Oracle Linux 8 STIG SCAP Benchmark
Open a previous version of this SCAP benchmark.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030180
- Vuln IDs
- V-248519
- Rule IDs
- SV-248519r1015024_rule
Fix: F-51907r779122_fix
Configure the audit service to produce audit records containing the information needed to establish when (date and time) an event occurred. Install the audit service (if the audit service is not already installed) with the following command: $ sudo yum install audit
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030181
- Vuln IDs
- V-248520
- Rule IDs
- SV-248520r1015025_rule
Fix: F-51908r779125_fix
Configure the audit service to produce audit records containing the information needed to establish when (date and time) an event occurred with the following commands: $ sudo systemctl enable auditd.service $ sudo systemctl start auditd.service
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-010000
- Vuln IDs
- V-248521
- Rule IDs
- SV-248521r991589_rule
Fix: F-51909r779128_fix
Upgrade to a supported version of the operating system.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- OL08-00-010020
- Vuln IDs
- V-248524
- Rule IDs
- SV-248524r958408_rule
Fix: F-51912r928550_fix
Configure the operating system to implement DOD-approved encryption by following the steps below: To enable strict FIPS compliance, the fips=1 kernel option must be added to the kernel boot parameters during system installation so key generation is done with FIPS-approved algorithms and continuous monitoring tests in place. Enable FIPS mode after installation (not strict FIPS-compliant) with the following command: $ sudo fips-mode-setup --enable Reboot the system for the changes to take effect.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- OL08-00-010049
- Vuln IDs
- V-248527
- Rule IDs
- SV-248527r958390_rule
Fix: F-51915r779146_fix
Configure the operating system to display a banner before granting access to the system. Note: If the system does not have a graphical user interface installed, this requirement is Not Applicable. Create a database to contain the system-wide graphical user logon settings (if it does not already exist) with the following command: $ sudo touch /etc/dconf/db/local.d/01-banner-message Add the following lines to the [org/gnome/login-screen] section of the "/etc/dconf/db/local.d/01-banner-message": [org/gnome/login-screen] banner-message-enable=true Run the following command to update the database: $ sudo dconf update
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- OL08-00-010070
- Vuln IDs
- V-248530
- Rule IDs
- SV-248530r958406_rule
Fix: F-51918r779155_fix
Configure OL 8 to monitor all remote access methods by installing rsyslog with the following command: $ sudo yum install rsyslog Add or update the following lines to the "/etc/rsyslog.conf" file: auth.*;authpriv.*;daemon.* /var/log/secure The "rsyslog" service must be restarted for the changes to take effect. To restart the "rsyslog" service, run the following command: $ sudo systemctl restart rsyslog.service
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- OL08-00-010110
- Vuln IDs
- V-248533
- Rule IDs
- SV-248533r1015028_rule
Fix: F-51921r986325_fix
Configure OL 8 to encrypt all stored passwords. Edit/modify the following line in the "/etc/login.defs" file and set "[ENCRYPT_METHOD]" to SHA512: ENCRYPT_METHOD SHA512
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- OL08-00-010120
- Vuln IDs
- V-248534
- Rule IDs
- SV-248534r1015029_rule
Fix: F-51922r779167_fix
Lock all interactive user accounts not using SHA-512 hashing until the passwords can be regenerated with SHA-512.
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- OL08-00-010130
- Vuln IDs
- V-248535
- Rule IDs
- SV-248535r1044786_rule
Fix: F-51923r1044785_fix
Configure OL 8 to encrypt all stored passwords with a strong cryptographic hash. Edit/modify the following line in the "/etc/login.defs" file and set "SHA_CRYPT_MIN_ROUNDS" to a value no lower than "100000": SHA_CRYPT_MIN_ROUNDS 100000
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- OL08-00-010140
- Vuln IDs
- V-248537
- Rule IDs
- SV-248537r958472_rule
Fix: F-51925r779176_fix
Configure the system to require an encrypted grub bootloader password for the grub superusers account with the grub2-setpassword command, which creates/overwrites the "/boot/efi/EFI/redhat/user.cfg" file. Generate an encrypted grub2 password for the grub superusers account with the following command: $ sudo grub2-setpassword Enter password: Confirm password:
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- OL08-00-010150
- Vuln IDs
- V-248540
- Rule IDs
- SV-248540r958472_rule
Fix: F-51928r779185_fix
Configure the system to require a grub bootloader password for the grub superusers account with the grub2-setpassword command, which creates/overwrites the "/boot/grub2/user.cfg" file. Generate an encrypted grub2 password for the grub superusers account with the following command: $ sudo grub2-setpassword Enter password: Confirm password:
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- OL08-00-010151
- Vuln IDs
- V-248541
- Rule IDs
- SV-248541r958472_rule
Fix: F-51929r779188_fix
Configure the system to require authentication upon booting into rescue mode by adding the following line to the "/usr/lib/systemd/system/rescue.service" file: ExecStart=-/usr/lib/systemd/systemd-sulogin-shell rescue
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- OL08-00-010152
- Vuln IDs
- V-248542
- Rule IDs
- SV-248542r958472_rule
Fix: F-51930r779191_fix
Configure the system to require authentication upon booting into emergency mode by adding the following line to the "/usr/lib/systemd/system/emergency.service" file: ExecStart=-/usr/lib/systemd/systemd-sulogin-shell emergency
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- OL08-00-010159
- Vuln IDs
- V-248543
- Rule IDs
- SV-248543r971535_rule
Fix: F-51931r818607_fix
Configure OL 8 to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication. Edit/modify the following line in the "/etc/pam.d/system-auth" file to include the sha512 option for pam_unix.so: password sufficient pam_unix.so sha512
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- OL08-00-010160
- Vuln IDs
- V-248544
- Rule IDs
- SV-248544r971535_rule
Fix: F-51932r818610_fix
Configure OL 8 to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication. Edit/modify the following line in the "/etc/pam.d/password-auth" file to include the sha512 option for pam_unix.so: password sufficient pam_unix.so sha512
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- OL08-00-010161
- Vuln IDs
- V-248545
- Rule IDs
- SV-248545r971535_rule
Fix: F-51933r779200_fix
Configure OL 8 to prevent system daemons from using Kerberos for authentication. Remove any files with the .keytab extension from the operating system.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- OL08-00-010162
- Vuln IDs
- V-248546
- Rule IDs
- SV-248546r971535_rule
Fix: F-51934r779203_fix
Document the krb5-workstation package with the ISSO as an operational requirement or remove it from the system with the following command: $ sudo yum remove krb5-workstation
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- OL08-00-010163
- Vuln IDs
- V-248547
- Rule IDs
- SV-248547r971535_rule
Fix: F-51935r779206_fix
Document the krb5-server package with the ISSO as an operational requirement or remove it from the system with the following command: $ sudo yum remove krb5-server
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- OL08-00-010170
- Vuln IDs
- V-248548
- Rule IDs
- SV-248548r958518_rule
Fix: F-51936r779209_fix
Configure OL 8 to verify correct operation of all security functions. Set "SELinux" to "Enforcing" mode by modifying the "/etc/selinux/config" file with the following line: SELINUX=enforcing A reboot is required for the changes to take effect.
- RMF Control
- SC-3
- Severity
- L
- CCI
- CCI-001084
- Version
- OL08-00-010171
- Vuln IDs
- V-248549
- Rule IDs
- SV-248549r958518_rule
Fix: F-51937r779212_fix
Install the "policycoreutil" package, if it is not already installed, by running the following command: $ sudo yum install policycoreutils
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- OL08-00-010200
- Vuln IDs
- V-248552
- Rule IDs
- SV-248552r986329_rule
Fix: F-51940r917895_fix
Note: This setting must be applied in conjunction with OL08-00-010201 to function correctly. Configure the SSH server to terminate a user session automatically after the SSH client has become unresponsive. Modify or append the following line in the "/etc/ssh/sshd_config" file: ClientAliveCountMax 1 For the changes to take effect, the SSH daemon must be restarted. $ sudo systemctl restart sshd.service
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- OL08-00-010201
- Vuln IDs
- V-248553
- Rule IDs
- SV-248553r986330_rule
Fix: F-51941r917898_fix
Note: This setting must be applied in conjunction with OL08-00-010200 to function correctly. Configure the SSH server to terminate a user session automatically after the SSH client has been unresponsive for 10 minutes. Modify or append the following lines in the "/etc/ssh/sshd_config" file to have a product value of "600" or less: ClientAliveInterval 600 The SSH daemon must be restarted for changes to take effect. $ sudo systemctl restart sshd.service
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- OL08-00-010210
- Vuln IDs
- V-248554
- Rule IDs
- SV-248554r958566_rule
Fix: F-51942r779227_fix
Change the permissions of the file "/var/log/messages" to "0640" by running the following command: $ sudo chmod 0640 /var/log/messages
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- OL08-00-010220
- Vuln IDs
- V-248555
- Rule IDs
- SV-248555r958566_rule
Fix: F-51943r779230_fix
Change the owner of the file /var/log/messages to root by running the following command: $ sudo chown root /var/log/messages
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- OL08-00-010230
- Vuln IDs
- V-248556
- Rule IDs
- SV-248556r958566_rule
Fix: F-51944r779233_fix
Change the group of the file "/var/log/messages" to "root" by running the following command: $ sudo chgrp root /var/log/messages
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- OL08-00-010240
- Vuln IDs
- V-248557
- Rule IDs
- SV-248557r958566_rule
Fix: F-51945r779236_fix
Change the permissions of the directory "/var/log" to "0755" by running the following command: $ sudo chmod 0755 /var/log
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- OL08-00-010250
- Vuln IDs
- V-248558
- Rule IDs
- SV-248558r958566_rule
Fix: F-51946r779239_fix
Change the owner of the directory /var/log to root by running the following command: $ sudo chown root /var/log
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- OL08-00-010260
- Vuln IDs
- V-248559
- Rule IDs
- SV-248559r958566_rule
Fix: F-51947r779242_fix
Change the group of the directory "/var/log" to "root" by running the following command: $ sudo chgrp root /var/log
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL08-00-010292
- Vuln IDs
- V-248563
- Rule IDs
- SV-248563r991593_rule
Fix: F-51951r779254_fix
Configure the operating system SSH server to use strong entropy. Add or modify the following line in the "/etc/sysconfig/sshd" file. SSH_USE_STRONG_RNG=32 The SSH service must be restarted for changes to take effect.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- OL08-00-010294
- Vuln IDs
- V-248565
- Rule IDs
- SV-248565r991554_rule
Fix: F-51953r818616_fix
Configure the OL 8 OpenSSL library to use only DoD-approved TLS encryption by editing the following line in the "/etc/crypto-policies/back-ends/opensslcnf.config" file: For versions prior to crypto-policies-20210617-1.gitc776d3e.el8.noarch: MinProtocol = TLSv1.2 For version crypto-policies-20210617-1.gitc776d3e.el8.noarch and newer: TLS.MinProtocol = TLSv1.2 DTLS.MinProtocol = DTLSv1.2 A reboot is required for the changes to take effect.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- OL08-00-010300
- Vuln IDs
- V-248567
- Rule IDs
- SV-248567r991560_rule
Fix: F-51955r818621_fix
Configure the system commands to be protected from unauthorized access. Run the following command, replacing "[FILE]" with any system command with a mode more permissive than "755". $ sudo chmod 755 [FILE]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- OL08-00-010310
- Vuln IDs
- V-248568
- Rule IDs
- SV-248568r991560_rule
Fix: F-51956r779269_fix
Configure the system commands to be protected from unauthorized access. Run the following command, replacing "[FILE]" with any system command file not owned by "root". $ sudo chown root [FILE]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- OL08-00-010320
- Vuln IDs
- V-248569
- Rule IDs
- SV-248569r991560_rule
Fix: F-51957r818624_fix
Configure the system commands to be protected from unauthorized access. Run the following command, replacing "[FILE]" with any system command file not group-owned by "root" or a required system account. $ sudo chgrp root [FILE]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- OL08-00-010330
- Vuln IDs
- V-248570
- Rule IDs
- SV-248570r991560_rule
Fix: F-51958r818627_fix
Configure the library files to be protected from unauthorized access. Run the following command, replacing "[FILE]" with any library file with a mode more permissive than 755. $ sudo chmod 755 [FILE]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- OL08-00-010340
- Vuln IDs
- V-248571
- Rule IDs
- SV-248571r991560_rule
Fix: F-51959r779278_fix
Configure the system-wide shared library files (/lib, /lib64, /usr/lib, and /usr/lib64) to be protected from unauthorized access. Run the following command, replacing "[FILE]" with any library file not owned by "root". $ sudo chown root [FILE]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- OL08-00-010350
- Vuln IDs
- V-248572
- Rule IDs
- SV-248572r991560_rule
Fix: F-51960r779281_fix
Configure the system-wide shared library files (/lib, /lib64, /usr/lib, and /usr/lib64) to be protected from unauthorized access. Run the following command, replacing "[FILE]" with any library file not group-owned by "root". $ sudo chgrp root [FILE]
- RMF Control
- Severity
- H
- CCI
- CCI-003992
- Version
- OL08-00-010370
- Vuln IDs
- V-248574
- Rule IDs
- SV-248574r1015031_rule
Fix: F-51962r779287_fix
Configure OL 8 to verify the signature of packages from a repository prior to install by setting the following option in the "/etc/yum.repos.d/[your_repo_name].repo" file: gpgcheck=1
- RMF Control
- Severity
- H
- CCI
- CCI-003992
- Version
- OL08-00-010371
- Vuln IDs
- V-248575
- Rule IDs
- SV-248575r1015032_rule
Fix: F-51963r779290_fix
Configure the operating system to remove all software components after updated versions have been installed. Set the "localpkg_gpgcheck" option to "True" in the "/etc/dnf/dnf.conf" file: localpkg_gpgcheck=True
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- OL08-00-010373
- Vuln IDs
- V-248577
- Rule IDs
- SV-248577r958702_rule
Fix: F-51965r858611_fix
Configure OL 8 to enable DAC on symlinks. Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: fs.protected_symlinks = 1 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- OL08-00-010374
- Vuln IDs
- V-248578
- Rule IDs
- SV-248578r958702_rule
Fix: F-51966r858614_fix
Configure OL 8 to enable DAC on hardlinks. Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: fs.protected_hardlinks = 1 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- SC-4
- Severity
- L
- CCI
- CCI-001090
- Version
- OL08-00-010375
- Vuln IDs
- V-248579
- Rule IDs
- SV-248579r958524_rule
Fix: F-51967r858616_fix
Configure OL 8 to restrict access to the kernel message buffer. Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: kernel.dmesg_restrict = 1 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- SC-4
- Severity
- L
- CCI
- CCI-001090
- Version
- OL08-00-010376
- Vuln IDs
- V-248580
- Rule IDs
- SV-248580r958524_rule
Fix: F-51968r858618_fix
Configure OL 8 to prevent kernel profiling by unprivileged users. Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: kernel.perf_event_paranoid = 2 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- Severity
- M
- CCI
- CCI-004895
- Version
- OL08-00-010380
- Vuln IDs
- V-248581
- Rule IDs
- SV-248581r1050789_rule
Fix: F-51969r860914_fix
Configure the operating system to require users to supply a password for privilege escalation. Check the configuration of the "/etc/sudoers" file with the following command: $ sudo visudo Remove any occurrences of "NOPASSWD" tags in the file. Check the configuration of the /etc/sudoers.d/* files with the following command: $ sudo grep -ir nopasswd /etc/sudoers.d Remove any occurrences of "NOPASSWD" tags in the file.
