Red Hat Enterprise Linux 7 STIG SCAP Benchmark
Open a previous version of this SCAP benchmark.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- RHEL-07-010030
- Vuln IDs
- V-204393
- Rule IDs
- SV-204393r603261_rule
Fix: F-4517r88372_fix
Configure the operating system to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. Note: If the system does not have GNOME installed, this requirement is Not Applicable. Create a database to contain the system-wide graphical user logon settings (if it does not already exist) with the following command: # touch /etc/dconf/db/local.d/01-banner-message Add the following line to the [org/gnome/login-screen] section of the "/etc/dconf/db/local.d/01-banner-message": [org/gnome/login-screen] banner-message-enable=true Update the system databases: # dconf update Users must log out and back in again before the system-wide settings take effect.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- RHEL-07-010060
- Vuln IDs
- V-204396
- Rule IDs
- SV-204396r880746_rule
Fix: F-4520r880745_fix
Configure the operating system to enable a user's session lock until that user re-establishes access using established identification and authentication procedures. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following example: # touch /etc/dconf/db/local.d/00-screensaver Edit the "[org/gnome/desktop/screensaver]" section of the database file and add or update the following lines: # Set this to true to lock the screen when the screensaver activates lock-enabled=true Update the system databases: # dconf update Users must log out and back in again before the system-wide settings take effect.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- RHEL-07-010061
- Vuln IDs
- V-204397
- Rule IDs
- SV-204397r853879_rule
Fix: F-4521r88384_fix
Configure the operating system to uniquely identify and authenticate users using multifactor authentication via a graphical user logon. Note: If the system does not have GNOME installed, this requirement is Not Applicable. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: Note: The example is using the database local for the system, so if the system is using another database in "/etc/dconf/profile/user", the file should be created under the appropriate subdirectory. # touch /etc/dconf/db/local.d/00-defaults Edit "[org/gnome/login-screen]" and add or update the following line: enable-smartcard-authentication=true Update the system databases: # dconf update
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- RHEL-07-010070
- Vuln IDs
- V-204398
- Rule IDs
- SV-204398r880770_rule
Fix: F-4522r880769_fix
Configure the operating system to initiate a screensaver after a 15-minute period of inactivity for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: # touch /etc/dconf/db/local.d/00-screensaver Edit /etc/dconf/db/local.d/00-screensaver and add or update the following lines: [org/gnome/desktop/session] # Set the lock time out to 900 seconds before the session is considered idle idle-delay=uint32 900 You must include the "uint32" along with the integer key values as shown. Update the system databases: # dconf update Users must log out and back in again before the system-wide settings take effect.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- RHEL-07-010081
- Vuln IDs
- V-204399
- Rule IDs
- SV-204399r880773_rule
Fix: F-4523r880772_fix
Configure the operating system to prevent a user from overriding a screensaver lock after a 15-minute period of inactivity for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: Note: The example below is using the database "local" for the system, so if the system is using another database in "/etc/dconf/profile/user", the file should be created under the appropriate subdirectory. # touch /etc/dconf/db/local.d/locks/session Add the setting to lock the screensaver lock delay: /org/gnome/desktop/screensaver/lock-delay
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- RHEL-07-010100
- Vuln IDs
- V-204402
- Rule IDs
- SV-204402r880782_rule
Fix: F-4526r880781_fix
Configure the operating system to initiate a session lock after a 15-minute period of inactivity for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: # touch /etc/dconf/db/local.d/00-screensaver Add the setting to enable screensaver locking after 15 minutes of inactivity: [org/gnome/desktop/screensaver] idle-activation-enabled=true Update the system databases: # dconf update Users must log out and back in again before the system-wide settings take effect.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- RHEL-07-010101
- Vuln IDs
- V-204403
- Rule IDs
- SV-204403r880785_rule
Fix: F-4527r880784_fix
Configure the operating system to prevent a user from overriding a screensaver lock after a 15-minute period of inactivity for graphical user interfaces. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: Note: The example below is using the database "local" for the system, so if the system is using another database in "/etc/dconf/profile/user", the file should be created under the appropriate subdirectory. # touch /etc/dconf/db/local.d/locks/session Add the setting to lock the screensaver idle-activation-enabled setting: /org/gnome/desktop/screensaver/idle-activation-enabled
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- RHEL-07-010110
- Vuln IDs
- V-204404
- Rule IDs
- SV-204404r880788_rule
Fix: F-4528r880787_fix
Configure the operating system to initiate a session lock for graphical user interfaces when a screensaver is activated. Create a database to contain the system-wide screensaver settings (if it does not already exist) with the following command: # touch /etc/dconf/db/local.d/00-screensaver Add the setting to enable session locking when a screensaver is activated: [org/gnome/desktop/screensaver] lock-delay=uint32 5 The "uint32" must be included along with the integer key values as shown. Update the system databases: # dconf update Users must log out and back in again before the system-wide settings take effect.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- RHEL-07-010118
