Oracle Linux 7 STIG SCAP Benchmark
Open a previous version of this SCAP benchmark.
- RMF Control
- CM-5
- Severity
- H
- CCI
- CCI-001749
- Version
- OL07-00-010020
- Vuln IDs
- V-221653
- Rule IDs
- SV-221653r853660_rule
Fix: F-36229r602390_fix
Run the following command to determine which package owns the file: # rpm -qf <filename> The package can be reinstalled from a yum repository using the command: # sudo yum reinstall <packagename> Alternatively, the package can be reinstalled from trusted media using the command: # sudo rpm -Uvh <packagename>
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- OL07-00-010030
- Vuln IDs
- V-221654
- Rule IDs
- SV-221654r603260_rule
Fix: F-23358r419035_fix
Configure the operating system to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. Note: If the system does not have GNOME installed, this requirement is Not Applicable. Create a database to contain the system-wide graphical user logon settings (if it does not already exist) with the following command: # touch /etc/dconf/db/local.d/01-banner-message Add the following line to the [org/gnome/login-screen] section of the "/etc/dconf/db/local.d/01-banner-message": [org/gnome/login-screen] banner-message-enable=true Update the system databases: # dconf update Users must log out, and then log in again before the system-wide settings take effect.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- OL07-00-010060
- Vuln IDs
- V-221657
- Rule IDs
- SV-221657r880600_rule
Fix: F-23361r880599_fix
Configure the operating system to enable a user's session lock until that user re-establishes access using established identification and authentication procedures. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following example: # touch /etc/dconf/db/local.d/00-screensaver Edit the "[org/gnome/desktop/screensaver]" section of the database file and add or update the following lines: # Set this to true to lock the screen when the screensaver activates lock-enabled=true Update the system databases: # dconf update Users must log out and then log in again before the system-wide settings take effect.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- OL07-00-010061
- Vuln IDs
- V-221658
- Rule IDs
- SV-221658r853661_rule
Fix: F-23362r419047_fix
Configure the operating system to uniquely identify and authenticate users using multifactor authentication via a graphical user logon. Note: If the system does not have GNOME installed, this requirement is Not Applicable. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: Note: The example is using the local system database, so if the system is using another database in "/etc/dconf/profile/user", create the file under the appropriate subdirectory. # touch /etc/dconf/db/local.d/00-defaults Edit "[org/gnome/login-screen]" and add or update the following line: enable-smartcard-authentication=true Update the system databases: # dconf update
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- OL07-00-010070
- Vuln IDs
- V-221660
- Rule IDs
- SV-221660r880606_rule
Fix: F-23364r880605_fix
Configure the operating system to initiate a screensaver after a 15-minute period of inactivity for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: # touch /etc/dconf/db/local.d/00-screensaver Edit /etc/dconf/db/local.d/00-screensaver and add or update the following lines: [org/gnome/desktop/session] # Set the lock time out to 900 seconds before the session is considered idle idle-delay=uint32 900 You must include the "uint32" along with the integer key values as shown. Update the system databases: # dconf update Users must log out and then log in again before the system-wide settings take effect.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- OL07-00-010081
- Vuln IDs
- V-221661
- Rule IDs
- SV-221661r880609_rule
Fix: F-23365r880608_fix
Configure the operating system to prevent a user from overriding a screensaver lock after a 15-minute period of inactivity for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: Note: The example below is using the database "local" for the system, so if the system is using another database in "/etc/dconf/profile/user", the file should be created under the appropriate subdirectory. # touch /etc/dconf/db/local.d/locks/session Add the setting to lock the screensaver lock delay: /org/gnome/desktop/screensaver/lock-delay
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- OL07-00-010100
- Vuln IDs
- V-221664
- Rule IDs
- SV-221664r880618_rule
Fix: F-36231r880617_fix
Configure the operating system to initiate a session lock after a 15-minute period of inactivity for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: # touch /etc/dconf/db/local.d/00-screensaver Add the setting to enable screensaver locking after 15 minutes of inactivity: [org/gnome/desktop/screensaver] idle-activation-enabled=true Update the system databases: # dconf update Users must log out and back in again before the system-wide settings take effect.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- OL07-00-010101
- Vuln IDs
- V-221665
- Rule IDs
- SV-221665r880621_rule
Fix: F-23369r880620_fix
Configure the operating system to prevent a user from overriding a screensaver lock after a 15-minute period of inactivity for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: Note: The example below is using the database "local" for the system, so if the system is using another database in "/etc/dconf/profile/user", the file should be created under the appropriate subdirectory. # touch /etc/dconf/db/local.d/locks/session Add the setting to lock the screensaver idle-activation-enabled setting: /org/gnome/desktop/screensaver/idle-activation-enabled
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- OL07-00-010110
- Vuln IDs
- V-221666
- Rule IDs
- SV-221666r880624_rule
Fix: F-23370r880623_fix
Configure the operating system to initiate a session lock for graphical user interfaces when a screensaver is activated. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: # touch /etc/dconf/db/local.d/00-screensaver Add the setting to enable session locking when a screensaver is activated: [org/gnome/desktop/screensaver] lock-delay=uint32 5 The "uint32" must be included along with the integer key values as shown. Update the system databases: # dconf update Users must log out and then log in again before the system-wide settings take effect.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- OL07-00-010118
- Vuln IDs
- V-221667
- Rule IDs
- SV-221667r603260_rule
Fix: F-23371r419074_fix
Configure PAM to utilize /etc/pam.d/system-auth when changing passwords. Add the following line to "/etc/pam.d/passwd" (or modify the line to have the required value): password substack system-auth
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- OL07-00-010119
- Vuln IDs
- V-221668
- Rule IDs
- SV-221668r902779_rule
Fix: F-23372r902778_fix
Configure the operating system to use "pwquality" to enforce password complexity rules. Add the following line to "/etc/pam.d/system-auth" (or modify the line to have the required value): password requisite pam_pwquality.so retry=3 Note: The value of "retry" should be between "1" and "3".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- OL07-00-010120
- Vuln IDs
- V-221669
- Rule IDs
- SV-221669r603260_rule
Fix: F-23373r419080_fix
Configure the operating system to enforce password complexity by requiring that at least one upper-case character be used by setting the "ucredit" option. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): ucredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- OL07-00-010130
- Vuln IDs
- V-221670
- Rule IDs
- SV-221670r603260_rule
Fix: F-23374r419083_fix