- RMF Control
- Severity
- M
- CCI
- CCI-004895
- Version
- OL08-00-010381
- Vuln IDs
- V-248582
- Rule IDs
- SV-248582r1050789_rule
Fix: F-51970r779311_fix
Remove any occurrence of "!authenticate" found in the "/etc/sudoers" file or files in the "/etc/sudoers.d" directory.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010382
- Vuln IDs
- V-248583
- Rule IDs
- SV-248583r991589_rule
Fix: F-51971r779314_fix
Remove the following entries from the sudoers file: ALL ALL=(ALL) ALL ALL ALL=(ALL:ALL) ALL
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010383
- Vuln IDs
- V-248584
- Rule IDs
- SV-248584r991589_rule
Fix: F-51972r880553_fix
Define the following in the Defaults section of the /etc/sudoers file or a configuration file in the /etc/sudoers.d/ directory: Defaults !targetpw Defaults !rootpw Defaults !runaspw Remove any configurations that conflict with the above from the following locations: /etc/sudoers /etc/sudoers.d/
- RMF Control
- Severity
- M
- CCI
- CCI-004895
- Version
- OL08-00-010384
- Vuln IDs
- V-248585
- Rule IDs
- SV-248585r1050789_rule
Fix: F-51973r880556_fix
Configure the "sudo" command to require re-authentication. Edit the /etc/sudoers file: $ sudo visudo Add or modify the following line: Defaults timestamp_timeout=[value] Note: The "[value]" must be a number that is greater than or equal to "0". Remove any duplicate or conflicting lines from /etc/sudoers and /etc/sudoers.d/ files.
- RMF Control
- Severity
- L
- CCI
- CCI-004046
- Version
- OL08-00-010390
- Vuln IDs
- V-248586
- Rule IDs
- SV-248586r1015037_rule
Fix: F-51974r779323_fix
Configure OL 8 to implement multifactor authentication by installing the required package with the following command: $ sudo yum install openssl-pkcs11
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- OL08-00-010421
- Vuln IDs
- V-248590
- Rule IDs
- SV-248590r958518_rule
Fix: F-51978r779335_fix
Configure OL 8 to enable page poisoning with the following commands: $ sudo grubby --update-kernel=ALL --args="page_poison=1" Add or modify the following line in "/etc/default/grub" to ensure the configuration survives kernel updates: GRUB_CMDLINE_LINUX="page_poison=1"
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- OL08-00-010422
- Vuln IDs
- V-248591
- Rule IDs
- SV-248591r958518_rule
Fix: F-51979r779338_fix
Document the use of vsyscalls with the ISSO as an operational requirement or disable them with the following command: $ sudo grubby --update-kernel=ALL --args="vsyscall=none" Add or modify the following line in "/etc/default/grub" to ensure the configuration survives kernel updates: GRUB_CMDLINE_LINUX="vsyscall=none"
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- OL08-00-010423
- Vuln IDs
- V-248592
- Rule IDs
- SV-248592r958518_rule
Fix: F-51980r779341_fix
Configure OL 8 to enable poisoning of SLUB/SLAB objects with the following commands: $ sudo grubby --update-kernel=ALL --args="slub_debug=P" Add or modify the following line in "/etc/default/grub" to ensure the configuration survives kernel updates: GRUB_CMDLINE_LINUX="slub_debug=P"
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- OL08-00-010430
- Vuln IDs
- V-248594
- Rule IDs
- SV-248594r958928_rule
Fix: F-51982r858626_fix
Configure OL 8 to implement virtual address space randomization. Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.d/*.conf" (or modify the line to have the required value): kernel.randomize_va_space=2 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf Issue the following command to make the changes take effect: $ sudo sysctl --system
- RMF Control
- SI-2
- Severity
- L
- CCI
- CCI-002617
- Version
- OL08-00-010440
- Vuln IDs
- V-248595
- Rule IDs
- SV-248595r958936_rule
Fix: F-51983r779350_fix
Configure OL 8 to remove all software components after updated versions have been installed. Set the "clean_requirements_on_remove" option to "True" in the "/etc/yum.conf" file: clean_requirements_on_remove=True
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002696
- Version
- OL08-00-010450
- Vuln IDs
- V-248596
- Rule IDs
- SV-248596r958944_rule
Fix: F-51984r779353_fix
Configure OL 8 to verify correct operation of all security functions. Set the "SELinuxtype" to the "targeted" policy by modifying the "/etc/selinux/config" file to have the following line: SELINUXTYPE=targeted A reboot is required for the changes to take effect.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-010460
- Vuln IDs
- V-248597
- Rule IDs
- SV-248597r991589_rule
Fix: F-51985r779356_fix
Remove any found "shosts.equiv" files from the system. $ sudo rm /etc/ssh/shosts.equiv
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-010470
- Vuln IDs
- V-248598
- Rule IDs
- SV-248598r991589_rule
Fix: F-51986r779359_fix
Remove any found ".shosts" files from the system. $ sudo rm /[path]/[to]/[file]/.shosts
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL08-00-010472
- Vuln IDs
- V-248600
- Rule IDs
- SV-248600r991589_rule
Fix: F-51988r779365_fix
Install the packages required to enabled the hardware random number generator entropy gatherer service with the following command: $ sudo yum install rng-tools
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010480
- Vuln IDs
- V-248601
- Rule IDs
- SV-248601r991589_rule
Fix: F-51989r779368_fix
Change the mode of public host key files under "/etc/ssh" to "0644" with the following command: $ sudo chmod 0644 /etc/ssh/*key.pub The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010490
- Vuln IDs
- V-248602
- Rule IDs
- SV-248602r991589_rule
Fix: F-51990r880540_fix
Configure the mode of SSH private host key files under "/etc/ssh" to "0640" with the following command: $ sudo chmod 0640 /etc/ssh/ssh_host*key The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010500
- Vuln IDs
- V-248603
- Rule IDs
- SV-248603r991589_rule
Fix: F-51991r779374_fix
Configure SSH to perform strict mode checking of home directory configuration files. Uncomment the "StrictModes" keyword in "/etc/ssh/sshd_config" and set the value to "yes": StrictModes yes The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010520
- Vuln IDs
- V-248605
- Rule IDs
- SV-248605r991589_rule
Fix: F-51993r779380_fix
Configure the SSH daemon to not allow authentication using known host’s authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "yes": IgnoreUserKnownHosts yes The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010521
- Vuln IDs
- V-248606
- Rule IDs
- SV-248606r991589_rule
Fix: F-51994r779383_fix
Configure the SSH daemon to not allow Kerberos authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "no": KerberosAuthentication no The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010522
- Vuln IDs
- V-248607
- Rule IDs
- SV-248607r991589_rule
Fix: F-51995r779386_fix
Configure the SSH daemon to not allow GSSAPI authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "no": GSSAPIAuthentication no The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL08-00-010540
- Vuln IDs
- V-248608
- Rule IDs
- SV-248608r991589_rule
Fix: F-51996r779389_fix
Migrate the "/var" path onto a separate file system.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL08-00-010541
- Vuln IDs
- V-248609
- Rule IDs
- SV-248609r991589_rule
Fix: F-51997r779392_fix
Migrate the "/var/log" path onto a separate file system.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL08-00-010542
- Vuln IDs
- V-248610
- Rule IDs
- SV-248610r991589_rule
Fix: F-51998r779395_fix
Migrate the system audit data path onto a separate file system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010543
- Vuln IDs
- V-248611
- Rule IDs
- SV-248611r991589_rule
Fix: F-51999r779398_fix
Migrate the "/tmp" directory onto a separate file system/partition.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010544
- Vuln IDs
- V-248612
- Rule IDs
- SV-248612r991589_rule
Fix: F-52000r779401_fix
Migrate the "/var/tmp" path onto a separate file system.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- OL08-00-010550
- Vuln IDs
- V-248613
- Rule IDs
- SV-248613r1015039_rule
Fix: F-52001r779404_fix
Configure OL 8 to stop users from logging on remotely as the "root" user via SSH. Edit the appropriate "/etc/ssh/sshd_config" file to uncomment or add the line for the "PermitRootLogin" keyword and set its value to "no": PermitRootLogin no The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010561
- Vuln IDs
- V-248615
- Rule IDs
- SV-248615r991589_rule
Fix: F-52003r779410_fix
Start and enable the rsyslog service with the following commands: $ sudo systemctl start rsyslog.service $ sudo systemctl enable rsyslog.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010570
- Vuln IDs
- V-248616
- Rule IDs
- SV-248616r991589_rule
Fix: F-52004r779413_fix
Configure "/etc/fstab" to use the "nosuid" option on file systems that contain user home directories for interactive users.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010571
- Vuln IDs
- V-248617
- Rule IDs
- SV-248617r991589_rule
Fix: F-52005r779416_fix
Configure the "/etc/fstab" to use the "nosuid" option on the /boot directory.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010572
- Vuln IDs
- V-248618
- Rule IDs
- SV-248618r991589_rule
Fix: F-52006r779419_fix
Configure the "/etc/fstab" to use the "nosuid" option on the /boot/efi directory.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010580
- Vuln IDs
- V-248619
- Rule IDs
- SV-248619r991589_rule
Fix: F-52007r779422_fix
Configure the "/etc/fstab" to use the "nodev" option on all non-root local partitions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010630
- Vuln IDs
- V-248624
- Rule IDs
- SV-248624r991589_rule
Fix: F-52012r779437_fix
Configure the "/etc/fstab" to use the "noexec" option on file systems that are being imported via NFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010640
- Vuln IDs
- V-248625
- Rule IDs
- SV-248625r991589_rule
Fix: F-52013r779440_fix
Configure the "/etc/fstab" to use the "nodev" option on file systems that are being imported via NFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010650
- Vuln IDs
- V-248626
- Rule IDs
- SV-248626r991589_rule
Fix: F-52014r779443_fix
Configure the "/etc/fstab" to use the "nosuid" option on file systems that are being imported via NFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010671
- Vuln IDs
- V-248629
- Rule IDs
- SV-248629r991589_rule
Fix: F-52017r858628_fix
Configure OL 8 to disable storing core dumps by adding the following line to a file in the "/etc/sysctl.d" directory: kernel.core_pattern = |/bin/false Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf The system configuration files must be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010672
- Vuln IDs
- V-248630
- Rule IDs
- SV-248630r991589_rule
Fix: F-52018r779455_fix
Configure the system to disable the "systemd-coredump.socket" with the following commands: $ sudo systemctl disable --now systemd-coredump.socket $ sudo systemctl mask systemd-coredump.socket Created symlink /etc/systemd/system/systemd-coredump.socket -> /dev/null
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010673
- Vuln IDs
- V-248631
- Rule IDs
- SV-248631r991589_rule
Fix: F-52019r779458_fix
Configure OL 8 to disable core dumps for all users. Add the following line to the top of "/etc/security/limits.conf" or in a ".conf" file defined in "/etc/security/limits.d/": * hard core 0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010674
- Vuln IDs
- V-248632
- Rule IDs
- SV-248632r991589_rule
Fix: F-52020r779461_fix
Configure OL 8 to disable storing core dumps for all users. Add or modify the following line in "/etc/systemd/coredump.conf": Storage=none
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010675
- Vuln IDs
- V-248633
- Rule IDs
- SV-248633r991589_rule
Fix: F-52021r779464_fix
Configure OL 8 to disable core dump backtraces. Add or modify the following line in "/etc/systemd/coredump.conf": ProcessSizeMax=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010680
- Vuln IDs
- V-248634
- Rule IDs
- SV-248634r991589_rule
Fix: F-52022r779467_fix
Configure OL 8 to use two or more name servers for DNS resolution. By default, "NetworkManager" on OL 8 dynamically updates the "/etc/resolv.conf" file with the DNS settings from active "NetworkManager" connection profiles. However, this feature can be disabled to allow manual configurations. If manually configuring DNS, edit the "/etc/resolv.conf" file to uncomment or add the two or more "nameserver" option lines with the IP address of local authoritative name servers. If local host resolution is being performed, the "/etc/resolv.conf" file must be empty. An empty "/etc/resolv.conf" file can be created as follows: $ sudo echo -n > /etc/resolv.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010720
- Vuln IDs
- V-248638
- Rule IDs
- SV-248638r991589_rule
Fix: F-52026r779479_fix
Assign home directories to all local interactive users on OL 8 that currently do not have a home directory assigned.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010730
- Vuln IDs
- V-248639
- Rule IDs
- SV-248639r991589_rule
Fix: F-52027r779482_fix
Change the mode of interactive users' home directories to "0750" using the following command. Note: The example will be for the user "smithj". $ sudo chmod 0750 /home/smithj
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010760
- Vuln IDs
- V-248644
- Rule IDs
- SV-248644r991589_rule
Fix: F-52032r779497_fix
Configure OL 8 to assign home directories to all new local interactive users by setting the "CREATE_HOME" parameter in "/etc/login.defs" to "yes" as follows. CREATE_HOME yes