- Vuln IDs
- V-204405
- Rule IDs
- SV-204405r603261_rule
Fix: F-4529r88408_fix
Configure PAM to utilize /etc/pam.d/system-auth when changing passwords. Add the following line to "/etc/pam.d/passwd" (or modify the line to have the required value): password substack system-auth
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- RHEL-07-010119
- Vuln IDs
- V-204406
- Rule IDs
- SV-204406r902704_rule
Fix: F-4530r902703_fix
Configure the operating system to use "pwquality" to enforce password complexity rules. Add the following line to "/etc/pam.d/system-auth" (or modify the line to have the required value): password requisite pam_pwquality.so retry=3 Note: The value of "retry" should be between "1" and "3".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- RHEL-07-010120
- Vuln IDs
- V-204407
- Rule IDs
- SV-204407r603261_rule
Fix: F-4531r88414_fix
Configure the operating system to enforce password complexity by requiring that at least one upper-case character be used by setting the "ucredit" option. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): ucredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- RHEL-07-010130
- Vuln IDs
- V-204408
- Rule IDs
- SV-204408r603261_rule
Fix: F-4532r88417_fix
Configure the system to require at least one lower-case character when creating or changing a password. Add or modify the following line in "/etc/security/pwquality.conf": lcredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- RHEL-07-010140
- Vuln IDs
- V-204409
- Rule IDs
- SV-204409r603261_rule
Fix: F-4533r88420_fix
Configure the operating system to enforce password complexity by requiring that at least one numeric character be used by setting the "dcredit" option. Add the following line to /etc/security/pwquality.conf (or modify the line to have the required value): dcredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- RHEL-07-010150
- Vuln IDs
- V-204410
- Rule IDs
- SV-204410r603261_rule
Fix: F-4534r88423_fix
Configure the operating system to enforce password complexity by requiring that at least one special character be used by setting the "ocredit" option. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): ocredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- RHEL-07-010160
- Vuln IDs
- V-204411
- Rule IDs
- SV-204411r603261_rule
Fix: F-4535r88426_fix
Configure the operating system to require the change of at least eight of the total number of characters when passwords are changed by setting the "difok" option. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): difok = 8
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- RHEL-07-010170
- Vuln IDs
- V-204412
- Rule IDs
- SV-204412r603261_rule
Fix: F-4536r88429_fix
Configure the operating system to require the change of at least four character classes when passwords are changed by setting the "minclass" option. Add the following line to "/etc/security/pwquality.conf conf" (or modify the line to have the required value): minclass = 4
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- RHEL-07-010180
- Vuln IDs
- V-204413
- Rule IDs
- SV-204413r603261_rule
Fix: F-4537r88432_fix
Configure the operating system to require the change of the number of repeating consecutive characters when passwords are changed by setting the "maxrepeat" option. Add the following line to "/etc/security/pwquality.conf conf" (or modify the line to have the required value): maxrepeat = 3
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- RHEL-07-010190
- Vuln IDs
- V-204414
- Rule IDs
- SV-204414r809186_rule
Fix: F-4538r88435_fix
Configure the operating system to require the change of the number of repeating characters of the same character class when passwords are changed by setting the "maxclassrepeat" option. Add the following line to "/etc/security/pwquality.conf" conf (or modify the line to have the required value): maxclassrepeat = 4
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- RHEL-07-010200
- Vuln IDs
- V-204415
- Rule IDs
- SV-204415r917816_rule
Fix: F-4539r917815_fix
Configure the operating system to store only SHA512 encrypted representations of passwords. Add the following line in "/etc/pam.d/system-auth": password sufficient pam_unix.so sha512 shadow try_first_pass use_authtok Add the following line in "/etc/pam.d/password-auth": password sufficient pam_unix.so sha512 shadow try_first_pass use_authtok Note: Per requirement RHEL-07-010199, RHEL 7 must be configured to not overwrite custom authentication configuration settings while using the authconfig utility; otherwise, manual changes to the listed files will be overwritten whenever the authconfig utility is used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- RHEL-07-010210
- Vuln IDs
- V-204416
- Rule IDs
- SV-204416r877397_rule
Fix: F-4540r88441_fix
Configure the operating system to store only SHA512 encrypted representations of passwords. Add or update the following line in "/etc/login.defs": ENCRYPT_METHOD SHA512
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- RHEL-07-010220
- Vuln IDs
- V-204417
- Rule IDs
- SV-204417r877397_rule
Fix: F-4541r88444_fix
Configure the operating system to store only SHA512 encrypted representations of passwords. Add or update the following line in "/etc/libuser.conf" in the [defaults] section: crypt_style = sha512
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- RHEL-07-010230
- Vuln IDs
- V-204418
- Rule IDs
- SV-204418r603261_rule
Fix: F-4542r88447_fix
Configure the operating system to enforce 24 hours/1 day as the minimum password lifetime. Add the following line in "/etc/login.defs" (or modify the line to have the required value): PASS_MIN_DAYS 1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- RHEL-07-010240
- Vuln IDs
- V-204419
- Rule IDs
- SV-204419r603261_rule
Fix: F-4543r88450_fix
