040440
- Vuln IDs
- V-221861
- Rule IDs
- SV-221861r505922_rule
Fix: F-23565r419656_fix
Uncomment the "KerberosAuthentication" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to "no": KerberosAuthentication no The SSH service must be restarted for changes to take effect. If Kerberos authentication is required, it must be documented, to include the location of the configuration file, with the ISSO.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040450
- Vuln IDs
- V-221862
- Rule IDs
- SV-221862r505922_rule
Fix: F-23566r419659_fix
Uncomment the "StrictModes" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to "yes": StrictModes yes The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040460
- Vuln IDs
- V-221863
- Rule IDs
- SV-221863r505922_rule
Fix: F-23567r419662_fix
Uncomment the "UsePrivilegeSeparation" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to "sandbox" or "yes": UsePrivilegeSeparation sandbox The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040470
- Vuln IDs
- V-221864
- Rule IDs
- SV-221864r505922_rule
Fix: F-23568r419665_fix
Uncomment the "Compression" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) on the system and set the value to "delayed" or "no": Compression no The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL07-00-040530
- Vuln IDs
- V-221869
- Rule IDs
- SV-221869r505922_rule
Fix: F-23573r419680_fix
Configure the operating system to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/postlogin". Add the following line to the top of "/etc/pam.d/postlogin": session required pam_lastlog.so showfailed
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-040540
- Vuln IDs
- V-221870
- Rule IDs
- SV-221870r505922_rule
Fix: F-23574r419683_fix
Remove any found ".shosts" files from the system. # rm /[path]/[to]/[file]/.shosts
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-040550
- Vuln IDs
- V-221871
- Rule IDs
- SV-221871r505922_rule
Fix: F-23575r419686_fix
Remove any found "shosts.equiv" files from the system. # rm /[path]/[to]/[file]/shosts.equiv
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL07-00-040600
- Vuln IDs
- V-221872
- Rule IDs
- SV-221872r505922_rule
Fix: F-23576r499628_fix
Configure the operating system to use two or more name servers for DNS resolution. Edit the "/etc/resolv.conf" file to uncomment or add the two or more "nameserver" option lines with the IP address of local authoritative name servers. If local host resolution is being performed, the "/etc/resolv.conf" file must be empty. An empty "/etc/resolv.conf" file can be created as follows: # echo -n > /etc/resolv.conf And then make the file immutable with the following command: # chattr +i /etc/resolv.conf If the "/etc/resolv.conf" file must be mutable, the required configuration must be documented with the Information System Security Officer (ISSO) and the file must be verified by the system file integrity tool.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040610
- Vuln IDs
- V-221873
- Rule IDs
- SV-221873r505922_rule
Fix: F-23577r419692_fix
Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.all.accept_source_route = 0 Issue the following command to make the changes take effect: # sysctl -system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040620
- Vuln IDs
- V-221876
- Rule IDs
- SV-221876r505922_rule
Fix: F-23580r419701_fix
Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.default.accept_source_route = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040630
- Vuln IDs
- V-221877
- Rule IDs
- SV-221877r505922_rule
Fix: F-23581r419704_fix
Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.icmp_echo_ignore_broadcasts = 1 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040640
- Vuln IDs
- V-221878
- Rule IDs
- SV-221878r505922_rule
Fix: F-23582r419707_fix
Set the system to not accept IPv4 ICMP redirect messages by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.default.accept_redirects = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040641
- Vuln IDs
- V-221879
- Rule IDs
- SV-221879r505922_rule
Fix: F-23583r419710_fix
Set the system to ignore IPv4 ICMP redirect messages by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.all.accept_redirects = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040650
- Vuln IDs
- V-221880
- Rule IDs
- SV-221880r505922_rule
Fix: F-23584r419713_fix
Configure the system not to allow interfaces to perform IPv4 ICMP redirects by default. Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.default.send_redirects = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040660
- Vuln IDs
- V-221881
- Rule IDs
- SV-221881r505922_rule
Fix: F-23585r419716_fix
Configure the system not to allow interfaces to perform IPv4 ICMP redirects. Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.all.send_redirects = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-040690
- Vuln IDs
- V-221884
- Rule IDs
- SV-221884r505922_rule
Fix: F-23588r419725_fix
Document the "vsftpd" package with the ISSO as an operational requirement or remove it from the system with the following command: # yum remove vsftpd
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-040700
- Vuln IDs
- V-221885
- Rule IDs
- SV-221885r505922_rule
Fix: F-23589r419728_fix
Remove the TFTP package from the system with the following command: # yum remove tftp-server
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-040710
- Vuln IDs
- V-221886
- Rule IDs
- SV-221886r505922_rule
Fix: F-23590r419731_fix
Configure SSH to encrypt connections for interactive users. Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "X11Forwarding" keyword and set its value to "yes" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): X11Forwarding yes The SSH service must be restarted for changes to take effect: # systemctl restart sshd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040730
- Vuln IDs
- V-221888
- Rule IDs
- SV-221888r505922_rule
Fix: F-23592r499631_fix
Document the requirement for a graphical user interface with the ISSO or remove the related packages with the following commands: # rpm -e xorg-x11-server-common # systemctl set-default multi-user.target
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040740
- Vuln IDs
- V-221889
- Rule IDs
- SV-221889r505922_rule
Fix: F-23593r419740_fix
Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.ip_forward = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-040800
- Vuln IDs
- V-221891
- Rule IDs
- SV-221891r505922_rule
Fix: F-23595r419746_fix
If the "/etc/snmp/snmpd.conf" file exists, modify any lines that contain a community string value of "public" or "private" to another string value.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040830
- Vuln IDs
- V-221894
- Rule IDs
- SV-221894r505922_rule
Fix: F-23598r419755_fix
Set the system to the required kernel parameter, if IPv6 is enabled, by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv6.conf.all.accept_source_route = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- OL07-00-041001
- Vuln IDs
- V-221895
- Rule IDs
- SV-221895r505922_rule
Fix: F-23599r499634_fix
Configure the operating system to implement multifactor authentication by installing the required packages. Install the "pam_pkcs11" package with the following command: # yum install pam_pkcs11
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- OL07-00-041002
- Vuln IDs
- V-221896
- Rule IDs
- SV-221896r505922_rule
Fix: F-23600r419761_fix
Configure the operating system to implement multifactor authentication for remote access to privileged accounts via pluggable authentication modules (PAM). Modify all of the services lines in "/etc/sssd/sssd.conf" or in configuration files found under "/etc/sssd/conf.d" to include pam.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- OL07-00-041003
- Vuln IDs
- V-221897
- Rule IDs
- SV-221897r505922_rule
Fix: F-23601r419764_fix
Configure the operating system to do certificate status checking for PKI authentication. Modify all of the "cert_policy" lines in "/etc/pam_pkcs11/pam_pkcs11.conf" to include "ocsp_on".