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010770
- Vuln IDs
- V-248645
- Rule IDs
- SV-248645r991589_rule
Fix: F-52033r779500_fix
Set the mode of the local initialization files to "0740" with the following command: Note: The example will be for the smithj user, who has a home directory of "/home/smithj". $ sudo chmod 0740 /home/smithj/.<INIT_FILE>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-010800
- Vuln IDs
- V-248648
- Rule IDs
- SV-248648r991589_rule
Fix: F-52036r902799_fix
Migrate the "/home" directory onto a separate file system.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-010820
- Vuln IDs
- V-248649
- Rule IDs
- SV-248649r991591_rule
Fix: F-52037r779512_fix
Configure OL 8 to not allow an unattended or automatic logon to the system via a graphical user interface. Add or edit the line for the "AutomaticLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false": [daemon] AutomaticLoginEnable=false
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-010830
- Vuln IDs
- V-248650
- Rule IDs
- SV-248650r991591_rule
Fix: F-52038r779515_fix
Configure OL 8 to allow the SSH daemon to not allow unattended or automatic login to the system. Add or edit the following line in the "/etc/ssh/sshd_config" file: PermitUserEnvironment no The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- OL08-00-020010
- Vuln IDs
- V-248652
- Rule IDs
- SV-248652r958388_rule
Fix: F-52040r779521_fix
Add/modify the appropriate sections of the "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" files to match the following lines: auth required pam_faillock.so preauth dir=/var/log/faillock silent audit deny=3 even_deny_root fail_interval=900 unlock_time=0 auth required pam_faillock.so authfail dir=/var/log/faillock unlock_time=0 account required pam_faillock.so The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command: $ sudo systemctl restart sssd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- OL08-00-020011
- Vuln IDs
- V-248653
- Rule IDs
- SV-248653r958388_rule
Fix: F-52041r779524_fix
Configure OL 8 to lock an account when three unsuccessful logon attempts occur. Add/modify the "/etc/security/faillock.conf" file to match the following line: deny = 3
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- OL08-00-020012
- Vuln IDs
- V-248654
- Rule IDs
- SV-248654r958388_rule
Fix: F-52042r779527_fix
Configure the operating system to lock an account when three unsuccessful logon attempts occur in 15 minutes. Add/modify the appropriate sections of the "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" files to match the following lines: auth required pam_faillock.so preauth dir=/var/log/faillock silent audit deny=3 even_deny_root fail_interval=900 unlock_time=0 auth required pam_faillock.so authfail dir=/var/log/faillock unlock_time=0 account required pam_faillock.so The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command: $ sudo systemctl restart sssd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- OL08-00-020013
- Vuln IDs
- V-248655
- Rule IDs
- SV-248655r958388_rule
Fix: F-52043r779530_fix
Configure OL 8 to lock an account when three unsuccessful logon attempts occur. Add/modify the "/etc/security/faillock.conf" file to match the following line: fail_interval = 900
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- OL08-00-020014
- Vuln IDs
- V-248656
- Rule IDs
- SV-248656r958388_rule
Fix: F-52044r779533_fix
Configure the operating system to lock an account until released by an administrator when three unsuccessful logon attempts occur in 15 minutes. Add/modify the appropriate sections of the "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" files to match the following lines: auth required pam_faillock.so preauth dir=/var/log/faillock silent audit deny=3 even_deny_root fail_interval=900 unlock_time=0 auth required pam_faillock.so authfail dir=/var/log/faillock unlock_time=0 account required pam_faillock.so The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command: $ sudo systemctl restart sssd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- OL08-00-020015
- Vuln IDs
- V-248657
- Rule IDs
- SV-248657r958388_rule
Fix: F-52045r779536_fix
Configure OL 8 to lock an account until released by an administrator when three unsuccessful logon attempts occur in 15 minutes. Add/modify the "/etc/security/faillock.conf" file to match the following line: unlock_time = 0
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- OL08-00-020018
- Vuln IDs
- V-248660
- Rule IDs
- SV-248660r958388_rule
Fix: F-52048r779545_fix
Configure the operating system to prevent informative messages from being presented at logon attempts. Add/modify the appropriate sections of the "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" files to match the following lines: auth required pam_faillock.so preauth dir=/var/log/faillock silent audit deny=3 even_deny_root fail_interval=900 unlock_time=0 auth required pam_faillock.so authfail dir=/var/log/faillock unlock_time=0 account required pam_faillock.so The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command: $ sudo systemctl restart sssd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- OL08-00-020019
- Vuln IDs
- V-248661
- Rule IDs
- SV-248661r958388_rule
Fix: F-52049r779548_fix
Configure the operating system to prevent informative messages from being presented at logon attempts. Add/modify the "/etc/security/faillock.conf" file to match the following line: silent
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- OL08-00-020020
- Vuln IDs
- V-248662
- Rule IDs
- SV-248662r958388_rule
Fix: F-52050r779551_fix
Configure the operating system to log user name information when unsuccessful logon attempts occur. Add/modify the appropriate sections of the "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" files to match the following lines: auth required pam_faillock.so preauth dir=/var/log/faillock silent audit deny=3 even_deny_root fail_interval=900 unlock_time=0 auth required pam_faillock.so authfail dir=/var/log/faillock unlock_time=0 account required pam_faillock.so The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command: $ sudo systemctl restart sssd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- OL08-00-020021
- Vuln IDs
- V-248663
- Rule IDs
- SV-248663r958388_rule
Fix: F-52051r779554_fix
Configure the operating system to log user name information when unsuccessful logon attempts occur. Add/modify the "/etc/security/faillock.conf" file to match the following line: audit
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- OL08-00-020022
- Vuln IDs
- V-248664
- Rule IDs
- SV-248664r958388_rule
Fix: F-52052r779557_fix
Configure the operating system to include root when locking an account after three unsuccessful logon attempts occur in 15 minutes. Add/modify the appropriate sections of the "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" files to match the following lines: auth required pam_faillock.so preauth dir=/var/log/faillock silent audit deny=3 even_deny_root fail_interval=900 unlock_time=0 auth required pam_faillock.so authfail dir=/var/log/faillock unlock_time=0 account required pam_faillock.so The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command: $ sudo systemctl restart sssd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- OL08-00-020023
- Vuln IDs
- V-248665
- Rule IDs
- SV-248665r958388_rule
Fix: F-52053r779560_fix
Configure the operating system to include root when locking an account after three unsuccessful logon attempts occur in 15 minutes. Add/modify the "/etc/security/faillock.conf" file to match the following line: even_deny_root
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- OL08-00-020024
- Vuln IDs
- V-248666
- Rule IDs
- SV-248666r958398_rule
Fix: F-52054r779563_fix
Configure OL 8 to limit the number of concurrent sessions to 10 for all accounts and/or account types. Add the following line to the top of "/etc/security/limits.conf" or in a ".conf" file defined in "/etc/security/limits.d/": * hard maxlogins 10
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- OL08-00-020030
- Vuln IDs
- V-248671
- Rule IDs
- SV-248671r1015040_rule
Fix: F-52059r779578_fix
Configure OL 8 to enable a user's session lock until that user reestablishes access using established identification and authentication procedures. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following example: $ sudo vi /etc/dconf/db/local.d/00-screensaver Edit the "[org/gnome/desktop/screensaver]" section of the database file and add or update the following lines: # Set this to true to lock the screen when the screensaver activates lock-enabled=true Update the system databases: $ sudo dconf update
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-020032
- Vuln IDs
- V-248673
- Rule IDs
- SV-248673r991589_rule
Fix: F-52061r779584_fix
Configure the operating system to disable the user list at logon for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: Note: The example below is using the database "local" for the system, so if the system is using another database in "/etc/dconf/profile/user", the file should be created under the appropriate subdirectory. $ sudo touch /etc/dconf/db/local.d/02-login-screen [org/gnome/login-screen] disable-user-list=true Update the system databases: $ sudo dconf update
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- OL08-00-020039
- Vuln IDs
- V-248674
- Rule IDs
- SV-248674r1015041_rule
Fix: F-52062r779587_fix
Configure the operating system to enable a user to initiate a session lock via tmux. Install the "tmux" package, if it is not already installed, by running the following command: $ sudo yum install tmux
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- OL08-00-020040
- Vuln IDs
- V-248675
- Rule IDs
- SV-248675r1015042_rule
Fix: F-52063r880563_fix
Configure the operating system to enable a user to manually initiate a session lock via tmux. This configuration binds the uppercase letter "X" to manually initiate a session lock after the prefix key "Ctrl + b" has been sent. The complete key sequence is thus "Ctrl + b" then "Shift + x" to lock tmux. Create a global configuration file "/etc/tmux.conf" and add the following lines: set -g lock-command vlock bind X lock-session Reload tmux configuration to take effect. This can be performed in tmux while it is running: $ tmux source-file /etc/tmux.conf
- RMF Control
- AC-11
- Severity
- L
- CCI
- CCI-000056
- Version
- OL08-00-020042
- Vuln IDs
- V-248677
- Rule IDs
- SV-248677r1015044_rule
Fix: F-52065r779596_fix
Configure the operating system to prevent users from disabling the tmux terminal multiplexer by editing the "/etc/shells" configuration file to remove any instances of tmux.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- OL08-00-020050
- Vuln IDs
- V-248679
- Rule IDs
- SV-248679r1015046_rule
Fix: F-52067r779602_fix
Configure OL 8 to enable a user's session lock until that user reestablishes access using established identification and authentication procedures. Select/create an "authselect" profile and incorporate the "with-smartcard-lock-on-removal" feature as in the following example: $ sudo authselect select sssd with-smartcard with-smartcard-lock-on-removal Alternatively, the "dconf" settings can be edited in the "/etc/dconf/db/*" location. Edit or add the "[org/gnome/settings-daemon/peripherals/smartcard]" section of the database file and add or update the following line: removal-action='lock-screen' Update the system databases: $ sudo dconf update
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- OL08-00-020080
- Vuln IDs
- V-248682
- Rule IDs
- SV-248682r958402_rule
Fix: F-52070r779611_fix
Configure OL 8 to prevent a user from overriding settings for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command. Note: The example below is using the database "local" for the system, so if the system is using another database in "/etc/dconf/profile/user", the file should be created under the appropriate subdirectory. $ sudo touch /etc/dconf/db/local.d/locks/session Add the following setting to prevent non-privileged users from modifying it: /org/gnome/desktop/screensaver/lock-delay
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- OL08-00-020082
- Vuln IDs
- V-248684
- Rule IDs
- SV-248684r958402_rule
Fix: F-52072r779617_fix
Configure OL 8 to prevent a user from overriding settings for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command. Note: The example below is using the database "local" for the system, so if the system is using another database in "/etc/dconf/profile/user", the file should be created under the appropriate subdirectory. $ sudo touch /etc/dconf/db/local.d/locks/session Add the following setting to prevent non-privileged users from modifying it: /org/gnome/desktop/screensaver/lock-enabled
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-020100
- Vuln IDs
- V-248686
- Rule IDs
- SV-248686r982195_rule
Fix: F-52074r902808_fix
Configure the operating system to use "pwquality" to enforce password complexity rules. Add the following line to the "/etc/pam.d/password-auth" file (or modify the line to have the required value): password requisite pam_pwquality.so
- RMF Control
- Severity
- L
- CCI
- CCI-004066
- Version
- OL08-00-020110
- Vuln IDs
- V-248687
- Rule IDs
- SV-248687r1015047_rule
Fix: F-52075r858630_fix
Configure OL 8 to enforce password complexity by requiring that at least one uppercase character be used by setting the "ucredit" option. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory: ucredit = -1 Remove any configurations that conflict with the above value.