Configure non-compliant accounts to enforce a 24 hours/1 day minimum password lifetime: # chage -m 1 [user]
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- RHEL-07-010250
- Vuln IDs
- V-204420
- Rule IDs
- SV-204420r603261_rule
Fix: F-4544r88453_fix
Configure the operating system to enforce a 60-day maximum password lifetime restriction. Add the following line in "/etc/login.defs" (or modify the line to have the required value): PASS_MAX_DAYS 60
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- RHEL-07-010260
- Vuln IDs
- V-204421
- Rule IDs
- SV-204421r603261_rule
Fix: F-4545r88456_fix
Configure non-compliant accounts to enforce a 60-day maximum password lifetime restriction. # chage -M 60 [user]
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- RHEL-07-010270
- Vuln IDs
- V-204422
- Rule IDs
- SV-204422r917818_rule
Fix: F-4546r917817_fix
Configure the operating system to prohibit password reuse for a minimum of five generations. Add the following line in "/etc/pam.d/system-auth" (or modify the line to have the required value): password requisite pam_pwhistory.so remember=5 retry=3 Add the following line in "/etc/pam.d/password-auth" (or modify the line to have the required value): password requisite pam_pwhistory.so use_authtok remember=5 retry=3 Note: Per requirement RHEL-07-010199, RHEL 7 must be configured to not overwrite custom authentication configuration settings while using the authconfig utility; otherwise, manual changes to the listed files will be overwritten whenever the authconfig utility is used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- RHEL-07-010280
- Vuln IDs
- V-204423
- Rule IDs
- SV-204423r603261_rule
Fix: F-4547r88462_fix
Configure operating system to enforce a minimum 15-character password length. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): minlen = 15
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-07-010290
- Vuln IDs
- V-204424
- Rule IDs
- SV-204424r880839_rule
Fix: F-4548r880838_fix
If an account is configured for password authentication but does not have an assigned password, it may be possible to log on to the account without authenticating. Remove any instances of the "nullok" option in "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" to prevent logons with empty passwords. Note: Per requirement RHEL-07-010199, RHEL 7 must be configured to not overwrite custom authentication configuration settings while using the authconfig utility, otherwise manual changes to the listed files will be overwritten whenever the authconfig utility is used.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000766
- Version
- RHEL-07-010300
- Vuln IDs
- V-204425
- Rule IDs
- SV-204425r603261_rule
Fix: F-4549r88468_fix
To explicitly disallow remote logon from accounts with empty passwords, add or correct the following line in "/etc/ssh/sshd_config": PermitEmptyPasswords no The SSH service must be restarted for changes to take effect. Any accounts with empty passwords should be disabled immediately, and PAM configuration should prevent users from being able to assign themselves empty passwords.
- RMF Control
- IA-4
- Severity
- M
- CCI
- CCI-000795
- Version
- RHEL-07-010310
- Vuln IDs
- V-204426
- Rule IDs
- SV-204426r928568_rule
Fix: F-4550r928567_fix
Configure the operating system to disable account identifiers (individuals, groups, roles, and devices) 35 days after the password has expired. Add the following line to "/etc/default/useradd" (or modify the line to have the required value): INACTIVE=35 DOD recommendation is 35 days, but a lower value is acceptable. The value "-1" will disable this feature, and "0" will disable the account immediately after the password expires.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- RHEL-07-010340
- Vuln IDs
- V-204429
- Rule IDs
- SV-204429r861003_rule
Fix: F-36303r861002_fix
Configure the operating system to require users to supply a password for privilege escalation. Check the configuration of the "/etc/sudoers" file with the following command: $ sudo visudo Remove any occurrences of "NOPASSWD" tags in the file. Check the configuration of the /etc/sudoers.d/* files with the following command: $ sudo grep -ir nopasswd /etc/sudoers.d Remove any occurrences of "NOPASSWD" tags in the file.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- RHEL-07-010350
- Vuln IDs
- V-204430
- Rule IDs
- SV-204430r853885_rule
Fix: F-4554r88483_fix
Configure the operating system to require users to reauthenticate for privilege escalation. Check the configuration of the "/etc/sudoers" file with the following command: # visudo Remove any occurrences of "!authenticate" tags in the file. Check the configuration of the "/etc/sudoers.d/*" files with the following command: # grep -i authenticate /etc/sudoers /etc/sudoers.d/* Remove any occurrences of "!authenticate" tags in the file(s).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-010430
- Vuln IDs
- V-204431
- Rule IDs
- SV-204431r603261_rule
Fix: F-4555r88486_fix
Configure the operating system to enforce a delay of at least four seconds between logon prompts following a failed console logon attempt. Modify the "/etc/login.defs" file to set the "FAIL_DELAY" parameter to "4" or greater: FAIL_DELAY 4
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-07-010440
- Vuln IDs
- V-204432
- Rule IDs
- SV-204432r877377_rule
Fix: F-4556r88489_fix
Configure the operating system to not allow an unattended or automatic logon to the system via a graphical user interface. Note: If the system does not have GNOME installed, this requirement is Not Applicable. Add or edit the line for the "AutomaticLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false": [daemon] AutomaticLoginEnable=false
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-07-010450
- Vuln IDs
- V-204433
- Rule IDs
- SV-204433r877377_rule
Fix: F-4557r88492_fix