Configure the system to require at least one lower-case character when creating or changing a password. Add or modify the following line in "/etc/security/pwquality.conf": lcredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- OL07-00-010140
- Vuln IDs
- V-221671
- Rule IDs
- SV-221671r603260_rule
Fix: F-23375r419086_fix
Configure the operating system to enforce password complexity by requiring that at least one numeric character be used by setting the "dcredit" option. Add the following line to /etc/security/pwquality.conf (or modify the line to have the required value): dcredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- OL07-00-010150
- Vuln IDs
- V-221672
- Rule IDs
- SV-221672r603260_rule
Fix: F-23376r419089_fix
Configure the operating system to enforce password complexity by requiring that at least one special character be used by setting the "ocredit" option. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): ocredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- OL07-00-010160
- Vuln IDs
- V-221673
- Rule IDs
- SV-221673r603260_rule
Fix: F-23377r419092_fix
Configure the operating system to require the change of at least eight of the total number of characters when passwords are changed by setting the "difok" option. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): difok = 8
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- OL07-00-010170
- Vuln IDs
- V-221674
- Rule IDs
- SV-221674r603260_rule
Fix: F-23378r419095_fix
Configure the operating system to require the change of at least four character classes when passwords are changed by setting the "minclass" option. Add the following line to "/etc/security/pwquality.conf conf" (or modify the line to have the required value): minclass = 4
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- OL07-00-010180
- Vuln IDs
- V-221675
- Rule IDs
- SV-221675r603260_rule
Fix: F-23379r419098_fix
Configure the operating system to require the change of the number of repeating consecutive characters when passwords are changed by setting the "maxrepeat" option. Add the following line to "/etc/security/pwquality.conf conf" (or modify the line to have the required value): maxrepeat = 3
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- OL07-00-010190
- Vuln IDs
- V-221676
- Rule IDs
- SV-221676r809140_rule
Fix: F-23380r419101_fix
Configure the operating system to require the change of the number of repeating characters of the same character class when passwords are changed by setting the "maxclassrepeat" option. Add the following line to "/etc/security/pwquality.conf" conf (or modify the line to have the required value): maxclassrepeat = 4
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- OL07-00-010200
- Vuln IDs
- V-221677
- Rule IDs
- SV-221677r917840_rule
Fix: F-23381r917839_fix
Configure the operating system to store only SHA512 encrypted representations of passwords. Add the following line in "/etc/pam.d/system-auth": password sufficient pam_unix.so sha512 shadow try_first_pass use_authtok Add the following line in "/etc/pam.d/password-auth": password sufficient pam_unix.so sha512 shadow try_first_pass use_authtok Note: Per requirement OL07-00-010199, Oracle Linux 7 must be configured to not overwrite custom authentication configuration settings while using the authconfig utility; otherwise, manual changes to the listed files will be overwritten whenever the authconfig utility is used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- OL07-00-010210
- Vuln IDs
- V-221678
- Rule IDs
- SV-221678r877397_rule
Fix: F-23382r419107_fix
Configure the operating system to store only SHA512 encrypted representations of passwords. Add or update the following line in "/etc/login.defs": ENCRYPT_METHOD SHA512
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- OL07-00-010220
- Vuln IDs
- V-221680
- Rule IDs
- SV-221680r877397_rule
Fix: F-23384r419113_fix
Configure the operating system to store only SHA512 encrypted representations of passwords. Add or update the following line in "/etc/libuser.conf" in the [defaults] section: crypt_style = sha512
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- OL07-00-010230
- Vuln IDs
- V-221681
- Rule IDs
- SV-221681r603260_rule
Fix: F-23385r419116_fix
Configure the operating system to enforce 24 hours/1 day as the minimum password lifetime. Add the following line in "/etc/login.defs" (or modify the line to have the required value): PASS_MIN_DAYS 1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- OL07-00-010240
- Vuln IDs
- V-221682
- Rule IDs
- SV-221682r603260_rule
Fix: F-23386r419119_fix
Configure non-compliant accounts to enforce a 24 hours/1 day minimum password lifetime: # chage -m 1 [user]
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- OL07-00-010250
- Vuln IDs
- V-221683
- Rule IDs
- SV-221683r603260_rule
Fix: F-23387r419122_fix
Configure the operating system to enforce a 60-day maximum password lifetime restriction. Add the following line in "/etc/login.defs" (or modify the line to have the required value): PASS_MAX_DAYS 60
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- OL07-00-010260
- Vuln IDs
- V-221684
- Rule IDs
- SV-221684r603260_rule
Fix: F-23388r419125_fix
Configure non-compliant accounts to enforce a 60-day maximum password lifetime restriction. # chage -M 60 [user]
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- OL07-00-010270
- Vuln IDs
- V-221685
- Rule IDs
- SV-221685r917842_rule
Fix: F-23389r917841_fix
Configure the operating system to prohibit password reuse for a minimum of five generations. Add the following line in "/etc/pam.d/system-auth" (or modify the line to have the required value): password requisite pam_pwhistory.so remember=5 retry=3 Add the following line in "/etc/pam.d/password-auth" (or modify the line to have the required value): password requisite pam_pwhistory.so use_authtok remember=5 retry=3 Note: Per requirement OL07-00-010199, Oracle Linux 7 must be configured to not overwrite custom authentication configuration settings while using the authconfig utility; otherwise, manual changes to the listed files will be overwritten whenever the authconfig utility is used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- OL07-00-010280
- Vuln IDs
- V-221686
- Rule IDs
- SV-221686r603260_rule
Fix: F-23390r419131_fix
Configure operating system to enforce a minimum 15-character password length. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): minlen = 15
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-010290
- Vuln IDs
- V-221687
- Rule IDs
- SV-221687r880678_rule
Fix: F-23391r880677_fix
If an account is configured for password authentication but does not have an assigned password, it may be possible to log on to the account without authenticating. Remove any instances of the "nullok" option in "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" to prevent logons with empty passwords. Note: Per requirement OL07-00-010199, Oracle Linux 7 must be configured to not overwrite custom authentication configuration settings while using the authconfig utility, otherwise manual changes to the listed files will be overwritten whenever the authconfig utility is used.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000766
- Version
- OL07-00-010300
- Vuln IDs
- V-221688
- Rule IDs
- SV-221688r603260_rule
Fix: F-23392r419137_fix
To explicitly disallow remote logon from accounts with empty passwords, add or correct the following line in "/etc/ssh/sshd_config": PermitEmptyPasswords no The SSH service must be restarted for changes to take effect. Any accounts with empty passwords should be disabled immediately, and PAM configuration should prevent users from being able to assign themselves empty passwords.