- RMF Control
- Severity
- L
- CCI
- CCI-004066
- Version
- OL08-00-020120
- Vuln IDs
- V-248688
- Rule IDs
- SV-248688r1015048_rule
Fix: F-52076r858632_fix
Configure OL 8 to enforce password complexity by requiring that at least one lowercase character be used by setting the "lcredit" option. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory: lcredit = -1 Remove any configurations that conflict with the above value.
- RMF Control
- Severity
- L
- CCI
- CCI-004066
- Version
- OL08-00-020130
- Vuln IDs
- V-248689
- Rule IDs
- SV-248689r1015049_rule
Fix: F-52077r858634_fix
Configure OL 8 to enforce password complexity by requiring that at least one numeric character be used by setting the "dcredit" option. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory: dcredit = -1 Remove any configurations that conflict with the above value.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- OL08-00-020140
- Vuln IDs
- V-248690
- Rule IDs
- SV-248690r1015050_rule
Fix: F-52078r858636_fix
Configure OL 8 to require the change of the number of repeating characters of the same character class when passwords are changed by setting the "maxclassrepeat" option. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory: maxclassrepeat = 4 Remove any configurations that conflict with the above value.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- OL08-00-020150
- Vuln IDs
- V-248691
- Rule IDs
- SV-248691r1015051_rule
Fix: F-52079r858638_fix
Configure OL 8 to require the change of the number of repeating consecutive characters when passwords are changed by setting the "maxrepeat" option. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory: maxrepeat = 3 Remove any configurations that conflict with the above value.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- OL08-00-020160
- Vuln IDs
- V-248692
- Rule IDs
- SV-248692r1015052_rule
Fix: F-52080r858640_fix
Configure OL 8 to require the change of at least four character classes when passwords are changed by setting the "minclass" option. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory: minclass = 4 Remove any configurations that conflict with the above value.
- RMF Control
- Severity
- L
- CCI
- CCI-004066
- Version
- OL08-00-020170
- Vuln IDs
- V-248693
- Rule IDs
- SV-248693r1015053_rule
Fix: F-52081r858642_fix
Configure OL 8 to require the change of at least eight of the total number of characters when passwords are changed by setting the "difok" option. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory: difok = 8 Remove any configurations that conflict with the above value.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- OL08-00-020180
- Vuln IDs
- V-248694
- Rule IDs
- SV-248694r1015054_rule
Fix: F-52082r986358_fix
Configure non-compliant accounts to enforce a 24 hours/one day minimum password lifetime: $ sudo chage -m 1 [user]
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- OL08-00-020190
- Vuln IDs
- V-248695
- Rule IDs
- SV-248695r1015055_rule
Fix: F-52083r986361_fix
Configure OL 8 to enforce 24 hours/one day as the minimum password lifetime. Add the following line in "/etc/login.defs" (or modify the line to have the required value): PASS_MIN_DAYS 1
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- OL08-00-020200
- Vuln IDs
- V-248696
- Rule IDs
- SV-248696r1038967_rule
Fix: F-52084r779653_fix
Configure OL 8 to enforce a 60-day maximum password lifetime. Add or modify the following line in the "/etc/login.defs" file: PASS_MAX_DAYS 60
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- OL08-00-020210
- Vuln IDs
- V-248697
- Rule IDs
- SV-248697r1038967_rule
Fix: F-52085r779656_fix
Configure non-compliant accounts to enforce a 60-day maximum password lifetime restriction. $ sudo chage -M 60 [user]
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- OL08-00-020230
- Vuln IDs
- V-248699
- Rule IDs
- SV-248699r1015058_rule
Fix: F-52087r858644_fix
Configure OL 8 to enforce a minimum 15-character password length. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory: minlen = 15 Remove any configurations that conflict with the above value.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- OL08-00-020231
- Vuln IDs
- V-248700
- Rule IDs
- SV-248700r1015059_rule
Fix: F-52088r779665_fix
Configure operating system to enforce a minimum 15-character password length for new user accounts. Add or modify the following line in the "/etc/login.defs" file: PASS_MIN_LEN 15
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- OL08-00-020240
- Vuln IDs
- V-248701
- Rule IDs
- SV-248701r958422_rule
Fix: F-52089r779668_fix
Edit the file "/etc/passwd" and provide each interactive user account that has a duplicate UID with a unique UID.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- OL08-00-020262
- Vuln IDs
- V-248705
- Rule IDs
- SV-248705r958566_rule
Fix: F-52093r779680_fix
Configure the mode of the "lastlog" command for OL 8 to "0750" with the following command: $ sudo chmod 0750 /usr/bin/lastlog
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- OL08-00-020263
- Vuln IDs
- V-248706
- Rule IDs
- SV-248706r958566_rule
Fix: F-52094r779683_fix
Configure the "lastlog" command for OL 8 to be owned by root with the following command: $ sudo chown root /usr/bin/lastlog
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- OL08-00-020264
- Vuln IDs
- V-248707
- Rule IDs
- SV-248707r958566_rule
Fix: F-52095r779686_fix
Configure the "lastlog" command for OL 8 to be group-owned by root with the following command: $ sudo chgrp root /usr/bin/lastlog
- RMF Control
- Severity
- L
- CCI
- CCI-004066
- Version
- OL08-00-020280
- Vuln IDs
- V-248709
- Rule IDs
- SV-248709r1015063_rule
Fix: F-52097r858646_fix
Configure OL 8 to enforce password complexity by requiring that at least one special character be used by setting the "ocredit" option. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory: ocredit = -1 Remove any configurations that conflict with the above value.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- OL08-00-020290
- Vuln IDs
- V-248710
- Rule IDs
- SV-248710r958828_rule
Fix: F-52098r943100_fix
Configure the SSSD to prohibit the use of cached authentications after one day. Add or change the following line in "/etc/sssd/sssd.conf" just below the line "[pam]". offline_credentials_expiration = 1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-020300
- Vuln IDs
- V-248711
- Rule IDs
- SV-248711r991587_rule
Fix: F-52099r858648_fix
Configure OL 8 to prevent the use of dictionary words for passwords. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the "/etc/security/pwquality.conf.d/" directory: dictcheck=1 Remove any configurations that conflict with the above value.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-020310
- Vuln IDs
- V-248712
- Rule IDs
- SV-248712r991588_rule
Fix: F-52100r779701_fix
Configure OL 8 to enforce a delay of at least four seconds between logon prompts following a failed console logon attempt. Modify the "/etc/login.defs" file to set the "FAIL_DELAY" parameter to "4" or greater: FAIL_DELAY 4
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-020330
- Vuln IDs
- V-248714
- Rule IDs
- SV-248714r991589_rule
Fix: F-52102r779707_fix
Edit the following line in "etc/ssh/sshd_config" to prevent logons with empty passwords. PermitEmptyPasswords no The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-020331
- Vuln IDs
- V-248715
- Rule IDs
- SV-248715r991589_rule
Fix: F-52103r779710_fix
Remove any instances of the "nullok" option in the "/etc/pam.d/system-auth" file to prevent logons with empty passwords. Note: Manual changes to the listed file may be overwritten by the "authselect" program.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-020332
- Vuln IDs
- V-248716
- Rule IDs
- SV-248716r991589_rule
Fix: F-52104r779713_fix
Remove any instances of the "nullok" option in the "/etc/pam.d/password-auth" file to prevent logons with empty passwords. Note: Manual changes to the listed file may be overwritten by the "authselect" program.
- RMF Control
- AC-9
- Severity
- L
- CCI
- CCI-000052
- Version
- OL08-00-020340
- Vuln IDs
- V-248717
- Rule IDs
- SV-248717r991589_rule
Fix: F-52105r779716_fix
Configure OL 8 to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/postlogin". Add the following line to the top of "/etc/pam.d/postlogin": session required pam_lastlog.so showfailed
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000052
- Version
- OL08-00-020350
- Vuln IDs
- V-248718
- Rule IDs
- SV-248718r991589_rule
Fix: F-52106r779719_fix
Configure SSH to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/sshd" or in the "sshd_config" file used by the system ("/etc/ssh/sshd_config" will be used in the example). Note that this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor. Modify the "PrintLastLog" line in "/etc/ssh/sshd_config" to match the following: PrintLastLog yes The SSH service must be restarted for changes to "sshd_config" to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-020351
- Vuln IDs
- V-248719
- Rule IDs
- SV-248719r991590_rule
Fix: F-52107r779722_fix
Configure OL 8 to define the default permissions for all authenticated users in such a way that the user can read and modify only their own files. Edit the "UMASK" parameter in the "/etc/login.defs" file to match the example below: UMASK 077
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- OL08-00-030000
- Vuln IDs
- V-248722
- Rule IDs
- SV-248722r958730_rule
Fix: F-52110r779731_fix
Configure OL 8 to audit the execution of the "execve" system call. Add or update the following file system rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S execve -C uid!=euid -F key=execpriv -a always,exit -F arch=b64 -S execve -C uid!=euid -F key=execpriv -a always,exit -F arch=b32 -S execve -C gid!=egid -F key=execpriv -a always,exit -F arch=b64 -S execve -C gid!=egid -F key=execpriv The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- OL08-00-030020
- Vuln IDs
- V-248724
- Rule IDs
- SV-248724r958424_rule
Fix: F-52112r779737_fix
Configure the "auditd" service to notify the SA and ISSO in the event of an audit processing failure. Edit the following line in "/etc/audit/auditd.conf" to ensure that administrators are notified via email for those situations: action_mail_acct = root
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- OL08-00-030030
- Vuln IDs
- V-248725
- Rule IDs
- SV-248725r958424_rule
Fix: F-52113r779740_fix
Configure OL 8 to notify administrators in the event of an audit processing failure. Add/update the following line in "/etc/aliases": postmaster: root
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- OL08-00-030040
- Vuln IDs
- V-248726
- Rule IDs
- SV-248726r1038966_rule
Fix: F-52114r779743_fix
Configure OL 8 to shut down by default upon audit failure (unless availability is an overriding concern). Add or update the following line ("disk_error_action" can be set to "SYSLOG" or "SINGLE" depending on configuration) in the "/etc/audit/auditd.conf" file: disk_error_action = HALT If availability has been determined to be more important, and this decision is documented with the ISSO, configure OL 8 to notify system administration staff and ISSO staff in the event of an audit processing failure by setting the "disk_error_action" to "SYSLOG".