Configure the operating system to not allow an unrestricted account to log on to the system via a graphical user interface. Note: If the system does not have GNOME installed, this requirement is Not Applicable. Add or edit the line for the "TimedLoginEnable" parameter in the [daemon] section of the "/etc/gdm/custom.conf" file to "false": [daemon] TimedLoginEnable=false
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-010460
- Vuln IDs
- V-204434
- Rule IDs
- SV-204434r877377_rule
Fix: F-4558r88495_fix
Configure the operating system to not allow users to override environment variables to the SSH daemon. Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for "PermitUserEnvironment" keyword and set the value to "no": PermitUserEnvironment no The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-010470
- Vuln IDs
- V-204435
- Rule IDs
- SV-204435r877377_rule
Fix: F-4559r88498_fix
Configure the operating system to not allow a non-certificate trusted host SSH logon to the system. Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for "HostbasedAuthentication" keyword and set the value to "no": HostbasedAuthentication no The SSH service must be restarted for changes to take effect.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- RHEL-07-010481
- Vuln IDs
- V-204437
- Rule IDs
- SV-204437r603261_rule
Fix: F-4561r88504_fix
Configure the operating system to require authentication upon booting into single-user and maintenance modes. Add or modify the "ExecStart" line in "/usr/lib/systemd/system/rescue.service" to include "/usr/sbin/sulogin": ExecStart=-/bin/sh -c "/usr/sbin/sulogin; /usr/bin/systemctl --fail --no-block default"
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- RHEL-07-010482
- Vuln IDs
- V-204438
- Rule IDs
- SV-204438r744095_rule
Fix: F-4562r744094_fix
Configure the system to encrypt the boot password for the grub superusers account with the grub2-setpassword command, which creates/overwrites the /boot/grub2/user.cfg file. Generate an encrypted grub2 password for the grub superusers account with the following command: $ sudo grub2-setpassword Enter password: Confirm password:
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- RHEL-07-010491
- Vuln IDs
- V-204440
- Rule IDs
- SV-204440r744098_rule
Fix: F-4564r744097_fix
Configure the system to encrypt the boot password for the grub superusers account with the grub2-setpassword command, which creates/overwrites the /boot/efi/EFI/redhat/user.cfg file. Generate an encrypted grub2 password for the grub superusers account with the following command: $ sudo grub2-setpassword Enter password: Confirm password:
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- RHEL-07-020000
- Vuln IDs
- V-204442
- Rule IDs
- SV-204442r603261_rule
Fix: F-4566r88519_fix
Configure the operating system to disable non-essential capabilities by removing the rsh-server package from the system with the following command: # yum remove rsh-server
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- RHEL-07-020010
- Vuln IDs
- V-204443
- Rule IDs
- SV-204443r603261_rule
Fix: F-4567r88522_fix
Configure the operating system to disable non-essential capabilities by removing the "ypserv" package from the system with the following command: # yum remove ypserv
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-001744
- Version
- RHEL-07-020030
- Vuln IDs
- V-204445
- Rule IDs
- SV-204445r902698_rule
Fix: F-36304r902697_fix
Configure the file integrity tool to run automatically on the system at least weekly. The following example output is generic. It will set cron to run AIDE daily, but other file integrity tools may be used: # more /etc/cron.daily/aide #!/bin/bash /usr/sbin/aide --check | /bin/mail -s "$HOSTNAME - Daily AIDE integrity check run" root@example_server_name.mil Note: Per requirement RHEL-07-020028, the "mailx" package must be installed on the system to enable email functionality.
- RMF Control
- CM-5
- Severity
- H
- CCI
- CCI-001749
- Version
- RHEL-07-020050
- Vuln IDs
- V-204447
- Rule IDs
- SV-204447r877463_rule
Fix: F-4571r88534_fix
Configure the operating system to verify the signature of packages from a repository prior to install by setting the following option in the "/etc/yum.conf" file: gpgcheck=1
- RMF Control
- CM-5
- Severity
- H
- CCI
- CCI-001749
- Version
- RHEL-07-020060
- Vuln IDs
- V-204448
- Rule IDs
- SV-204448r877463_rule
Fix: F-4572r88537_fix
Configure the operating system to verify the signature of local packages prior to install by setting the following option in the "/etc/yum.conf" file: localpkg_gpgcheck=1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-020100
- Vuln IDs
- V-204449
- Rule IDs
- SV-204449r942894_rule
Fix: F-4573r942893_fix
Configure the operating system to disable the ability to use the USB Storage kernel module. Create a file under "/etc/modprobe.d" with the following command: # touch /etc/modprobe.d/usb-storage.conf Add the following line to the created file: install usb-storage /bin/false Configure the operating system to disable the ability to use USB mass storage devices. # vi /etc/modprobe.d/blacklist.conf Add or update the line: blacklist usb-storage
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- RHEL-07-020101
- Vuln IDs
- V-204450
- Rule IDs
- SV-204450r942897_rule
Fix: F-4574r942896_fix
Configure the operating system to disable the ability to use the DCCP kernel module. Create a file under "/etc/modprobe.d" with the following command: # touch /etc/modprobe.d/dccp.conf Add the following line to the created file: install dccp /bin/false Ensure that the DCCP module is blacklisted: # vi /etc/modprobe.d/blacklist.conf Add or update the line: blacklist dccp
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-020110
- Vuln IDs
- V-204451
- Rule IDs
- SV-204451r853893_rule
Fix: F-4575r88546_fix
Configure the operating system to disable the ability to automount devices. Turn off the automount service with the following commands: # systemctl stop autofs # systemctl disable autofs If "autofs" is required for Network File System (NFS), it must be documented with the ISSO.