- RMF Control
- IA-4
- Severity
- M
- CCI
- CCI-000795
- Version
- OL07-00-010310
- Vuln IDs
- V-221689
- Rule IDs
- SV-221689r928639_rule
Fix: F-23393r928639_fix
Configure the operating system to disable account identifiers (individuals, groups, roles, and devices) 35 days after the password has expired. Add the following line to "/etc/default/useradd" (or modify the line to have the required value): INACTIVE=35 DOD recommendation is 35 days, but a lower value is acceptable. The value "-1" will disable this feature, and "0" will disable the account immediately after the password expires.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- OL07-00-010340
- Vuln IDs
- V-221692
- Rule IDs
- SV-221692r860860_rule
Fix: F-36233r860859_fix
Configure the operating system to require users to supply a password for privilege escalation. Check the configuration of the "/etc/sudoers" file with the following command: $ sudo visudo Remove any occurrences of "NOPASSWD" tags in the file. Check the configuration of the /etc/sudoers.d/* files with the following command: $ sudo grep -ir nopasswd /etc/sudoers.d Remove any occurrences of "NOPASSWD" tags in the file.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-010430
- Vuln IDs
- V-221693
- Rule IDs
- SV-221693r603260_rule
Fix: F-23397r419152_fix
Configure the operating system to enforce a delay of at least four seconds between logon prompts following a failed console logon attempt. Modify the "/etc/login.defs" file to set the "FAIL_DELAY" parameter to "4" or greater: FAIL_DELAY 4
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-010440
- Vuln IDs
- V-221694
- Rule IDs
- SV-221694r877377_rule
Fix: F-23398r419155_fix
Configure the operating system not to allow an unattended or automatic logon to the system via a graphical user interface. Note: If the system does not have GNOME installed, this requirement is Not Applicable. Add or edit the line for the "AutomaticLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false": [daemon] AutomaticLoginEnable=false
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-010450
- Vuln IDs
- V-221695
- Rule IDs
- SV-221695r877377_rule
Fix: F-23399r419158_fix
Configure the operating system not to allow an unrestricted account to log on to the system via a graphical user interface. Note: If the system does not have GNOME installed, this requirement is Not Applicable. Add or edit the line for the "TimedLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false": [daemon] TimedLoginEnable=false
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-010460
- Vuln IDs
- V-221696
- Rule IDs
- SV-221696r877377_rule
Fix: F-23400r419161_fix
Configure the operating system not to allow users to override environment variables to the SSH daemon. Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for "PermitUserEnvironment" keyword and set the value to "no": PermitUserEnvironment no The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-010470
- Vuln IDs
- V-221697
- Rule IDs
- SV-221697r877377_rule
Fix: F-23401r419164_fix
Configure the operating system not to allow a non-certificate trusted host SSH logon to the system. Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for "HostbasedAuthentication" keyword and set the value to "no": HostbasedAuthentication no The SSH service must be restarted for changes to take effect.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- OL07-00-010481
- Vuln IDs
- V-221699
- Rule IDs
- SV-221699r603260_rule
Fix: F-23403r419170_fix
Configure the operating system to require authentication upon booting into single-user and maintenance modes. Add or modify the "ExecStart" line in "/usr/lib/systemd/system/rescue.service" to include "/usr/sbin/sulogin": ExecStart=-/bin/sh -c "/usr/sbin/sulogin; /usr/bin/systemctl --fail --no-block default"
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- OL07-00-010482
- Vuln IDs
- V-221700
- Rule IDs
- SV-221700r744071_rule
Fix: F-23404r744070_fix
Configure the system to encrypt the boot password for the grub superusers account with the grub2-setpassword command, which creates/overwrites the /boot/grub2/user.cfg file. Generate an encrypted grub2 password for the grub superusers account with the following command: $ sudo grub2-setpassword Enter password: Confirm password:
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- OL07-00-010491
- Vuln IDs
- V-221702
- Rule IDs
- SV-221702r744074_rule
Fix: F-23406r744073_fix
Configure the system to encrypt the boot password for the grub superusers account with the grub2-setpassword command, which creates/overwrites the /boot/efi/EFI/redhat/user.cfg file. Generate an encrypted grub2 password for the grub superusers account with the following command: $ sudo grub2-setpassword Enter password: Confirm password:
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- OL07-00-020000
- Vuln IDs
- V-221704
- Rule IDs
- SV-221704r603260_rule
Fix: F-23408r419185_fix
Configure the operating system to disable non-essential capabilities by removing the rsh-server package from the system with the following command: # yum remove rsh-server
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- OL07-00-020010
- Vuln IDs
- V-221705
- Rule IDs
- SV-221705r603260_rule
Fix: F-23409r419188_fix
Configure the operating system to disable non-essential capabilities by removing the "ypserv" package from the system with the following command: # yum remove ypserv
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-001744
- Version
- OL07-00-020030
- Vuln IDs
- V-221708
- Rule IDs
- SV-221708r902773_rule
Fix: F-36235r902772_fix
Configure the file integrity tool to run automatically on the system at least weekly. The following example output is generic. It will set cron to run AIDE daily, but other file integrity tools may be used: # more /etc/cron.daily/aide #!/bin/bash /usr/sbin/aide --check | /bin/mail -s "$HOSTNAME - Daily AIDE integrity check run" root@example_server_name.mil Note: Per requirement OL07-00-020028, the "mailx" package must be installed on the system to enable email functionality.
- RMF Control
- CM-5
- Severity
- H
- CCI
- CCI-001749
- Version
- OL07-00-020050
- Vuln IDs
- V-221710
- Rule IDs
- SV-221710r877463_rule
Fix: F-23414r462702_fix
Configure the operating system to verify the signature of packages from a repository prior to install by setting the following option in the "/etc/yum.conf" file: gpgcheck=1
- RMF Control
- CM-5
- Severity
- H
- CCI
- CCI-001749
- Version
- OL07-00-020060
- Vuln IDs
- V-221711
- Rule IDs
- SV-221711r877463_rule
Fix: F-23415r462705_fix
Configure the operating system to verify the signature of local packages prior to install by setting the following option in the "/etc/yum.conf" file: localpkg_gpgcheck=1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-020100
- Vuln IDs
- V-221712
- Rule IDs
- SV-221712r853672_rule
Fix: F-36237r602414_fix
Configure the operating system to disable the ability to use the USB Storage kernel module. Create a file under "/etc/modprobe.d" with the following command: # touch /etc/modprobe.d/usb-storage.conf Add the following line to the created file: install usb-storage /bin/true Configure the operating system to disable the ability to use USB mass storage devices. # vi /etc/modprobe.d/blacklist.conf Add or update the line: blacklist usb-storage
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- OL07-00-020101
- Vuln IDs
- V-221713
- Rule IDs
- SV-221713r853673_rule
Fix: F-36238r602417_fix
Configure the operating system to disable the ability to use the DCCP kernel module. Create a file under "/etc/modprobe.d" with the following command: # touch /etc/modprobe.d/dccp.conf Add the following line to the created file: install dccp /bin/true Ensure that the DCCP module is blacklisted: # vi /etc/modprobe.d/blacklist.conf Add or update the line: blacklist dccp
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- OL07-00-020110
- Vuln IDs
- V-221714
- Rule IDs
- SV-221714r603260_rule
Fix: F-23418r419215_fix
Configure the operating system to disable the ability to automount devices. Turn off the automount service with the following commands: # systemctl stop autofs # systemctl disable autofs If "autofs" is required for Network File System (NFS), it must be documented with the ISSO.