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- OL08-00-030060
- Vuln IDs
- V-248728
- Rule IDs
- SV-248728r1038966_rule
Fix: F-52116r779749_fix
Configure OL 8 to shut down by default upon audit failure (unless availability is an overriding concern). Add or update the following line ("disk_full_action" can be set to "SYSLOG" or "SINGLE" depending on configuration) in the "/etc/audit/auditd.conf" file: disk_full_action = HALT If availability has been determined to be more important, and this decision is documented with the ISSO, configure OL 8 to notify system administration staff and ISSO staff in the event of an audit processing failure by setting the "disk_full_action" to "SYSLOG".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-030061
- Vuln IDs
- V-248729
- Rule IDs
- SV-248729r991589_rule
Fix: F-52117r779752_fix
Configure OL 8 to audit local events on the system. Add or update the following line in "/etc/audit/auditd.conf" file: local_events = yes
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL08-00-030062
- Vuln IDs
- V-248730
- Rule IDs
- SV-248730r958754_rule
Fix: F-52118r779755_fix
Edit the "/etc/audit/auditd.conf" file and add or update the "name_format" option: name_format = hostname The audit daemon must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-030063
- Vuln IDs
- V-248731
- Rule IDs
- SV-248731r991589_rule
Fix: F-52119r779758_fix
Configure OL 8 to resolve audit information before writing to disk by adding the following line to the "/etc/audit/auditd.conf" file and add or update the "log_format" option: log_format = ENRICHED The audit daemon must be restarted for changes to take effect.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- OL08-00-030070
- Vuln IDs
- V-248732
- Rule IDs
- SV-248732r958434_rule
Fix: F-52120r779761_fix
Configure the audit log to be protected from unauthorized read access by setting the correct permissive mode with the following command: $ sudo chmod 0600 [audit_log_file] Replace "[audit_log_file]" to the correct audit log path. By default, this location is "/var/log/audit/audit.log".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- OL08-00-030080
- Vuln IDs
- V-248733
- Rule IDs
- SV-248733r958434_rule
Fix: F-52121r779764_fix
Configure the audit log to be protected from unauthorized read access by setting the correct owner as "root" with the following command: $ sudo chown root [audit_log_file] Replace "[audit_log_file]" to the correct audit log path. By default, this location is "/var/log/audit/audit.log".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- OL08-00-030090
- Vuln IDs
- V-248734
- Rule IDs
- SV-248734r958434_rule
Fix: F-52122r779767_fix
Configure the audit log to be protected from unauthorized read access by setting the correct group-owner as "root" with the following command: $ sudo chgrp root [audit_log_file] Replace "[audit_log_file]" to the correct audit log path. By default, this location is "/var/log/audit/audit.log".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- OL08-00-030100
- Vuln IDs
- V-248735
- Rule IDs
- SV-248735r958434_rule
Fix: F-52123r779770_fix
Configure the audit log to be protected from unauthorized read access by setting the correct owner as "root" with the following command: $ sudo chown root [audit_log_directory] Replace "[audit_log_directory]" with the correct audit log directory path. By default, this location is usually "/var/log/audit".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- OL08-00-030110
- Vuln IDs
- V-248736
- Rule IDs
- SV-248736r958434_rule
Fix: F-52124r779773_fix
Configure the audit log to be protected from unauthorized read access by setting the correct group-owner as "root" with the following command: $ sudo chgrp root [audit_log_directory] Replace "[audit_log_directory]" with the correct audit log directory path. By default, this location is usually "/var/log/audit".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- OL08-00-030120
- Vuln IDs
- V-248737
- Rule IDs
- SV-248737r958434_rule
Fix: F-52125r779776_fix
Configure the audit log directory to be protected from unauthorized read access by setting the correct permissive mode with the following command: $ sudo chmod 0700 [audit_log_directory] Replace "[audit_log_directory]" to the correct audit log directory path. By default, this location is "/var/log/audit".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- OL08-00-030121
- Vuln IDs
- V-248738
- Rule IDs
- SV-248738r958434_rule
Fix: F-52126r779779_fix
Configure the audit system to set the audit rules to be immutable by adding the following line to "/etc/audit/rules.d/audit.rules": -e 2 Note: Once set, the system must be rebooted for auditing to be changed. It is recommended to add this option as the last step in securing the system.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- OL08-00-030122
- Vuln IDs
- V-248739
- Rule IDs
- SV-248739r958434_rule
Fix: F-52127r779782_fix
Configure the audit system to set the logon UIDs to be immutable by adding the following line to "/etc/audit/rules.d/audit.rules": --loginuid-immutable
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL08-00-030130
- Vuln IDs
- V-248740
- Rule IDs
- SV-248740r1015064_rule
Fix: F-52128r779785_fix
Configure OL 8 to generate audit records for all account creations events that affect "/etc/shadow". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/shadow -p wa -k identity The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL08-00-030140
- Vuln IDs
- V-248741
- Rule IDs
- SV-248741r1015065_rule
Fix: F-52129r779788_fix
Configure OL 8 to generate audit records for all account creations events that affect "/etc/security/opasswd". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/security/opasswd -p wa -k identity The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL08-00-030150
- Vuln IDs
- V-248742
- Rule IDs
- SV-248742r1015066_rule
Fix: F-52130r779791_fix
Configure OL 8 to generate audit records for all account creations events that affect "/etc/passwd". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/passwd -p wa -k identity The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL08-00-030160
- Vuln IDs
- V-248743
- Rule IDs
- SV-248743r1015067_rule
Fix: F-52131r779794_fix
Configure OL 8 to generate audit records for all account creations events that affect "/etc/gshadow". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/gshadow -p wa -k identity The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL08-00-030170
- Vuln IDs
- V-248744
- Rule IDs
- SV-248744r1015068_rule
Fix: F-52132r779797_fix
Configure OL 8 to generate audit records for all account creations events that affect "/etc/group". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/group -p wa -k identity The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL08-00-030171
- Vuln IDs
- V-248745
- Rule IDs
- SV-248745r1015069_rule
Fix: F-52133r779800_fix
Configure OL 8 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/sudoers -p wa -k identity The audit daemon must be restarted for the changes to take effect. $ sudo service auditd restart
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- OL08-00-030172
- Vuln IDs
- V-248746
- Rule IDs
- SV-248746r1015070_rule
Fix: F-52134r779803_fix
Configure OL 8 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/sudoers.d/ -p wa -k identity The audit daemon must be restarted for the changes to take effect. $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030190
- Vuln IDs
- V-248747
- Rule IDs
- SV-248747r958412_rule
Fix: F-52135r779806_fix
Configure OL 8 to generate audit records for any use of the "su" command by adding or updating the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/su -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030200
- Vuln IDs
- V-248748
- Rule IDs
- SV-248748r958412_rule
Fix: F-52136r818668_fix
Configure OL 8 to audit the execution of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b32 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid=0 -k perm_mod -a always,exit -F arch=b64 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid=0 -k perm_mod The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030250
- Vuln IDs
- V-248753
- Rule IDs
- SV-248753r958412_rule
Fix: F-52141r779824_fix
Configure the audit system to generate an audit event for any use of the "chage" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chage -F perm=x -F auid>=1000 -F auid!=unset -k privileged-chage The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030260
- Vuln IDs
- V-248754
- Rule IDs
- SV-248754r958412_rule
Fix: F-52142r779827_fix
Configure the audit system to generate an audit event for any use of the "chcon" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chcon -F perm=x -F auid>=1000 -F auid!=unset -k perm_chng The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030280
- Vuln IDs
- V-248756
- Rule IDs
- SV-248756r958412_rule
Fix: F-52144r779833_fix
Configure the audit system to generate an audit event for any use of the "ssh-agent" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/ssh-agent -F perm=x -F auid>=1000 -F auid!=unset -k privileged-ssh The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030290
- Vuln IDs
- V-248757
- Rule IDs
- SV-248757r958412_rule
Fix: F-52145r779836_fix
Configure the audit system to generate an audit event for any use of the "passwd" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/passwd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030300
- Vuln IDs
- V-248758
- Rule IDs
- SV-248758r958412_rule
Fix: F-52146r779839_fix
Configure the audit system to generate an audit event for any use of the "mount" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/mount -F perm=x -F auid>=1000 -F auid!=unset -k privileged-mount The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030301
- Vuln IDs
- V-248759
- Rule IDs
- SV-248759r958412_rule
Fix: F-52147r779842_fix
Configure the audit system to generate an audit event for any use of the "umount" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/umount -F perm=x -F auid>=1000 -F auid!=unset -k privileged-mount The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030302
- Vuln IDs
- V-248760
- Rule IDs
- SV-248760r958412_rule
Fix: F-52148r779845_fix
Configure the audit system to generate an audit event for any use of the "mount" syscall by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S mount -F auid>=1000 -F auid!=unset -k privileged-mount -a always,exit -F arch=b64 -S mount -F auid>=1000 -F auid!=unset -k privileged-mount The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030310
- Vuln IDs
- V-248761
- Rule IDs
- SV-248761r958412_rule
Fix: F-52149r779848_fix
Configure the audit system to generate an audit event for any use of the "unix_update" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/unix_update -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030311
- Vuln IDs
- V-248762
- Rule IDs
- SV-248762r958412_rule
Fix: F-52150r779851_fix
Configure the audit system to generate an audit event for any use of the "postdrop" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/postdrop -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030312
- Vuln IDs
- V-248763
- Rule IDs
- SV-248763r958412_rule
Fix: F-52151r779854_fix
Configure the audit system to generate an audit event for any use of the "postqueue" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/postqueue -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- OL08-00-030313
- Vuln IDs
- V-248764
- Rule IDs
- SV-248764r958442_rule
Fix: F-52152r779857_fix
Configure OL 8 to audit the execution of the "semanage" command by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": a always,exit -F path=/usr/sbin/semanage -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- OL08-00-030314
- Vuln IDs
- V-248765
- Rule IDs
- SV-248765r958442_rule
Fix: F-52153r779860_fix
Configure OL 8 to audit the execution of the "setfiles" command by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/setfiles -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- OL08-00-030315
- Vuln IDs
- V-248766
- Rule IDs
- SV-248766r958442_rule
Fix: F-52154r779863_fix
Configure OL 8 to audit the execution of the "userhelper" command by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/userhelper -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030316
- Vuln IDs
- V-248767
- Rule IDs
- SV-248767r958412_rule
Fix: F-52155r779866_fix
Configure OL 8 to audit the execution of the "setsebool" command by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/setsebool -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030317
- Vuln IDs
- V-248768
- Rule IDs
- SV-248768r958412_rule
Fix: F-52156r779869_fix
Configure OL 8 to audit the execution of the "unix_chkpwd" command by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030320
- Vuln IDs
- V-248769
- Rule IDs
- SV-248769r958412_rule
Fix: F-52157r779872_fix
Configure the audit system to generate an audit event for any use of "ssh-keysign" by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/libexec/openssh/ssh-keysign -F perm=x -F auid>=1000 -F auid!=unset -k privileged-ssh The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030330
- Vuln IDs
- V-248770
- Rule IDs
- SV-248770r958412_rule
Fix: F-52158r779875_fix
Configure the audit system to generate an audit event for any use of the "setfacl" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/setfacl -F perm=x -F auid>=1000 -F auid!=unset -k perm_chng The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030340
- Vuln IDs
- V-248771
- Rule IDs
- SV-248771r958412_rule
Fix: F-52159r779878_fix
Configure the audit system to generate an audit event for any use of the "pam_timestamp_check" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/pam_timestamp_check -F perm=x -F auid>=1000 -F auid!=unset -k privileged-pam_timestamp_check The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030350
- Vuln IDs
- V-248772
- Rule IDs
- SV-248772r958412_rule
Fix: F-52160r779881_fix
Configure the audit system to generate an audit event for any use of the "newgrp" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/newgrp -F perm=x -F auid>=1000 -F auid!=unset -k priv_cmd The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030360
- Vuln IDs
- V-248773
- Rule IDs
- SV-248773r958412_rule
Fix: F-52161r818671_fix
Configure the audit system to generate an audit event for any use of the "init_module" and "finit_module" system calls by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S init_module,finit_module -F auid>=1000 -F auid!=unset -k module_chng -a always,exit -F arch=b64 -S init_module,finit_module -F auid>=1000 -F auid!=unset -k module_chng The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030361