- RMF Control
- SI-2
- Severity
- L
- CCI
- CCI-002617
- Version
- RHEL-07-020200
- Vuln IDs
- V-204452
- Rule IDs
- SV-204452r853894_rule
Fix: F-4576r88549_fix
Configure the operating system to remove all software components after updated versions have been installed. Set the "clean_requirements_on_remove" option to "1" in the "/etc/yum.conf" file: clean_requirements_on_remove=1
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- RHEL-07-020220
- Vuln IDs
- V-204454
- Rule IDs
- SV-204454r942903_rule
Fix: F-36307r942902_fix
Configure the operating system to verify correct operation of all security functions. Set the "SELinuxtype" to the "targeted" policy by modifying the "/etc/selinux/config" file to have the following line: SELINUXTYPE=targeted A reboot is required for the changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-020240
- Vuln IDs
- V-204457
- Rule IDs
- SV-204457r603261_rule
Fix: F-4581r88564_fix
Configure the operating system to define default permissions for all authenticated users in such a way that the user can only read and modify their own files. Add or edit the line for the "UMASK" parameter in "/etc/login.defs" file to "077": UMASK 077
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-07-020250
- Vuln IDs
- V-204458
- Rule IDs
- SV-204458r744100_rule
Fix: F-4582r462547_fix
Upgrade to a supported version of the operating system.
- RMF Control
- IA-2
- Severity
- L
- CCI
- CCI-000764
- Version
- RHEL-07-020300
- Vuln IDs
- V-204461
- Rule IDs
- SV-204461r603261_rule
Fix: F-4585r88576_fix
Configure the system to define all GIDs found in the "/etc/passwd" file by modifying the "/etc/group" file to add any non-existent group referenced in the "/etc/passwd" file, or change the GIDs referenced in the "/etc/passwd" file to a group that exists in "/etc/group".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-07-020310
- Vuln IDs
- V-204462
- Rule IDs
- SV-204462r603261_rule
Fix: F-4586r88579_fix
Change the UID of any account on the system, other than root, that has a UID of "0". If the account is associated with system commands or applications, the UID should be changed to one greater than "0" but less than "1000". Otherwise, assign a UID of greater than "1000" that has not already been assigned.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-020610
- Vuln IDs
- V-204466
- Rule IDs
- SV-204466r603261_rule
Fix: F-4590r88591_fix
Configure the operating system to assign home directories to all new local interactive users by setting the "CREATE_HOME" parameter in "/etc/login.defs" to "yes" as follows. CREATE_HOME yes
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-020620
- Vuln IDs
- V-204467
- Rule IDs
- SV-204467r603826_rule
Fix: F-4591r462550_fix
Create home directories to all local interactive users that currently do not have a home directory assigned. Use the following commands to create the user home directory assigned in "/etc/ passwd": Note: The example will be for the user smithj, who has a home directory of "/home/smithj", a UID of "smithj", and a Group Identifier (GID) of "users" assigned in "/etc/passwd". # mkdir /home/smithj # chown smithj /home/smithj # chgrp users /home/smithj # chmod 0750 /home/smithj
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-021020
- Vuln IDs
- V-204482
- Rule IDs
- SV-204482r603261_rule
Fix: F-4606r88639_fix
Configure the "/etc/fstab" to use the "nosuid" option on file systems that are being imported via NFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-021021
- Vuln IDs
- V-204483
- Rule IDs
- SV-204483r603261_rule
Fix: F-4607r88642_fix
Configure the "/etc/fstab" to use the "noexec" option on file systems that are being imported via NFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-021030
- Vuln IDs
- V-204487
- Rule IDs
- SV-204487r744106_rule
Fix: F-36308r602634_fix
All directories in local partitions which are world-writable should be group-owned by root or another system account. If any world-writable directories are not group-owned by a system account, this should be investigated. Following this, the directories should be deleted or assigned to an appropriate group.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-021110
- Vuln IDs
- V-204490
- Rule IDs
- SV-204490r603261_rule
Fix: F-4614r88663_fix
Set the owner on the "/etc/cron.allow" file to root with the following command: # chown root /etc/cron.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-021120
- Vuln IDs
- V-204491
- Rule IDs
- SV-204491r603261_rule
Fix: F-4615r88666_fix
Set the group owner on the "/etc/cron.allow" file to root with the following command: # chgrp root /etc/cron.allow
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- RHEL-07-021310
- Vuln IDs
- V-204493
- Rule IDs
- SV-204493r603840_rule
Fix: F-4617r88672_fix
Migrate the "/home" directory onto a separate file system/partition.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- RHEL-07-021320
- Vuln IDs
- V-204494
- Rule IDs
- SV-204494r603261_rule
Fix: F-4618r88675_fix
Migrate the "/var" path onto a separate file system.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- RHEL-07-021330
- Vuln IDs
- V-204495
- Rule IDs
- SV-204495r603261_rule
Fix: F-4619r88678_fix
Migrate the system audit data path onto a separate file system.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- RHEL-07-021340
- Vuln IDs
- V-204496
- Rule IDs
- SV-204496r603261_rule
Fix: F-36309r602637_fix
Start the "tmp.mount" service with the following command: # systemctl enable tmp.mount OR Edit the "/etc/fstab" file and ensure the "/tmp" directory is defined in the fstab with a device and mount point.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- RHEL-07-021350
- Vuln IDs
- V-204497
- Rule IDs
- SV-204497r877398_rule
Fix: F-36310r602640_fix