- RMF Control
- SI-2
- Severity
- L
- CCI
- CCI-002617
- Version
- OL07-00-020200
- Vuln IDs
- V-221715
- Rule IDs
- SV-221715r853674_rule
Fix: F-23419r419218_fix
Configure the operating system to remove all software components after updated versions have been installed. Set the "clean_requirements_on_remove" option to "1" in the "/etc/yum.conf" file: clean_requirements_on_remove=1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-020240
- Vuln IDs
- V-221718
- Rule IDs
- SV-221718r603260_rule
Fix: F-23422r419227_fix
Configure the operating system to define default permissions for all authenticated users in such a way that the user can only read and modify their own files. Add or edit the line for the "UMASK" parameter in "/etc/login.defs" file to "077": UMASK 077
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-020250
- Vuln IDs
- V-221719
- Rule IDs
- SV-221719r603260_rule
Fix: F-23423r419230_fix
Upgrade to a supported version of the operating system.
- RMF Control
- IA-2
- Severity
- L
- CCI
- CCI-000764
- Version
- OL07-00-020300
- Vuln IDs
- V-221722
- Rule IDs
- SV-221722r603260_rule
Fix: F-23426r419239_fix
Configure the system to define all GIDs found in the "/etc/passwd" file by modifying the "/etc/group" file to add any non-existent group referenced in the "/etc/passwd" file, or change the GIDs referenced in the "/etc/passwd" file to a group that exists in "/etc/group".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-020310
- Vuln IDs
- V-221723
- Rule IDs
- SV-221723r603260_rule
Fix: F-23427r419242_fix
Change the UID of any account on the system, other than root, that has a UID of "0". If the account is associated with system commands or applications, the UID should be changed to one greater than "0" but less than "1000". Otherwise, assign a UID of greater than "1000" that has not already been assigned.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-020610
- Vuln IDs
- V-221727
- Rule IDs
- SV-221727r603260_rule
Fix: F-23431r419254_fix
Configure the operating system to assign home directories to all new local interactive users by setting the "CREATE_HOME" parameter in "/etc/login.defs" to "yes" as follows. CREATE_HOME yes
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-020620
- Vuln IDs
- V-221728
- Rule IDs
- SV-221728r603789_rule
Fix: F-36241r602426_fix
Create home directories to all local interactive users that currently do not have a home directory assigned. Use the following commands to create the user home directory assigned in "/etc/ passwd": Note: The example will be for the user smithj, who has a home directory of "/home/smithj", a UID of "smithj", and a Group Identifier (GID) of "users" assigned in "/etc/passwd". # mkdir /home/smithj # chown smithj /home/smithj # chgrp users /home/smithj # chmod 0750 /home/smithj
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-021020
- Vuln IDs
- V-221743
- Rule IDs
- SV-221743r603260_rule
Fix: F-23447r419302_fix
Configure the "/etc/fstab" to use the "nosuid" option on file systems that are being imported via NFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-021021
- Vuln IDs
- V-221744
- Rule IDs
- SV-221744r603260_rule
Fix: F-23448r419305_fix
Configure the "/etc/fstab" to use the "noexec" option on file systems that are being imported via NFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-021030
- Vuln IDs
- V-221748
- Rule IDs
- SV-221748r744080_rule
Fix: F-36246r602441_fix
All directories in local partitions which are world-writable should be group-owned by root or another system account. If any world-writable directories are not group-owned by a system account, this should be investigated. Following this, the directories should be deleted or assigned to an appropriate group.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-021110
- Vuln IDs
- V-221751
- Rule IDs
- SV-221751r603260_rule
Fix: F-23455r419326_fix
Set the owner on the "/etc/cron.allow" file to root with the following command: # chown root /etc/cron.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-021120
- Vuln IDs
- V-221752
- Rule IDs
- SV-221752r603260_rule
Fix: F-23456r419329_fix
Set the group owner on the "/etc/cron.allow" file to root with the following command: # chgrp root /etc/cron.allow
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL07-00-021310
- Vuln IDs
- V-221754
- Rule IDs
- SV-221754r603803_rule
Fix: F-23458r419335_fix
Migrate the "/home" directory onto a separate file system/partition.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL07-00-021320
- Vuln IDs
- V-221755
- Rule IDs
- SV-221755r603260_rule
Fix: F-23459r419338_fix
Migrate the "/var" path onto a separate file system.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL07-00-021340
- Vuln IDs
- V-221757
- Rule IDs
- SV-221757r603260_rule
Fix: F-36247r602444_fix
Start the "tmp.mount" service with the following command: # systemctl enable tmp.mount OR Edit the "/etc/fstab" file and ensure the "/tmp" directory is defined in the fstab with a device and mount point.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- OL07-00-021350
- Vuln IDs
- V-221758
- Rule IDs
- SV-221758r877398_rule
Fix: F-36248r602447_fix
Configure the operating system to implement DoD-approved encryption by installing the dracut-fips package. To enable strict FIPS compliance, the fips=1 kernel option needs to be added to the kernel command line during system installation so key generation is done with FIPS-approved algorithms and continuous monitoring tests in place. Configure the operating system to implement DoD-approved encryption by following the steps below: The fips=1 kernel option needs to be added to the kernel command line during system installation so that key generation is done with FIPS-approved algorithms and continuous monitoring tests in place. Users should also ensure that the system has plenty of entropy during the installation process by moving the mouse around, or if no mouse is available, ensuring that many keystrokes are typed. The recommended amount of keystrokes is 256 and more. Less than 256 keystrokes may generate a non-unique key. Install the dracut-fips package with the following command: # yum install dracut-fips Recreate the "initramfs" file with the following command: Note: This command will overwrite the existing "initramfs" file. # dracut -f Modify the kernel command line of the current kernel in the "grub.cfg" file by adding the following option to the GRUB_CMDLINE_LINUX key in the "/etc/default/grub" file and then rebuild the "grub.cfg" file: fips=1 Changes to "/etc/default/grub" require rebuilding the "grub.cfg" file as follows: On BIOS-based machines, use the following command: # grub2-mkconfig -o /boot/grub2/grub.cfg On UEFI-based machines, use the following command: # grub2-mkconfig -o /boot/efi/EFI/redhat/grub.cfg If /boot or /boot/efi reside on separate partitions, the kernel parameter boot=<partition of /boot or /boot/efi> must be added to the kernel command line. You can identify a partition by running the df /boot or df /boot/efi command: # df /boot Filesystem 1K-blocks Used Available Use% Mounted on /dev/sda1 495844 53780 416464 12% /boot To ensure the "boot=" configuration option will work even if device naming changes occur between boots, identify the universally unique identifier (UUID) of the partition with the following command: # blkid /dev/sda1 /dev/sda1: UUID="05c000f1-a213-759e-c7a2-f11b7424c797" TYPE="ext4" For the example above, append the following string to the kernel command line: boot=UUID=05c000f1-a213-759e-c7a2-f11b7424c797 If the file /etc/system-fips does not exists, recreate it: # touch /etc/ system-fips Reboot the system for the changes to take effect.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- OL07-00-021710
- Vuln IDs
- V-221763
- Rule IDs
- SV-221763r603260_rule
Fix: F-23467r419362_fix
Configure the operating system to disable non-essential capabilities by removing the telnet-server package from the system with the following command: # yum remove telnet-server
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- OL07-00-030000
- Vuln IDs
- V-221764
- Rule IDs
- SV-221764r860865_rule
Fix: F-36250r602453_fix
Configure the operating system to produce audit records containing information to establish when (date and time) the events occurred. Enable the auditd service with the following command: # systemctl start auditd.service
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- OL07-00-030010
- Vuln IDs
- V-221765
- Rule IDs
- SV-221765r880594_rule
Fix: F-36251r880593_fix
Configure the operating system to shut down in the event of an audit processing failure. Add or correct the option to shut down the operating system with the following command: # auditctl -f 2 Edit the "/etc/audit/rules.d/audit.rules" file and add the following line: -f 2 If availability has been determined to be more important, and this decision is documented with the ISSO, configure the operating system to notify system administration staff and ISSO staff in the event of an audit processing failure with the following command: # auditctl -f 1 Edit the "/etc/audit/rules.d/audit.rules" file and add the following line: -f 1 Kernel log monitoring must also be configured to properly alert designated staff. The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030201