- Vuln IDs
- V-248774
- Rule IDs
- SV-248774r958412_rule
Fix: F-52162r818674_fix
Configure OL 8 to generate audit records for any use of the "rename", "unlink", "rmdir", "renameat", and "unlinkat" system calls by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S rename,unlink,rmdir,renameat,unlinkat -F success=1 -F auid>=1000 -F auid!=unset -k delete -a always,exit -F arch=b64 -S rename,unlink,rmdir,renameat,unlinkat -F success=1 -F auid>=1000 -F auid!=unset -k delete The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030370
- Vuln IDs
- V-248779
- Rule IDs
- SV-248779r958412_rule
Fix: F-52167r779902_fix
Configure the audit system to generate an audit event for any use of the "gpasswd" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-gpasswd The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030390
- Vuln IDs
- V-248781
- Rule IDs
- SV-248781r958412_rule
Fix: F-52169r779908_fix
Configure the audit system to generate an audit event for any use of the "delete_module" syscall by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S delete_module -F auid>=1000 -F auid!=unset -k module_chng -a always,exit -F arch=b64 -S delete_module -F auid>=1000 -F auid!=unset -k module_chng The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030400
- Vuln IDs
- V-248782
- Rule IDs
- SV-248782r958412_rule
Fix: F-52170r779911_fix
Configure the audit system to generate an audit event for any use of the "crontab" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/crontab -F perm=x -F auid>=1000 -F auid!=unset -k privileged-crontab The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030410
- Vuln IDs
- V-248783
- Rule IDs
- SV-248783r958412_rule
Fix: F-52171r779914_fix
Configure the audit system to generate an audit event for any use of the "chsh" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chsh -F perm=x -F auid>=1000 -F auid!=unset -k priv_cmd The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030420
- Vuln IDs
- V-248784
- Rule IDs
- SV-248784r958412_rule
Fix: F-52172r818677_fix
Configure the audit system to generate an audit event for any use of the "truncate", "ftruncate", "creat", "open", "openat", and "open_by_handle_at" system calls by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S truncate,ftruncate,creat,open,openat,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S truncate,ftruncate,creat,open,openat,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b32 -S truncate,ftruncate,creat,open,openat,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S truncate,ftruncate,creat,open,openat,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030480
- Vuln IDs
- V-248790
- Rule IDs
- SV-248790r958412_rule
Fix: F-52178r818680_fix
Configure the audit system to generate an audit event for any use of the "chown", "fchown", "fchownat", and "lchown" system calls by adding or updating the following line to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S chown,fchown,fchownat,lchown -F auid>=1000 -F auid!=unset -k perm_chng -a always,exit -F arch=b64 -S chown,fchown,fchownat,lchown -F auid>=1000 -F auid!=unset -k perm_chng The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030490
- Vuln IDs
- V-248791
- Rule IDs
- SV-248791r958412_rule
Fix: F-52179r818683_fix
Configure the audit system to generate an audit event for any use of the "chmod", "fchmod", and "fchmodat" syscalls by adding or updating the following line to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S chmod,fchmod,fchmodat -F auid>=1000 -F auid!=unset -k perm_chng -a always,exit -F arch=b64 -S chmod,fchmod,fchmodat -F auid>=1000 -F auid!=unset -k perm_chng The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030550
- Vuln IDs
- V-248797
- Rule IDs
- SV-248797r958412_rule
Fix: F-52185r779956_fix
Configure the audit system to generate an audit event for any use of the "sudo" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/sudo -F perm=x -F auid>=1000 -F auid!=unset -k priv_cmd The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030560
- Vuln IDs
- V-248798
- Rule IDs
- SV-248798r958412_rule
Fix: F-52186r779959_fix
Configure the audit system to generate an audit event for any use of the "usermod" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/usermod -F perm=x -F auid>=1000 -F auid!=unset -k privileged-usermod The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030570
- Vuln IDs
- V-248799
- Rule IDs
- SV-248799r958412_rule
Fix: F-52187r779962_fix
Configure the audit system to generate an audit event for any use of the "chacl" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chacl -F perm=x -F auid>=1000 -F auid!=unset -k perm_chng The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030580
- Vuln IDs
- V-248800
- Rule IDs
- SV-248800r958412_rule
Fix: F-52188r779965_fix
Configure OL 8 to audit the execution of the module management program "kmod" by adding or updating the following line to "/etc/audit/rules.d/audit.rules": -w /usr/bin/kmod -p x -k modules The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030600
- Vuln IDs
- V-248802
- Rule IDs
- SV-248802r958412_rule
Fix: F-52190r779971_fix
Configure the audit system to generate an audit event for any attempted modifications to the "lastlog" file by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -w /var/log/lastlog -p wa -k logins The audit daemon must be restarted for the changes to take effect. To restart the audit daemon, run the following command: $ sudo service auditd restart
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- OL08-00-030601
- Vuln IDs
- V-248803
- Rule IDs
- SV-248803r958412_rule
Fix: F-52191r779974_fix
Configure OL 8 to audit processes that start prior to the audit daemon with the following command: $ sudo grubby --update-kernel=ALL --args="audit=1" Add or modify the following line in "/etc/default/grub" to ensure the configuration survives kernel updates: GRUB_CMDLINE_LINUX="audit=1"
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- OL08-00-030602
- Vuln IDs
- V-248804
- Rule IDs
- SV-248804r958412_rule
Fix: F-52192r779977_fix
Configure OL 8 to allocate sufficient "audit_backlog_limit" to capture processes that start prior to the audit daemon with the following command: $ sudo grubby --update-kernel=ALL --args="audit_backlog_limit=8192" Add or modify the following line in "/etc/default/grub" to ensure the configuration survives kernel updates: GRUB_CMDLINE_LINUX="audit_backlog_limit=8192" If audit records are not stored on a partition made specifically for audit records, a new partition with sufficient space will need be to be created.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- OL08-00-030610
- Vuln IDs
- V-248806
- Rule IDs
- SV-248806r958444_rule
Fix: F-52194r951580_fix
Configure the "/etc/audit/rules.d/*.rules" and "/etc/audit/auditd.conf" files to have a mode of "0640" with the following commands: $ sudo chmod 0640 /etc/audit/rules.d/*.rules $ sudo chmod 0640 /etc/audit/auditd.conf
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- OL08-00-030620
- Vuln IDs
- V-248807
- Rule IDs
- SV-248807r991557_rule
Fix: F-52195r779986_fix
Configure the audit tools to be protected from unauthorized access by setting the correct permissive mode using the following command: $ sudo chmod 0755 [audit_tool] Replace "[audit_tool]" with the audit tool that does not have the correct permissive mode.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- OL08-00-030630
- Vuln IDs
- V-248808
- Rule IDs
- SV-248808r991557_rule
Fix: F-52196r779989_fix
Configure the audit tools to be owned by "root" by running the following command: $ sudo chown root [audit_tool] Replace "[audit_tool]" with each audit tool not owned by "root".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- OL08-00-030640
- Vuln IDs
- V-248809
- Rule IDs
- SV-248809r991557_rule
Fix: F-52197r779992_fix
Configure the audit tools to be group-owned by "root" by running the following command: $ sudo chgrp root [audit_tool] Replace "[audit_tool]" with each audit tool not group-owned by "root".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-030670
- Vuln IDs
- V-248812
- Rule IDs
- SV-248812r991589_rule
Fix: F-52200r780001_fix
Configure the operating system to offload audit logs by installing the required packages with the following command: $ sudo yum install rsyslog
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-030680
- Vuln IDs
- V-248813
- Rule IDs
- SV-248813r991589_rule
Fix: F-52201r780004_fix
Configure the operating system to encrypt offloaded audit logs by installing the required packages with the following command: $ sudo yum install rsyslog-gnutls
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL08-00-030700
- Vuln IDs
- V-248815
- Rule IDs
- SV-248815r958754_rule
Fix: F-52203r780010_fix
Edit the "/etc/audit/auditd.conf" file and add or update the "overflow_action" option: overflow_action = syslog The audit daemon must be restarted for changes to take effect.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- OL08-00-030720
- Vuln IDs
- V-248817
- Rule IDs
- SV-248817r958754_rule
Fix: F-52205r780016_fix
Configure the operating system to authenticate the remote logging server for offloading audit logs by setting the following option in "/etc/rsyslog.conf" or "/etc/rsyslog.d/[customfile].conf": $ActionSendStreamDriverAuthMode x509/name
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- OL08-00-030730
- Vuln IDs
- V-248818
- Rule IDs
- SV-248818r971542_rule
Fix: F-52206r780019_fix
Configure OL 8 to initiate an action to notify the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity by adding/modifying the following line in the "/etc/audit/auditd.conf" file. space_left = 25%
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- OL08-00-030731
- Vuln IDs
- V-248819
- Rule IDs
- SV-248819r971542_rule
Fix: F-52207r780022_fix
Configure the operating system to initiate an action to notify the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity by adding/modifying the following line in the /etc/audit/auditd.conf file. space_left_action = email Note: Option names and values in the auditd.conf file are case insensitive.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- OL08-00-030741
- Vuln IDs
- V-248821
- Rule IDs
- SV-248821r958478_rule
Fix: F-52209r928555_fix
Configure OL 8 to disable the chrony daemon from acting as a server by adding or modifying the following line in the "/etc/chrony.conf" file. port 0
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- OL08-00-030742
- Vuln IDs
- V-248822
- Rule IDs
- SV-248822r958478_rule
Fix: F-52210r928558_fix
Configure OL 8 to disable network management of the chrony daemon by adding or modifying the following line in the "/etc/chrony.conf" file. cmdport 0
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- OL08-00-040000
- Vuln IDs
- V-248823
- Rule IDs
- SV-248823r958478_rule
Fix: F-52211r780034_fix
Configure OL 8 to disable non-essential capabilities by removing the telnet-server package from the system with the following command: $ sudo yum remove telnet-server
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- OL08-00-040001
- Vuln IDs
- V-248824
- Rule IDs
- SV-248824r958478_rule
Fix: F-52212r780037_fix
Configure the operating system to disable non-essential capabilities by removing automated bug reporting packages from the system with the following command: $ sudo yum remove abrt*
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- OL08-00-040002
- Vuln IDs
- V-248825
- Rule IDs
- SV-248825r958478_rule
Fix: F-52213r780040_fix
Configure the operating system to disable non-essential capabilities by removing the sendmail package from the system with the following command: $ sudo yum remove sendmail
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- OL08-00-040004
- Vuln IDs
- V-248826
- Rule IDs
- SV-248826r958478_rule
Fix: F-52214r780043_fix
Configure OL 8 to enable kernel page-table isolation with the following command: $ sudo grubby --update-kernel=ALL --args="pti=on" Add or modify the following line in "/etc/default/grub" to ensure the configuration survives kernel updates: GRUB_CMDLINE_LINUX="pti=on"
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- OL08-00-040010
- Vuln IDs
- V-248827
- Rule IDs
- SV-248827r958478_rule
Fix: F-52215r780046_fix
Configure the operating system to disable non-essential capabilities by removing the rsh-server package from the system with the following command: $ sudo yum remove rsh-server
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040021
- Vuln IDs
- V-248829
- Rule IDs
- SV-248829r991589_rule
Fix: F-52217r943070_fix
Configure OL 8 to disable the ability to use the "atm" kernel module. Create a file under "/etc/modprobe.d" with the following command: $ sudo touch /etc/modprobe.d/atm.conf Add the following line to the created file: install atm /bin/false Configure OL 8 to disable the ability to use the atm kernel module. $ sudo vi /etc/modprobe.d/blacklist.conf Add or update the line: blacklist atm
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040022
- Vuln IDs
- V-248830
- Rule IDs
- SV-248830r991589_rule
Fix: F-52218r943073_fix
Configure OL 8 to disable the ability to use the "can" kernel module. Create a file under "/etc/modprobe.d" with the following command: $ sudo touch /etc/modprobe.d/can.conf Add the following line to the created file: install can /bin/false Configure OL 8 to disable the ability to use the can kernel module. $ sudo vi /etc/modprobe.d/blacklist.conf Add or update the line: blacklist can
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040023
- Vuln IDs
- V-248831
- Rule IDs
- SV-248831r991589_rule
Fix: F-52219r943076_fix
Configure OL 8 to disable the ability to use the "sctp" kernel module. Create a file under "/etc/modprobe.d" with the following command: $ sudo touch /etc/modprobe.d/sctp.conf Add the following line to the created file: install sctp /bin/false Configure OL 8 to disable the ability to use the sctp kernel module. $ sudo vi /etc/modprobe.d/blacklist.conf Add or update the line: blacklist sctp
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- OL08-00-040024
- Vuln IDs
- V-248832
- Rule IDs
- SV-248832r958478_rule
Fix: F-52220r943079_fix
Configure the operating system to disable the ability to use the TIPC protocol kernel module. Add or update the following lines in the file "/etc/modprobe.d/blacklist.conf": install tipc /bin/false blacklist tipc Reboot the system for the settings to take effect.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- OL08-00-040025