Configure the operating system to implement DoD-approved encryption by installing the dracut-fips package. To enable strict FIPS compliance, the fips=1 kernel option needs to be added to the kernel command line during system installation so key generation is done with FIPS-approved algorithms and continuous monitoring tests in place. Configure the operating system to implement DoD-approved encryption by following the steps below: The fips=1 kernel option needs to be added to the kernel command line during system installation so that key generation is done with FIPS-approved algorithms and continuous monitoring tests in place. Users should also ensure that the system has plenty of entropy during the installation process by moving the mouse around, or if no mouse is available, ensuring that many keystrokes are typed. The recommended amount of keystrokes is 256 and more. Less than 256 keystrokes may generate a non-unique key. Install the dracut-fips package with the following command: # yum install dracut-fips Recreate the "initramfs" file with the following command: Note: This command will overwrite the existing "initramfs" file. # dracut -f Modify the kernel command line of the current kernel in the "grub.cfg" file by adding the following option to the GRUB_CMDLINE_LINUX key in the "/etc/default/grub" file and then rebuild the "grub.cfg" file: fips=1 Changes to "/etc/default/grub" require rebuilding the "grub.cfg" file as follows: On BIOS-based machines, use the following command: # grub2-mkconfig -o /boot/grub2/grub.cfg On UEFI-based machines, use the following command: # grub2-mkconfig -o /boot/efi/EFI/redhat/grub.cfg If /boot or /boot/efi reside on separate partitions, the kernel parameter boot=<partition of /boot or /boot/efi> must be added to the kernel command line. You can identify a partition by running the df /boot or df /boot/efi command: # df /boot Filesystem 1K-blocks Used Available Use% Mounted on /dev/sda1 495844 53780 416464 12% /boot To ensure the "boot=" configuration option will work even if device naming changes occur between boots, identify the universally unique identifier (UUID) of the partition with the following command: # blkid /dev/sda1 /dev/sda1: UUID="05c000f1-a213-759e-c7a2-f11b7424c797" TYPE="ext4" For the example above, append the following string to the kernel command line: boot=UUID=05c000f1-a213-759e-c7a2-f11b7424c797 If the file /etc/system-fips does not exists, recreate it: # touch /etc/ system-fips Reboot the system for the changes to take effect.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- RHEL-07-021710
- Vuln IDs
- V-204502
- Rule IDs
- SV-204502r603261_rule
Fix: F-4626r88699_fix
Configure the operating system to disable non-essential capabilities by removing the telnet-server package from the system with the following command: # yum remove telnet-server
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- RHEL-07-030000
- Vuln IDs
- V-204503
- Rule IDs
- SV-204503r603261_rule
Fix: F-36311r602643_fix
Configure the operating system to produce audit records containing information to establish when (date and time) the events occurred. Enable the auditd service with the following command: # systemctl start auditd.service
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- RHEL-07-030010
- Vuln IDs
- V-204504
- Rule IDs
- SV-204504r880761_rule
Fix: F-4628r880760_fix
Configure the operating system to shut down in the event of an audit processing failure. Add or correct the option to shut down the operating system with the following command: # auditctl -f 2 Edit the "/etc/audit/rules.d/audit.rules" file and add the following line: -f 2 If availability has been determined to be more important, and this decision is documented with the ISSO, configure the operating system to notify system administration staff and ISSO staff in the event of an audit processing failure with the following command: # auditctl -f 1 Edit the "/etc/audit/rules.d/audit.rules" file and add the following line: -f 1 Kernel log monitoring must also be configured to properly alert designated staff. The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- RHEL-07-030201
- Vuln IDs
- V-204506
- Rule IDs
- SV-204506r877390_rule
Fix: F-4630r858479_fix
Edit the /etc/audisp/plugins.d/au-remote.conf file and add or update the following values: active = yes direction = out path = /sbin/audisp-remote type = always The audit daemon must be restarted for changes to take effect: # service auditd restart
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- RHEL-07-030210
- Vuln IDs
- V-204507
- Rule IDs
- SV-204507r877390_rule
Fix: F-36312r602646_fix
Edit the /etc/audisp/audispd.conf file and add or update the "overflow_action" option: overflow_action = syslog The audit daemon must be restarted for changes to take effect: # service auditd restart
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- RHEL-07-030211
- Vuln IDs
- V-204508
- Rule IDs
- SV-204508r877390_rule
Fix: F-36313r602649_fix
Edit the /etc/audisp/audispd.conf file and add or update the "name_format" option: name_format = hostname The audit daemon must be restarted for changes to take effect: # service auditd restart
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- RHEL-07-030300
- Vuln IDs
- V-204509
- Rule IDs
- SV-204509r877390_rule
Fix: F-4633r88720_fix
Configure the operating system to off-load audit records onto a different system or media from the system being audited. Set the remote server option in "/etc/audisp/audisp-remote.conf" with the IP address of the log aggregation server.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- RHEL-07-030310
- Vuln IDs
- V-204510
- Rule IDs
- SV-204510r877390_rule
Fix: F-4634r88723_fix
Configure the operating system to encrypt the transfer of off-loaded audit records onto a different system or media from the system being audited. Uncomment the "enable_krb5" option in "/etc/audisp/audisp-remote.conf" and set it with the following line: enable_krb5 = yes
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- RHEL-07-030320
- Vuln IDs
- V-204511
- Rule IDs
- SV-204511r877390_rule
Fix: F-36314r602652_fix
Configure the action the operating system takes if the disk the audit records are written to becomes full. Uncomment or edit the "disk_full_action" option in "/etc/audisp/audisp-remote.conf" and set it to "syslog", "single", or "halt", such as the following line: disk_full_action = single
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- RHEL-07-030321
- Vuln IDs
- V-204512
- Rule IDs
- SV-204512r877390_rule
Fix: F-36315r602655_fix
Configure the action the operating system takes if there is an error sending audit records to a remote system. Uncomment the "network_failure_action" option in "/etc/audisp/audisp-remote.conf" and set it to "syslog", "single", or "halt". network_failure_action = syslog
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- RHEL-07-030340
- Vuln IDs
- V-204514
- Rule IDs
- SV-204514r877389_rule
Fix: F-4638r88735_fix
Configure the operating system to immediately notify the SA and ISSO (at a minimum) when the threshold for the repository maximum audit record storage capacity is reached. Uncomment or edit the "space_left_action" keyword in "/etc/audit/auditd.conf" and set it to "email". space_left_action = email
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- RHEL-07-030350