- Vuln IDs
- V-221767
- Rule IDs
- SV-221767r877390_rule
Fix: F-36252r858453_fix
Edit the /etc/audisp/plugins.d/au-remote.conf file and add or update the following values: active = yes direction = out path = /sbin/audisp-remote type = always The audit daemon must be restarted for changes to take effect: # service auditd restart
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030210
- Vuln IDs
- V-221768
- Rule IDs
- SV-221768r877390_rule
Fix: F-36253r602462_fix
Edit the /etc/audisp/audispd.conf file and add or update the "overflow_action" option: overflow_action = syslog The audit daemon must be restarted for changes to take effect: # service auditd restart
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030211
- Vuln IDs
- V-221769
- Rule IDs
- SV-221769r877390_rule
Fix: F-36254r602465_fix
Edit the /etc/audisp/audispd.conf file and add or update the "name_format" option: name_format = hostname The audit daemon must be restarted for changes to take effect: # service auditd restart
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030300
- Vuln IDs
- V-221770
- Rule IDs
- SV-221770r877390_rule
Fix: F-23474r419383_fix
Configure the operating system to off-load audit records onto a different system or media from the system being audited. Set the remote server option in "/etc/audisp/audisp-remote.conf" with the IP address of the log aggregation server.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030310
- Vuln IDs
- V-221771
- Rule IDs
- SV-221771r877390_rule
Fix: F-23475r419386_fix
Configure the operating system to encrypt the transfer of off-loaded audit records onto a different system or media from the system being audited. Uncomment the "enable_krb5" option in "/etc/audisp/audisp-remote.conf" and set it with the following line: enable_krb5 = yes
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030320
- Vuln IDs
- V-221772
- Rule IDs
- SV-221772r877390_rule
Fix: F-36255r602468_fix
Configure the action the operating system takes if the disk the audit records are written to becomes full. Uncomment or edit the "disk_full_action" option in "/etc/audisp/audisp-remote.conf" and set it to "syslog", "single", or "halt", such as the following line: disk_full_action = single
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL07-00-030321
- Vuln IDs
- V-221773
- Rule IDs
- SV-221773r877390_rule
Fix: F-36256r602471_fix
Configure the action the operating system takes if there is an error sending audit records to a remote system. Uncomment the "network_failure_action" option in "/etc/audisp/audisp-remote.conf" and set it to "syslog", "single", or "halt". network_failure_action = syslog
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- OL07-00-030340
- Vuln IDs
- V-221775
- Rule IDs
- SV-221775r877389_rule
Fix: F-23479r419398_fix
Configure the operating system to immediately notify the SA and ISSO (at a minimum) when the threshold for the repository maximum audit record storage capacity is reached. Uncomment or edit the "space_left_action" keyword in "/etc/audit/auditd.conf" and set it to "email". space_left_action = email
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- OL07-00-030350
- Vuln IDs
- V-221776
- Rule IDs
- SV-221776r877389_rule
Fix: F-23480r419401_fix
Configure the operating system to immediately notify the SA and ISSO (at a minimum) when the threshold for the repository maximum audit record storage capacity is reached. Uncomment or edit the "action_mail_acct" keyword in "/etc/audit/auditd.conf" and set it to root and any other accounts associated with security personnel. action_mail_acct = root
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- OL07-00-030360
- Vuln IDs
- V-221777
- Rule IDs
- SV-221777r853691_rule
Fix: F-36258r602477_fix
Configure the operating system to audit the execution of privileged functions. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k setuid -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k setuid -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k setgid -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k setgid The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- OL07-00-030370
- Vuln IDs
- V-221778
- Rule IDs
- SV-221778r810481_rule
Fix: F-36259r809146_fix
Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S chown,fchown,fchownat,lchown -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S chown,fchown,fchownat,lchown -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030410
- Vuln IDs
- V-221782
- Rule IDs
- SV-221782r810497_rule
Fix: F-36263r810496_fix
Configure the operating system to generate audit records upon successful/unsuccessful attempts to use the "chmod", "fchmod", and "fchmodat" syscalls. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S chmod,fchmod,fchmodat -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S chmod,fchmod,fchmodat -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030440
- Vuln IDs
- V-221785
- Rule IDs
- SV-221785r810486_rule
Fix: F-36266r810485_fix
Configure the operating system to generate audit records upon successful/unsuccessful attempts to use the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" syscalls. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030510
- Vuln IDs
- V-221792
- Rule IDs
- SV-221792r853694_rule
Fix: F-36273r853693_fix
Configure the operating system to generate audit records upon successful/unsuccessful attempts to use the "creat", "open", "openat", "open_by_handle_at", "truncate", and "ftruncate" syscalls. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b32 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030560
- Vuln IDs
- V-221797
- Rule IDs
- SV-221797r860870_rule
Fix: F-23501r860869_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "semanage" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/semanage -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002884
- Version
- OL07-00-030570
- Vuln IDs
- V-221798
- Rule IDs
- SV-221798r860873_rule
Fix: F-23502r860872_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "setsebool" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/setsebool -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002884
- Version
- OL07-00-030580
- Vuln IDs
- V-221799
- Rule IDs
- SV-221799r860876_rule
Fix: F-23503r860875_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "chcon" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/chcon -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002884
- Version
- OL07-00-030590
- Vuln IDs
- V-221800
- Rule IDs
- SV-221800r860879_rule
Fix: F-23504r860878_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "setfiles" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/setfiles -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030610
- Vuln IDs
- V-221801
- Rule IDs
- SV-221801r853707_rule
Fix: F-23505r419476_fix
Configure the operating system to generate audit records when unsuccessful account access events occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /var/run/faillock -p wa -k logins The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030620
- Vuln IDs
- V-221802
- Rule IDs
- SV-221802r853708_rule
Fix: F-23506r419479_fix
Configure the operating system to generate audit records when successful account access events occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /var/log/lastlog -p wa -k logins The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030630
- Vuln IDs
- V-221803
- Rule IDs
- SV-221803r833049_rule
Fix: F-23507r833048_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "passwd" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/passwd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030640
- Vuln IDs
- V-221804
- Rule IDs
- SV-221804r833052_rule
Fix: F-23508r833051_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "unix_chkpwd" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030650
- Vuln IDs
- V-221805
- Rule IDs
- SV-221805r833055_rule
Fix: F-23509r833054_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "gpasswd" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030660
- Vuln IDs
- V-221806
- Rule IDs
- SV-221806r833058_rule
Fix: F-23510r833057_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "chage" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/chage -F perm=x -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030670
- Vuln IDs
- V-221807
- Rule IDs
- SV-221807r833061_rule
Fix: F-23511r833060_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "userhelper" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/userhelper -F perm=x -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL07-00-030680
- Vuln IDs
- V-221808
- Rule IDs