- Vuln IDs
- V-248833
- Rule IDs
- SV-248833r958478_rule
Fix: F-52221r943082_fix
Configure the operating system to disable the ability to use the cramfs kernel module. Add or update the following lines in the file "/etc/modprobe.d/blacklist.conf": install cramfs /bin/false blacklist cramfs Reboot the system for the settings to take effect.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- OL08-00-040026
- Vuln IDs
- V-248834
- Rule IDs
- SV-248834r958478_rule
Fix: F-52222r943085_fix
Configure the operating system to disable the ability to use the firewire-core kernel module. Add or update the following lines in the file "/etc/modprobe.d/blacklist.conf": install firewire-core /bin/false blacklist firewire-core Reboot the system for the settings to take effect.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- OL08-00-040070
- Vuln IDs
- V-248836
- Rule IDs
- SV-248836r958498_rule
Fix: F-52224r780073_fix
Configure OL 8 to disable the ability to automount devices. Turn off the automount service with the following commands: $ sudo systemctl stop autofs $ sudo systemctl disable autofs If "autofs" is required for Network File System (NFS), it must be documented with the ISSO.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- OL08-00-040080
- Vuln IDs
- V-248837
- Rule IDs
- SV-248837r986386_rule
Fix: F-52225r943088_fix
Configure OL 8 to disable the ability to use the USB Storage kernel module and to use USB mass storage devices. $ sudo vi /etc/modprobe.d/blacklist.conf Add or update the lines: install usb-storage /bin/false blacklist usb-storage Reboot the system for the settings to take effect.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- OL08-00-040100
- Vuln IDs
- V-248840
- Rule IDs
- SV-248840r958672_rule
Fix: F-52228r780085_fix
Install "firewalld" with the following commands: $ sudo yum install firewalld.noarch
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- OL08-00-040101
- Vuln IDs
- V-248841
- Rule IDs
- SV-248841r958672_rule
Fix: F-52229r780088_fix
Configure "firewalld" to protect the operating system with the following commands: $ sudo systemctl enable firewalld $ sudo systemctl start firewalld
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001443
- Version
- OL08-00-040111
- Vuln IDs
- V-248843
- Rule IDs
- SV-248843r991569_rule
Fix: F-52231r943091_fix
Configure the operating system to disable the Bluetooth adapter when not in use. Build or modify the "/etc/modprobe.d/bluetooth.conf" file with the following line: install bluetooth /bin/false Disable the ability to use the Bluetooth kernel module. $ sudo vi /etc/modprobe.d/blacklist.conf Add or update the line: blacklist bluetooth Reboot the system for the settings to take effect.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040120
- Vuln IDs
- V-248844
- Rule IDs
- SV-248844r958804_rule
Fix: F-52232r780097_fix
Configure OL 8 so that "/dev/shm" is mounted with the "nodev" option by adding/modifying "/etc/fstab" with the following line: tmpfs /dev/shm tmpfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040121
- Vuln IDs
- V-248845
- Rule IDs
- SV-248845r958804_rule
Fix: F-52233r780100_fix
Configure OL 8 so that "/dev/shm" is mounted with the "nosuid" option by adding/modifying "/etc/fstab" with the following line: tmpfs /dev/shm tmpfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040122
- Vuln IDs
- V-248846
- Rule IDs
- SV-248846r958804_rule
Fix: F-52234r780103_fix
Configure OL 8 so that "/dev/shm" is mounted with the "noexec" option by adding/modifying "/etc/fstab" with the following line: tmpfs /dev/shm tmpfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040123
- Vuln IDs
- V-248847
- Rule IDs
- SV-248847r958804_rule
Fix: F-52235r780106_fix
Configure the system so that /tmp is mounted with the "nodev" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/ol-tmp /tmp xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040124
- Vuln IDs
- V-248848
- Rule IDs
- SV-248848r958804_rule
Fix: F-52236r780109_fix
Configure the system so that /tmp is mounted with the "nosuid" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/ol-tmp /tmp xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040125
- Vuln IDs
- V-248849
- Rule IDs
- SV-248849r958804_rule
Fix: F-52237r780112_fix
Configure the system so that /tmp is mounted with the "noexec" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/ol-tmp /tmp xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040126
- Vuln IDs
- V-248850
- Rule IDs
- SV-248850r958804_rule
Fix: F-52238r780115_fix
Configure the system so that /var/log is mounted with the "nodev" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/ol-var_log /var/log xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040127
- Vuln IDs
- V-248851
- Rule IDs
- SV-248851r958804_rule
Fix: F-52239r780118_fix
Configure the system so that /var/log is mounted with the "nosuid" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/ol-var_log /var/log xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040128
- Vuln IDs
- V-248852
- Rule IDs
- SV-248852r958804_rule
Fix: F-52240r780121_fix
Configure the system so that /var/log is mounted with the "noexec" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/ol-var_log /var/log xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040129
- Vuln IDs
- V-248853
- Rule IDs
- SV-248853r958804_rule
Fix: F-52241r780124_fix
Configure the system so that /var/log/audit is mounted with the "nodev" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/ol-var_log_audit /var/log/audit xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040130
- Vuln IDs
- V-248854
- Rule IDs
- SV-248854r958804_rule
Fix: F-52242r780127_fix
Configure the system so that /var/log/audit is mounted with the "nosuid" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/ol-var_log_audit /var/log/audit xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040131
- Vuln IDs
- V-248855
- Rule IDs
- SV-248855r958804_rule
Fix: F-52243r780130_fix
Configure the system so that /var/log/audit is mounted with the "noexec" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/ol-var_log_audit /var/log/audit xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040132
- Vuln IDs
- V-248856
- Rule IDs
- SV-248856r958804_rule
Fix: F-52244r780133_fix
Configure the system so that /var/tmp is mounted with the "nodev" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/ol-var_tmp /var/tmp xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040133
- Vuln IDs
- V-248857
- Rule IDs
- SV-248857r958804_rule
Fix: F-52245r780136_fix
Configure the system so that /var/tmp is mounted with the "nosuid" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/ol-var_tmp /var/tmp xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040134
- Vuln IDs
- V-248858
- Rule IDs
- SV-248858r958804_rule
Fix: F-52246r780139_fix
Configure the system so that /var/tmp is mounted with the "noexec" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/ol-var_tmp /var/tmp xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040135
- Vuln IDs
- V-248859
- Rule IDs
- SV-248859r958804_rule
Fix: F-52247r780142_fix
Install "fapolicyd" with the following command: $ sudo yum install fapolicyd.x86_64
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- OL08-00-040136
- Vuln IDs
- V-248860
- Rule IDs
- SV-248860r958804_rule
Fix: F-52248r780145_fix
Enable "fapolicyd" using the following command: $ sudo systemctl enable --now fapolicyd
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- OL08-00-040139
- Vuln IDs
- V-248862
- Rule IDs
- SV-248862r986387_rule
Fix: F-52250r780151_fix
Install the USBGuard package with the following command: $ sudo yum install usbguard.x86_64
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- OL08-00-040141
- Vuln IDs
- V-248864
- Rule IDs
- SV-248864r986388_rule
Fix: F-52252r780157_fix
Configure the operating system to enable the blocking of unauthorized peripherals with the following commands: $ sudo systemctl enable usbguard.service $ sudo systemctl start usbguard.service Note: Enabling and starting usbguard without properly configuring it for an individual system will immediately prevent any access over a usb device such as a keyboard or mouse.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- OL08-00-040150
- Vuln IDs
- V-248865
- Rule IDs
- SV-248865r958528_rule
Fix: F-52253r902787_fix
Configure "nftables" to be the default "firewallbackend" for "firewalld" by adding or editing the following line in "/etc/firewalld/firewalld.conf": FirewallBackend=nftables Establish rate-limiting rules based on organization-defined types of DoS attacks on impacted network interfaces.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- OL08-00-040159
- Vuln IDs
- V-248866
- Rule IDs
- SV-248866r958908_rule
Fix: F-52254r780163_fix
Install SSH packages onto the host with the following command: $ sudo yum install openssh-server.x86_64
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- OL08-00-040160
- Vuln IDs
- V-248867
- Rule IDs
- SV-248867r958908_rule
Fix: F-52255r780166_fix
Configure the SSH service to automatically start after reboot with the following command: $ sudo systemctl enable sshd.service
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- OL08-00-040161
- Vuln IDs
- V-248868
- Rule IDs
- SV-248868r958408_rule
Fix: F-52256r780169_fix
Configure the system to force a frequent session key renegotiation for SSH connections to the server by adding or modifying the following line in the "/etc/ssh/sshd_config" file: RekeyLimit 1G 1h The SSH daemon must be restarted for the settings to take effect. $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-040170
- Vuln IDs
- V-248869
- Rule IDs
- SV-248869r991589_rule
Fix: F-52257r833245_fix
Configure the system to disable the Ctrl-Alt-Delete sequence for the command line with the following commands: $ sudo systemctl disable ctrl-alt-del.target $ sudo systemctl mask ctrl-alt-del.target Created symlink /etc/systemd/system/ctrl-alt-del.target -> /dev/null Reload the daemon to take effect: $ sudo systemctl daemon-reload
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-040171
- Vuln IDs
- V-248870
- Rule IDs
- SV-248870r991589_rule
Fix: F-52258r780175_fix
Configure the system to disable the Ctrl-Alt-Delete sequence when using a graphical user interface by creating or editing the "/etc/dconf/db/local.d/00-disable-CAD" file. Add the setting to disable the Ctrl-Alt-Delete sequence for a graphical user interface: [org/gnome/settings-daemon/plugins/media-keys] logout='' Update the dconf settings: $ sudo dconf update
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040172
- Vuln IDs
- V-248871
- Rule IDs
- SV-248871r991589_rule
Fix: F-52259r780178_fix
Configure the system to disable the CtrlAltDelBurstAction by added or modifying the following line in the "/etc/systemd/system.conf" configuration file: CtrlAltDelBurstAction=none Reload the daemon for this change to take effect: $ sudo systemctl daemon-reload
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- OL08-00-040180
- Vuln IDs
- V-248872
- Rule IDs
- SV-248872r991589_rule
Fix: F-52260r780181_fix
Configure the system to mask the "debug-shell systemd" service with the following command: $ sudo systemctl mask debug-shell.service Created symlink /etc/systemd/system/debug-shell.service -> /dev/null Reload the daemon to take effect: $ sudo systemctl daemon-reload
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-040190
- Vuln IDs
- V-248873
- Rule IDs
- SV-248873r991589_rule
Fix: F-52261r780184_fix
Remove the TFTP package from the system with the following command: $ sudo yum remove tftp-server
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-040200
- Vuln IDs
- V-248874
- Rule IDs
- SV-248874r991589_rule
Fix: F-52262r780187_fix
Change the UID of any account on the system, other than root, that has a UID of "0". If the account is associated with system commands or applications, change the UID to one greater than "0" but less than "1000". Otherwise, assign a UID of greater than "1000" that has not already been assigned.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040209
- Vuln IDs
- V-248875
- Rule IDs
- SV-248875r991589_rule
Fix: F-52263r858650_fix
Configure OL 8 to prevent IPv4 ICMP redirect messages from being accepted with the following command: $ sudo sysctl -w net.ipv4.conf.default.accept_redirects=0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "0" is not the system's default value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv4.conf.default.accept_redirects=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040210
- Vuln IDs
- V-248876
- Rule IDs
- SV-248876r991589_rule
Fix: F-52264r858652_fix
Configure OL 8 to prevent IPv6 ICMP redirect messages from being accepted with the following command: $ sudo sysctl -w net.ipv6.conf.default.accept_redirects=0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "0" is not the system's default value, add or update the following line in "/etc/sysctl.conf" or in the appropriate file under "/etc/sysctl.d": net.ipv6.conf.default.accept_redirects=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040220
- Vuln IDs
- V-248877
- Rule IDs
- SV-248877r991589_rule
Fix: F-52265r858654_fix
Configure OL 8 to not allow interfaces to perform IPv4 ICMP redirects with the following command: $ sudo sysctl -w net.ipv4.conf.all.send_redirects=0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "0" is not the system's default value, add or update the following line in "/etc/sysctl.conf" or in the appropriate file under "/etc/sysctl.d": net.ipv4.conf.all.send_redirects=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040230
- Vuln IDs
- V-248878
- Rule IDs
- SV-248878r991589_rule
Fix: F-52266r858656_fix
Configure OL 8 to not respond to IPv4 ICMP echoes sent to a broadcast address with the following command: $ sudo sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "1" is not the system's default value, add or update the following line in "/etc/sysctl.conf" or in the appropriate file under "/etc/sysctl.d": net.ipv4.icmp_echo_ignore_broadcasts=1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040239
- Vuln IDs
- V-248879
- Rule IDs
- SV-248879r991589_rule
Fix: F-52267r858658_fix
Configure OL 8 to not forward IPv4 source-routed packets with the following command: $ sudo sysctl -w net.ipv4.conf.all.accept_source_route=0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "0" is not the system's all value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv4.conf.all.accept_source_route=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040240