- Vuln IDs
- V-204515
- Rule IDs
- SV-204515r877389_rule
Fix: F-4639r88738_fix
Configure the operating system to immediately notify the SA and ISSO (at a minimum) when the threshold for the repository maximum audit record storage capacity is reached. Uncomment or edit the "action_mail_acct" keyword in "/etc/audit/auditd.conf" and set it to root and any other accounts associated with security personnel. action_mail_acct = root
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- RHEL-07-030360
- Vuln IDs
- V-204516
- Rule IDs
- SV-204516r853914_rule
Fix: F-4640r88741_fix
Configure the operating system to audit the execution of privileged functions. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k setuid -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k setuid -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k setgid -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k setgid The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- RHEL-07-030370
- Vuln IDs
- V-204517
- Rule IDs
- SV-204517r809570_rule
Fix: F-4641r809192_fix
Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S chown,fchown,fchownat,lchown -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S chown,fchown,fchownat,lchown -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- RHEL-07-030410
- Vuln IDs
- V-204521
- Rule IDs
- SV-204521r809772_rule
Fix: F-4645r809771_fix
Configure the operating system to generate audit records upon successful/unsuccessful attempts to use the "chmod", "fchmod", and "fchmodat" syscalls. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S chmod,fchmod,fchmodat -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S chmod,fchmod,fchmodat -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- RHEL-07-030440
- Vuln IDs
- V-204524
- Rule IDs
- SV-204524r809775_rule
Fix: F-4648r809774_fix
Configure the operating system to generate audit records upon successful/unsuccessful attempts to use the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" syscalls. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- RHEL-07-030510
- Vuln IDs
- V-204531
- Rule IDs
- SV-204531r853917_rule
Fix: F-4655r853916_fix
Configure the operating system to generate audit records upon successful/unsuccessful attempts to use the "creat", "open", "openat", "open_by_handle_at", "truncate", and "ftruncate" syscalls. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b32 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid>=1000 -F auid!=unset -k access -a always,exit -F arch=b64 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=unset -k access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- RHEL-07-030560
- Vuln IDs
- V-204536
- Rule IDs
- SV-204536r861014_rule
Fix: F-4660r861013_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "semanage" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/semanage -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- RHEL-07-030570
- Vuln IDs
- V-204537
- Rule IDs
- SV-204537r861017_rule
Fix: F-4661r861016_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "setsebool" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/setsebool -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- RHEL-07-030580
- Vuln IDs
- V-204538
- Rule IDs
- SV-204538r861020_rule
Fix: F-4662r861019_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "chcon" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/chcon -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- RHEL-07-030590
- Vuln IDs
- V-204539
- Rule IDs
- SV-204539r861023_rule
Fix: F-4663r861022_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "setfiles" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/setfiles -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- RHEL-07-030610
- Vuln IDs
- V-204540
- Rule IDs
- SV-204540r853930_rule
Fix: F-4664r88813_fix
Configure the operating system to generate audit records when unsuccessful account access events occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /var/run/faillock -p wa -k logins The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-2
- Severity
- M
- CCI
- CCI-000126
- Version
- RHEL-07-030620
- Vuln IDs
- V-204541
- Rule IDs
- SV-204541r853931_rule
Fix: F-4665r88816_fix
Configure the operating system to generate audit records when successful account access events occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /var/log/lastlog -p wa -k logins The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- RHEL-07-030630
- Vuln IDs
- V-204542
- Rule IDs
- SV-204542r861026_rule
Fix: F-4666r861025_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "passwd" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/passwd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- RHEL-07-030640
- Vuln IDs
- V-204543
- Rule IDs
- SV-204543r861029_rule
Fix: F-4667r861028_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "unix_chkpwd" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- RHEL-07-030650
- Vuln IDs
- V-204544
- Rule IDs
- SV-204544r861032_rule
Fix: F-4668r861031_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "gpasswd" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- RHEL-07-030660
- Vuln IDs
- V-204545
- Rule IDs
- SV-204545r861035_rule
Fix: F-4669r861034_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "chage" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/chage -F perm=x -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- RHEL-07-030670
- Vuln IDs
- V-204546
- Rule IDs
- SV-204546r861038_rule
Fix: F-4670r861037_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "userhelper" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/userhelper -F perm=x -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- RHEL-07-030680
- Vuln IDs
- V-204547
- Rule IDs
- SV-204547r861041_rule
Fix: F-4671r861040_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "su" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/su -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- RHEL-07-030690
- Vuln IDs
- V-204548
- Rule IDs
- SV-204548r861044_rule
Fix: F-4672r861043_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "sudo" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/sudo -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- RHEL-07-030700
- Vuln IDs
- V-204549
- Rule IDs
- SV-204549r853953_rule
Fix: F-4673r88840_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to access the "/etc/sudoers" file and files in the "/etc/sudoers.d/" directory. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /etc/sudoers -p wa -k privileged-actions -w /etc/sudoers.d/ -p wa -k privileged-actions The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- RHEL-07-030710