- SV-221808r833064_rule
Fix: F-23512r833063_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "su" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/su -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL07-00-030690
- Vuln IDs
- V-221809
- Rule IDs
- SV-221809r833067_rule
Fix: F-23513r833066_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "sudo" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/sudo -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL07-00-030700
- Vuln IDs
- V-221810
- Rule IDs
- SV-221810r603260_rule
Fix: F-23514r419503_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to access the "/etc/sudoers" file and files in the "/etc/sudoers.d/" directory. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /etc/sudoers -p wa -k privileged-actions -w /etc/sudoers.d/ -p wa -k privileged-actions The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL07-00-030710
- Vuln IDs
- V-221811
- Rule IDs
- SV-221811r833070_rule
Fix: F-23515r833069_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "newgrp" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/newgrp -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL07-00-030720
- Vuln IDs
- V-221812
- Rule IDs
- SV-221812r833073_rule
Fix: F-23516r833072_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "chsh" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/chsh -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030740
- Vuln IDs
- V-221813
- Rule IDs
- SV-221813r860882_rule
Fix: F-36278r860881_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "mount" command and syscall occur. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S mount -F auid>=1000 -F auid!=unset -k privileged-mount -a always,exit -F arch=b64 -S mount -F auid>=1000 -F auid!=unset -k privileged-mount -a always,exit -F path=/usr/bin/mount -F perm=x -F auid>=1000 -F auid!=unset -k privileged-mount The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030750
- Vuln IDs
- V-221814
- Rule IDs
- SV-221814r833079_rule
Fix: F-23518r833078_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "umount" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/umount -F perm=x -F auid>=1000 -F auid!=unset -k privileged-mount The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030760
- Vuln IDs
- V-221815
- Rule IDs
- SV-221815r833082_rule
Fix: F-23519r833081_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "postdrop" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/postdrop -F perm=x -F auid>=1000 -F auid!=unset -k privileged-postfix The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030770
- Vuln IDs
- V-221816
- Rule IDs
- SV-221816r833085_rule
Fix: F-23520r833084_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "postqueue" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/postqueue -F perm=x -F auid>=1000 -F auid!=unset -k privileged-postfix The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030780
- Vuln IDs
- V-221817
- Rule IDs
- SV-221817r833088_rule
Fix: F-23521r833087_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "ssh-keysign" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/libexec/openssh/ssh-keysign -F perm=x -F auid>=1000 -F auid!=unset -k privileged-ssh The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL07-00-030800
- Vuln IDs
- V-221818
- Rule IDs
- SV-221818r833091_rule
Fix: F-23522r833090_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "crontab" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/crontab -F perm=x -F auid>=1000 -F auid!=unset -k privileged-cron The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030810
- Vuln IDs
- V-221819
- Rule IDs
- SV-221819r833094_rule
Fix: F-23523r833093_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "pam_timestamp_check" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/pam_timestamp_check -F perm=x -F auid>=1000 -F auid!=unset -k privileged-pam The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030819
- Vuln IDs
- V-221820
- Rule IDs
- SV-221820r833097_rule
Fix: F-36279r833096_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "create_module" syscall occur. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S create_module -F auid>=1000 -F auid!=unset -k module-change -a always,exit -F arch=b64 -S create_module -F auid>=1000 -F auid!=unset -k module-change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030820
- Vuln IDs
- V-221821
- Rule IDs
- SV-221821r833100_rule
Fix: F-23525r833099_fix
Configure the operating system to generate audit records upon successful/unsuccessful attempts to use the "init_module" and "finit_module" syscalls. Add or update the following rules in "/etc/audit/rules.d/audit.rules": Note: The rules are duplicated to cover both 32-bit and 64-bit architectures. Only the lines appropriate for the system architecture must be configured. -a always,exit -F arch=b32 -S init_module,finit_module -F auid>=1000 -F auid!=unset -k modulechange -a always,exit -F arch=b64 -S init_module,finit_module -F auid>=1000 -F auid!=unset -k modulechange The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030830
- Vuln IDs
- V-221823
- Rule IDs
- SV-221823r833103_rule
Fix: F-23527r833102_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "delete_module" syscall occur. Add or update the following rules in "/etc/audit/rules.d/audit.rules": Note: The rules are duplicated to cover both 32-bit and 64-bit architectures. Only the lines appropriate for the system architecture must be configured. -a always,exit -F arch=b32 -S delete_module -F auid>=1000 -F auid!=unset -k module-change -a always,exit -F arch=b64 -S delete_module -F auid>=1000 -F auid!=unset -k module-change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030840
- Vuln IDs
- V-221824
- Rule IDs
- SV-221824r858472_rule
Fix: F-23528r858471_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "kmod" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/kmod -F perm=x -F auid>=1000 -F auid!=unset -k modules The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL07-00-030870
- Vuln IDs
- V-221825
- Rule IDs
- SV-221825r853712_rule
Fix: F-23529r419548_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/passwd". Add or update the following rule "/etc/audit/rules.d/audit.rules": -w /etc/passwd -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL07-00-030871
- Vuln IDs
- V-221826
- Rule IDs
- SV-221826r603260_rule
Fix: F-23530r419551_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/group". Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /etc/group -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL07-00-030872
- Vuln IDs
- V-221827
- Rule IDs
- SV-221827r603260_rule
Fix: F-23531r419554_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/gshadow". Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /etc/gshadow -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL07-00-030873
- Vuln IDs
- V-221828
- Rule IDs
- SV-221828r603260_rule
Fix: F-23532r419557_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow. Add or update the following file system rule in "/etc/audit/rules.d/audit.rules": -w /etc/shadow -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL07-00-030874
- Vuln IDs
- V-221829
- Rule IDs
- SV-221829r744089_rule
Fix: F-23533r744088_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd. Add or update the following file system rule in "/etc/audit/rules.d/audit.rules": -w /etc/security/opasswd -p wa -k identity The audit daemon must be restarted for the changes to take effect: # systemctl restart auditd
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- OL07-00-030910
- Vuln IDs
- V-221833
- Rule IDs
- SV-221833r853715_rule
Fix: F-36284r853714_fix
Configure the operating system to generate audit records upon successful/unsuccessful attempts to use the "unlink", "unlinkat", "rename", "renameat", and "rmdir" syscalls. Add the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S unlink,unlinkat,rename,renameat,rmdir -F auid>=1000 -F auid!=unset -k delete -a always,exit -F arch=b64 -S unlink,unlinkat,rename,renameat,rmdir -F auid>=1000 -F auid!=unset -k delete The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- OL07-00-040000
- Vuln IDs
- V-221838
- Rule IDs
- SV-221838r877399_rule
Fix: F-36286r602561_fix
Configure the operating system to limit the number of concurrent sessions to "10" for all accounts and/or account types. Add the following line to the top of the /etc/security/limits.conf or in a ".conf" file defined in /etc/security/limits.d/ : * hard maxlogins 10
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- OL07-00-040110
- Vuln IDs
- V-221840
- Rule IDs
- SV-221840r877398_rule
Fix: F-23544r622270_fix
Configure SSH to use FIPS 140-2 approved cryptographic algorithms. Add the following line (or modify the line to have the required value) to the "/etc/ssh/sshd_config" file (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor). Ciphers aes256-ctr,aes192-ctr,aes128-ctr The SSH service must be restarted for changes to take effect.