- Vuln IDs
- V-248880
- Rule IDs
- SV-248880r991589_rule
Fix: F-52268r858660_fix
Configure OL 8 to not forward IPv6 source-routed packets with the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_source_route=0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "0" is not the system's all value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv6.conf.all.accept_source_route=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040249
- Vuln IDs
- V-248881
- Rule IDs
- SV-248881r991589_rule
Fix: F-52269r858662_fix
Configure OL 8 to not forward IPv4 source-routed packets by default with the following command: $ sudo sysctl -w net.ipv4.conf.default.accept_source_route=0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "0" is not the system's default value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv4.conf.default.accept_source_route=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040250
- Vuln IDs
- V-248882
- Rule IDs
- SV-248882r991589_rule
Fix: F-52270r858664_fix
Configure OL 8 to not forward IPv6 source-routed packets by default with the following command: $ sudo sysctl -w net.ipv6.conf.default.accept_source_route=0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "0" is not the system's default value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv6.conf.default.accept_source_route=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040260
- Vuln IDs
- V-248883
- Rule IDs
- SV-248883r991589_rule
Fix: F-52271r858668_fix
Configure OL 8 to not allow IPv6 packet forwarding unless the system is a router with the following command: $ sudo sysctl -w net.ipv6.conf.all.forwarding=0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "0" is not the system's default value, add or update the following lines in "/etc/sysctl.conf" or in the appropriate file under "/etc/sysctl.d": net.ipv6.conf.all.forwarding=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040261
- Vuln IDs
- V-248884
- Rule IDs
- SV-248884r991589_rule
Fix: F-52272r858670_fix
Configure the system to not accept router advertisements on all IPv6 interfaces unless the system is a router with the following commands: $ sudo sysctl -w net.ipv6.conf.all.accept_ra=0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "0" is not the system's default value, add or update the following lines in the appropriate file under "/etc/sysctl.d": net.ipv6.conf.all.accept_ra=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040262
- Vuln IDs
- V-248885
- Rule IDs
- SV-248885r991589_rule
Fix: F-52273r858672_fix
Configure the system to not accept router advertisements on all IPv6 interfaces by default, unless the system is a router, with the following commands: $ sudo sysctl -w net.ipv6.conf.default.accept_ra=0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "0" is not the system's default value, add or update the following lines in the appropriate file under "/etc/sysctl.d": net.ipv6.conf.default.accept_ra=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040270
- Vuln IDs
- V-248886
- Rule IDs
- SV-248886r991589_rule
Fix: F-52274r858674_fix
Configure OL 8 to not allow interfaces to perform Internet Protocol version 4 (IPv4) ICMP redirects by default with the following command: $ sudo sysctl -w net.ipv4.conf.default.send_redirects=0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "0" is not the system's default value, add or update the following line in "/etc/sysctl.conf" or in the appropriate file under "/etc/sysctl.d": net.ipv4.conf.default.send_redirects=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040279
- Vuln IDs
- V-248887
- Rule IDs
- SV-248887r991589_rule
Fix: F-52275r858676_fix
Configure OL 8 to ignore IPv4 ICMP redirect messages with the following command: $ sudo sysctl -w net.ipv4.conf.all.accept_redirects=0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "0" is not the system's default value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv4.conf.all.accept_redirects = 0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040280
- Vuln IDs
- V-248888
- Rule IDs
- SV-248888r991589_rule
Fix: F-52276r858678_fix
Configure OL 8 to ignore IPv6 ICMP redirect messages with the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf If "0" is not the system's default value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv6.conf.all.accept_redirects = 0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040281
- Vuln IDs
- V-248889
- Rule IDs
- SV-248889r991589_rule
Fix: F-52277r858680_fix
Configure the system to prevent privilege escalation through the kernel by disabling access to the "bpf" syscall by adding the following line to a file in the "/etc/sysctl.d" directory: kernel.unprivileged_bpf_disabled = 1 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf The system configuration files must be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040282
- Vuln IDs
- V-248890
- Rule IDs
- SV-248890r991589_rule
Fix: F-52278r858682_fix
Configure the system to restrict the use of "ptrace" to descendant processes by adding the following line to a file in the "/etc/sysctl.d" directory: kernel.yama.ptrace_scope = 1 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf The system configuration files must be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040283
- Vuln IDs
- V-248891
- Rule IDs
- SV-248891r991589_rule
Fix: F-52279r858684_fix
Configure the system to restrict exposed kernel pointer addresses access by adding the following line to a file in the "/etc/sysctl.d" directory: kernel.kptr_restrict = 1 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf The system configuration files must be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040284
- Vuln IDs
- V-248892
- Rule IDs
- SV-248892r991589_rule
Fix: F-52280r928561_fix
Configure the system to disable the use of user namespaces by adding the following line to a file in the "/etc/sysctl.d" directory: user.max_user_namespaces = 0 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf The system configuration files must be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040285
- Vuln IDs
- V-248893
- Rule IDs
- SV-248893r991589_rule
Fix: F-52281r858688_fix
Configure the system to use reverse path filtering on all IPv4 interfaces by adding the following line to a file in the "/etc/sysctl.d" directory: net.ipv4.conf.all.rp_filter = 1 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf The system configuration files must be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040286
- Vuln IDs
- V-248894
- Rule IDs
- SV-248894r991589_rule
Fix: F-52282r858690_fix
Configure OL 8 to enable hardening for the BPF JIT compiler by adding the following line to a file in the "/etc/sysctl.d" directory: net.core.bpf_jit_harden = 2 Remove any configurations that conflict with the above from the following locations: /run/sysctl.d/*.conf /usr/local/lib/sysctl.d/*.conf /usr/lib/sysctl.d/*.conf /lib/sysctl.d/*.conf /etc/sysctl.conf /etc/sysctl.d/*.conf The system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040290
- Vuln IDs
- V-248895
- Rule IDs
- SV-248895r991589_rule
Fix: F-52283r780250_fix
If "postfix" is installed, modify the "/etc/postfix/main.cf" file to restrict client connections to the local network with the following command: $ sudo postconf -e 'smtpd_client_restrictions = permit_mynetworks,reject'
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040320
- Vuln IDs
- V-248898
- Rule IDs
- SV-248898r991589_rule
Fix: F-52286r780259_fix
Document the requirement for a display server with the ISSO or remove the related packages with the following example command: $ sudo rpm -e xorg-x11-server-common
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040330
- Vuln IDs
- V-248899
- Rule IDs
- SV-248899r991589_rule
Fix: F-52287r780262_fix
Configure network interfaces to turn off promiscuous mode unless approved by the ISSO and documented. Set the promiscuous mode of an interface to "off" with the following command: $ sudo ip link set dev <devicename> multicast off promisc off
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040340
- Vuln IDs
- V-248900
- Rule IDs
- SV-248900r991589_rule
Fix: F-52288r780265_fix
Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "X11Forwarding" keyword and set its value to "no" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): X11Forwarding no The SSH service must be restarted for changes to take effect: $ sudo systemctl restart sshd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040341
- Vuln IDs
- V-248901
- Rule IDs
- SV-248901r991589_rule
Fix: F-52289r780268_fix
Configure the OL 8 SSH daemon to prevent remote hosts from connecting to the proxy display. Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "X11UseLocalhost" keyword and set its value to "yes" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): X11UseLocalhost yes
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040350
- Vuln IDs
- V-248902
- Rule IDs
- SV-248902r991589_rule
Fix: F-52290r780271_fix
Configure the TFTP daemon to operate in secure mode by adding the following line to "/etc/xinetd.d/tftp" (or modify the line to have the required value): server_args = -s /var/lib/tftpboot
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-040360
- Vuln IDs
- V-248903
- Rule IDs
- SV-248903r991589_rule
Fix: F-52291r780274_fix
Document the FTP server package with the ISSO as an operational requirement or remove it from the system with the following command: $ sudo yum remove vsftpd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040370
- Vuln IDs
- V-248904
- Rule IDs
- SV-248904r991589_rule
Fix: F-52292r780277_fix
Configure OL 8 to disable non-essential capabilities by removing the "gssproxy" package from the system with the following command: $ sudo yum remove gssproxy
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040380
- Vuln IDs
- V-248905
- Rule IDs
- SV-248905r991589_rule
Fix: F-52293r780280_fix
Configure OL 8 to disable non-essential capabilities by removing the "iprutils" package from the system with the following command: $ sudo yum remove iprutils
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040390
- Vuln IDs
- V-248906
- Rule IDs
- SV-248906r991589_rule
Fix: F-52294r780283_fix
Configure OL 8 to disable non-essential capabilities by removing the "tuned" package from the system with the following command: $ sudo yum remove tuned
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- OL08-00-010121
- Vuln IDs
- V-252650
- Rule IDs
- SV-252650r991589_rule
Fix: F-56056r818745_fix
Configure all accounts on the system to have a password or lock the account with the following commands: Perform a password reset: $ sudo passwd [username] Lock an account: $ sudo passwd -l [username]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- OL08-00-010331
- Vuln IDs
- V-252651
- Rule IDs
- SV-252651r991560_rule
Fix: F-56057r818748_fix
Configure the library directories to be protected from unauthorized access. Run the following command, replacing "[DIRECTORY]" with any library directory with a mode more permissive than 755. $ sudo chmod 755 [DIRECTORY]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- OL08-00-010341
- Vuln IDs
- V-252652
- Rule IDs
- SV-252652r991560_rule
Fix: F-56058r818751_fix
Configure the system-wide shared library directories within (/lib, /lib64, /usr/lib and /usr/lib64) to be protected from unauthorized access. Run the following command, replacing "[DIRECTORY]" with any library directory not owned by "root". $ sudo chown root [DIRECTORY]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- OL08-00-010351
- Vuln IDs
- V-252653
- Rule IDs
- SV-252653r991560_rule
Fix: F-56059r818754_fix
Configure the system-wide shared library directories (/lib, /lib64, /usr/lib and /usr/lib64) to be protected from unauthorized access. Run the following command, replacing "[DIRECTORY]" with any library directory not group-owned by "root". $ sudo chgrp root [DIRECTORY]
- RMF Control
- Severity
- M
- CCI
- CCI-004895
- Version
- OL08-00-010385
- Vuln IDs
- V-252656
- Rule IDs
- SV-252656r1050789_rule
Fix: F-56062r818763_fix
Configure the operating system to require users to supply a password for privilege escalation. Check the configuration of the "/etc/ pam.d/sudo" file with the following command: $ sudo vi /etc/pam.d/sudo Remove any occurrences of " pam_succeed_if " in the file.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-020101
- Vuln IDs
- V-252657
- Rule IDs
- SV-252657r991589_rule
Fix: F-56063r902811_fix
Configure the operating system to use "pwquality" to enforce password complexity rules. Add the following line to the "/etc/pam.d/system-auth" file (or modify the line to have the required value): password requisite pam_pwquality.so
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-020102
- Vuln IDs
- V-252658
- Rule IDs
- SV-252658r991589_rule
Fix: F-56064r902814_fix
Configure the operating system to limit the "pwquality" retry option to 3. Add the following line to the "/etc/pam.d/system-auth" file (or modify the line to have the required value): password requisite pam_pwquality.so retry=3
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-020103
- Vuln IDs
- V-252659
- Rule IDs
- SV-252659r991589_rule
Fix: F-56065r902817_fix
Configure the operating system to limit the "pwquality" retry option to 3. Add the following line to the "/etc/pam.d/password-auth" file (or modify the line to have the required value): password requisite pam_pwquality.so retry=3
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- OL08-00-040321
- Vuln IDs
- V-252663
- Rule IDs
- SV-252663r991589_rule
Fix: F-56069r818784_fix
Document the requirement for a graphical user interface with the ISSO or reinstall the operating system without the graphical user interface. If reinstallation is not feasible, then continue with the following procedure: Open an SSH session and enter the following commands: $ sudo systemctl set-default multi-user.target A reboot is required for the changes to take effect.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- OL08-00-020035
- Vuln IDs
- V-257259
- Rule IDs
- SV-257259r970703_rule
Fix: F-60885r917918_fix
Configure OL 8 to log out idle sessions by editing the /etc/systemd/logind.conf file with the following line: StopIdleSessionSec=900 The "logind" service must be restarted for the changes to take effect. To restart the "logind" service, run the following command: $ sudo systemctl restart systemd-logind