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- OL07-00-040201
- Vuln IDs
- V-221846
- Rule IDs
- SV-221846r880630_rule
Fix: F-23550r880629_fix
Configure the operating system implement virtual address space randomization. Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a config file in the /etc/sysctl.d/ directory (or modify the line to have the required value): kernel.randomize_va_space = 2 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- OL07-00-040300
- Vuln IDs
- V-221847
- Rule IDs
- SV-221847r916422_rule
Fix: F-23551r419614_fix
Install SSH packages onto the host with the following commands: # yum install openssh-server.x86_64
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- OL07-00-040320
- Vuln IDs
- V-221849
- Rule IDs
- SV-221849r917857_rule
Fix: F-23553r917856_fix
Note: This setting must be applied in conjunction with OL07-00-040340 to function correctly. Configure the SSH server to terminate a user session automatically after the SSH client has become unresponsive. Add the following line (or modify the line to have the required value) to the "/etc/ssh/sshd_config" file (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): ClientAliveInterval 600 The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040330
- Vuln IDs
- V-221850
- Rule IDs
- SV-221850r603260_rule
Fix: F-23554r419623_fix
Configure the SSH daemon to not allow authentication using RSA rhosts authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "no": RhostsRSAAuthentication no The SSH service must be restarted for changes to take effect.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- OL07-00-040340
- Vuln IDs
- V-221851
- Rule IDs
- SV-221851r917860_rule
Fix: F-23555r917859_fix
Note: This setting must be applied in conjunction with OL07-00-040320 to function correctly. Configure the SSH server to terminate a user session automatically after the SSH client has become unresponsive. Add the following line (or modify the line to have the required value) to the "/etc/ssh/sshd_config" file (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): ClientAliveCountMax 0 The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040350
- Vuln IDs
- V-221852
- Rule IDs
- SV-221852r603260_rule
Fix: F-23556r419629_fix
Configure the SSH daemon to not allow authentication using known hosts authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "yes": IgnoreRhosts yes
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000052
- Version
- OL07-00-040360
- Vuln IDs
- V-221853
- Rule IDs
- SV-221853r858451_rule
Fix: F-23557r419632_fix
Configure SSH to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/sshd" or in the "sshd_config" file used by the system ("/etc/ssh/sshd_config" will be used in the example) (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor). Modify the "PrintLastLog" line in "/etc/ssh/sshd_config" to match the following: PrintLastLog yes The SSH service must be restarted for changes to "sshd_config" to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040370
- Vuln IDs
- V-221854
- Rule IDs
- SV-221854r603260_rule
Fix: F-23558r419635_fix
Configure SSH to stop users from logging on remotely as the root user. Edit the appropriate "/etc/ssh/sshd_config" file to uncomment or add the line for the "PermitRootLogin" keyword and set its value to "no" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): PermitRootLogin no The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040380
- Vuln IDs
- V-221855
- Rule IDs
- SV-221855r603260_rule
Fix: F-23559r419638_fix
Configure the SSH daemon to not allow authentication using known hosts authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "yes": IgnoreUserKnownHosts yes The SSH service must be restarted for changes to take effect.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- OL07-00-040390
- Vuln IDs
- V-221856
- Rule IDs
- SV-221856r877396_rule
Fix: F-23560r419641_fix
Remove all Protocol lines that reference version "1" in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor). The "Protocol" line must be as follows: Protocol 2 The SSH service must be restarted for changes to take effect.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- OL07-00-040400
- Vuln IDs
- V-221857
- Rule IDs
- SV-221857r877394_rule
Fix: F-23561r622273_fix
Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "MACs" keyword and set its value to "hmac-sha2-512" and/or "hmac-sha2-256" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): MACs hmac-sha2-512,hmac-sha2-256 The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040410
- Vuln IDs
- V-221858
- Rule IDs
- SV-221858r603260_rule
Fix: F-23562r419647_fix
Note: SSH public key files may be found in other directories on the system depending on the installation. Change the mode of public host key files under "/etc/ssh" to "0644" with the following command: # chmod 0644 /etc/ssh/*.key.pub
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040420
- Vuln IDs
- V-221859
- Rule IDs
- SV-221859r880579_rule
Fix: F-23563r880578_fix
Configure the mode of SSH private host key files under "/etc/ssh" to "0640" with the following command: # chmod 0640 /path/to/file/ssh_host*key
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- OL07-00-040430
- Vuln IDs
- V-221860
- Rule IDs
- SV-221860r853722_rule
Fix: F-23564r419653_fix
Uncomment the "GSSAPIAuthentication" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to "no": GSSAPIAuthentication no The SSH service must be restarted for changes to take effect. If GSSAPI authentication is required, it must be documented, to include the location of the configuration file, with the ISSO.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- OL07-00-040440
- Vuln IDs
- V-221861
- Rule IDs
- SV-221861r853723_rule
Fix: F-23565r419656_fix
Uncomment the "KerberosAuthentication" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to "no": KerberosAuthentication no The SSH service must be restarted for changes to take effect. If Kerberos authentication is required, it must be documented, to include the location of the configuration file, with the ISSO.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040450
- Vuln IDs
- V-221862
- Rule IDs
- SV-221862r603260_rule
Fix: F-23566r419659_fix
Uncomment the "StrictModes" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to "yes": StrictModes yes The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040460
- Vuln IDs
- V-221863
- Rule IDs
- SV-221863r603260_rule
Fix: F-23567r419662_fix
Uncomment the "UsePrivilegeSeparation" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to "sandbox" or "yes": UsePrivilegeSeparation sandbox The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040470
- Vuln IDs
- V-221864
- Rule IDs
- SV-221864r880591_rule
Fix: F-23568r880590_fix
Uncomment the "Compression" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) on the system and set the value to "delayed" or "no": Compression no The SSH service must be restarted for changes to take effect.
- RMF Control
- AC-9
- Severity
- L
- CCI
- CCI-000052
- Version
- OL07-00-040530
- Vuln IDs
- V-221869
- Rule IDs
- SV-221869r858452_rule
Fix: F-23573r419680_fix
Configure the operating system to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/postlogin". Add the following line to the top of "/etc/pam.d/postlogin": session required pam_lastlog.so showfailed
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-040540
- Vuln IDs
- V-221870
- Rule IDs
- SV-221870r603260_rule
Fix: F-23574r419683_fix
Remove any found ".shosts" files from the system. # rm /[path]/[to]/[file]/.shosts
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-040550
- Vuln IDs
- V-221871
- Rule IDs
- SV-221871r603260_rule
Fix: F-23575r419686_fix
Remove any found "shosts.equiv" files from the system. # rm /[path]/[to]/[file]/shosts.equiv
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL07-00-040600
- Vuln IDs
- V-221872
- Rule IDs
- SV-221872r603260_rule
Fix: F-36292r602579_fix
Configure the operating system to use two or more name servers for DNS resolution. Edit the "/etc/resolv.conf" file to uncomment or add the two or more "nameserver" option lines with the IP address of local authoritative name servers. If local host resolution is being performed, the "/etc/resolv.conf" file must be empty. An empty "/etc/resolv.conf" file can be created as follows: # echo -n > /etc/resolv.conf And then make the file immutable with the following command: # chattr +i /etc/resolv.conf If the "/etc/resolv.conf" file must be mutable, the required configuration must be documented with the Information System Security Officer (ISSO) and the file must be verified by the system file integrity tool.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040610
- Vuln IDs
- V-221873
- Rule IDs
- SV-221873r880636_rule
Fix: F-23577r880635_fix
Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.all.accept_source_route = 0 Issue the following command to make the changes take effect: # sysctl -system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040620
- Vuln IDs
- V-221876
- Rule IDs
- SV-221876r880645_rule
Fix: F-23580r880644_fix
Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.default.accept_source_route = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040630
- Vuln IDs
- V-221877
- Rule IDs
- SV-221877r880648_rule
Fix: F-23581r880647_fix
Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.icmp_echo_ignore_broadcasts = 1 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040640
- Vuln IDs
- V-221878
- Rule IDs
- SV-221878r880651_rule
Fix: F-23582r880650_fix
Set the system to not accept IPv4 ICMP redirect messages by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.default.accept_redirects = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040641
- Vuln IDs
- V-221879
- Rule IDs
- SV-221879r880654_rule
Fix: F-23583r880653_fix
Set the system to ignore IPv4 ICMP redirect messages by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.all.accept_redirects = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040650
- Vuln IDs
- V-221880
- Rule IDs
- SV-221880r880657_rule
Fix: F-23584r880656_fix
Configure the system not to allow interfaces to perform IPv4 ICMP redirects by default. Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.default.send_redirects = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040660
- Vuln IDs
- V-221881
- Rule IDs
- SV-221881r880660_rule
Fix: F-23585r880659_fix
Configure the system not to allow interfaces to perform IPv4 ICMP redirects. Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.all.send_redirects = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-040690
- Vuln IDs
- V-221884
- Rule IDs
- SV-221884r603260_rule
Fix: F-23588r419725_fix
Document the "vsftpd" package with the ISSO as an operational requirement or remove it from the system with the following command: # yum remove vsftpd
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-040700
- Vuln IDs
- V-221885
- Rule IDs
- SV-221885r603260_rule
Fix: F-23589r419728_fix
Remove the TFTP package from the system with the following command: # yum remove tftp-server
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040710
- Vuln IDs
- V-221886
- Rule IDs
- SV-221886r603812_rule
Fix: F-23590r622276_fix
Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "X11Forwarding" keyword and set its value to "no" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): X11Forwarding no The SSH service must be restarted for changes to take effect: # systemctl restart sshd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040730
- Vuln IDs
- V-221888
- Rule IDs
- SV-221888r646961_rule
Fix: F-36293r646960_fix
Document the requirement for a graphical user interface with the ISSO or reinstall the operating system without the graphical user interface. If reinstallation is not feasible, then continue with the following procedure: Open an SSH session and enter the following commands: $ sudo systemctl set-default multi-user.target $ sudo yum remove xorg-x11-server-Xorg xorg-x11-server-common xorg-x11-server-utils A reboot is required for the changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040740
- Vuln IDs
- V-221889
- Rule IDs
- SV-221889r880663_rule
Fix: F-23593r880662_fix
Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.ip_forward = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL07-00-040800
- Vuln IDs
- V-221891
- Rule IDs
- SV-221891r603260_rule
Fix: F-23595r419746_fix
If the "/etc/snmp/snmpd.conf" file exists, modify any lines that contain a community string value of "public" or "private" to another string value.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-040830
- Vuln IDs
- V-221894
- Rule IDs
- SV-221894r880666_rule
Fix: F-23598r880665_fix
Set the system to the required kernel parameter, if IPv6 is enabled, by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv6.conf.all.accept_source_route = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- OL07-00-041001
- Vuln IDs
- V-221895
- Rule IDs
- SV-221895r853726_rule
Fix: F-36294r602585_fix
Configure the operating system to implement multifactor authentication by installing the required packages. Install the "pam_pkcs11" package with the following command: # yum install pam_pkcs11
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- OL07-00-041002
- Vuln IDs
- V-221896
- Rule IDs
- SV-221896r853727_rule
Fix: F-23600r419761_fix
Configure the operating system to implement multifactor authentication for remote access to privileged accounts via pluggable authentication modules (PAM). Modify all of the services lines in "/etc/sssd/sssd.conf" or in configuration files found under "/etc/sssd/conf.d" to include pam.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- OL07-00-041003
- Vuln IDs
- V-221897
- Rule IDs
- SV-221897r853728_rule
Fix: F-23601r419764_fix
Configure the operating system to do certificate status checking for PKI authentication. Modify all of the "cert_policy" lines in "/etc/pam_pkcs11/pam_pkcs11.conf" to include "ocsp_on".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL07-00-010341
- Vuln IDs
- V-237627
- Rule IDs
- SV-237627r646964_rule
Fix: F-40809r646963_fix
Remove the following entries from the sudoers file: ALL ALL=(ALL) ALL ALL ALL=(ALL:ALL) ALL
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002227
- Version
- OL07-00-010342
- Vuln IDs
- V-237628
- Rule IDs
- SV-237628r880588_rule
Fix: F-40810r880587_fix
Define the following in the Defaults section of the /etc/sudoers file or a configuration file in the /etc/sudoers.d/ directory: Defaults !targetpw Defaults !rootpw Defaults !runaspw Remove any configurations that conflict with the above from the following locations: /etc/sudoers /etc/sudoers.d/
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- OL07-00-010343
- Vuln IDs
- V-237629
- Rule IDs
- SV-237629r860887_rule
Fix: F-40811r858458_fix
Configure the "sudo" command to require re-authentication. Edit the /etc/sudoers file: $ sudo visudo Add or modify the following line: Defaults timestamp_timeout=[value] Note: The "[value]" must be a number that is greater than or equal to "0". Remove any duplicate or conflicting lines from /etc/sudoers and /etc/sudoers.d/ files.