- Vuln IDs
- V-204550
- Rule IDs
- SV-204550r861047_rule
Fix: F-4674r861046_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "newgrp" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/newgrp -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- RHEL-07-030720
- Vuln IDs
- V-204551
- Rule IDs
- SV-204551r861050_rule
Fix: F-4675r861049_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "chsh" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/chsh -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- RHEL-07-030740
- Vuln IDs
- V-204552
- Rule IDs
- SV-204552r861053_rule
Fix: F-4676r861052_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "mount" command and syscall occur. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S mount -F auid>=1000 -F auid!=unset -k privileged-mount -a always,exit -F arch=b64 -S mount -F auid>=1000 -F auid!=unset -k privileged-mount -a always,exit -F path=/usr/bin/mount -F perm=x -F auid>=1000 -F auid!=unset -k privileged-mount The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- RHEL-07-030750
- Vuln IDs
- V-204553
- Rule IDs
- SV-204553r861056_rule
Fix: F-4677r861055_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "umount" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/umount -F perm=x -F auid>=1000 -F auid!=unset -k privileged-mount The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- RHEL-07-030760
- Vuln IDs
- V-204554
- Rule IDs
- SV-204554r861059_rule
Fix: F-4678r861058_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "postdrop" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/postdrop -F perm=x -F auid>=1000 -F auid!=unset -k privileged-postfix The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- RHEL-07-030770
- Vuln IDs
- V-204555
- Rule IDs
- SV-204555r861062_rule
Fix: F-4679r861061_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "postqueue" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/postqueue -F perm=x -F auid>=1000 -F auid!=unset -k privileged-postfix The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- RHEL-07-030780
- Vuln IDs
- V-204556
- Rule IDs
- SV-204556r861065_rule
Fix: F-4680r861064_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "ssh-keysign" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/libexec/openssh/ssh-keysign -F perm=x -F auid>=1000 -F auid!=unset -k privileged-ssh The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- RHEL-07-030800
- Vuln IDs
- V-204557
- Rule IDs
- SV-204557r861068_rule
Fix: F-4681r861067_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "crontab" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/crontab -F perm=x -F auid>=1000 -F auid!=unset -k privileged-cron The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- RHEL-07-030810
- Vuln IDs
- V-204558
- Rule IDs
- SV-204558r833166_rule
Fix: F-4682r833165_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "pam_timestamp_check" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/sbin/pam_timestamp_check -F perm=x -F auid>=1000 -F auid!=unset -k privileged-pam The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- RHEL-07-030819
- Vuln IDs
- V-204559
- Rule IDs
- SV-204559r833169_rule
Fix: F-4683r833168_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "create_module" syscall occur. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S create_module -F auid>=1000 -F auid!=unset -k module-change -a always,exit -F arch=b64 -S create_module -F auid>=1000 -F auid!=unset -k module-change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- RHEL-07-030820
- Vuln IDs
- V-204560
- Rule IDs
- SV-204560r833172_rule
Fix: F-4684r833171_fix
Configure the operating system to generate audit records upon successful/unsuccessful attempts to use the "init_module" and "finit_module" syscalls. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S init_module,finit_module -F auid>=1000 -F auid!=unset -k modulechange -a always,exit -F arch=b64 -S init_module,finit_module -F auid>=1000 -F auid!=unset -k modulechange The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- RHEL-07-030830
- Vuln IDs
- V-204562
- Rule IDs
- SV-204562r833175_rule
Fix: F-4686r833174_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "delete_module" syscall occur. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S delete_module -F auid>=1000 -F auid!=unset -k module-change -a always,exit -F arch=b64 -S delete_module -F auid>=1000 -F auid!=unset -k module-change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- RHEL-07-030840
- Vuln IDs
- V-204563
- Rule IDs
- SV-204563r858498_rule
Fix: F-4687r858497_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to use the "kmod" command occur. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/kmod -F perm=x -F auid>=1000 -F auid!=unset -k modules The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- RHEL-07-030870
- Vuln IDs
- V-204564
- Rule IDs
- SV-204564r853978_rule
Fix: F-4688r88885_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/passwd". Add or update the following rule "/etc/audit/rules.d/audit.rules": -w /etc/passwd -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- RHEL-07-030871
- Vuln IDs
- V-204565
- Rule IDs
- SV-204565r853979_rule
Fix: F-4689r88888_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/group". Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /etc/group -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- RHEL-07-030872
- Vuln IDs
- V-204566
- Rule IDs
- SV-204566r853980_rule
Fix: F-4690r88891_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/gshadow". Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /etc/gshadow -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- RHEL-07-030873
- Vuln IDs
- V-204567
- Rule IDs
- SV-204567r853981_rule
Fix: F-4691r88894_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow. Add or update the following file system rule in "/etc/audit/rules.d/audit.rules": -w /etc/shadow -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- RHEL-07-030874
- Vuln IDs
- V-204568
- Rule IDs
- SV-204568r853982_rule
Fix: F-4692r744114_fix
Configure the operating system to generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd. Add or update the following file system rule in "/etc/audit/rules.d/audit.rules": -w /etc/security/opasswd -p wa -k identity The audit daemon must be restarted for the changes to take effect: # systemctl restart auditd
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- RHEL-07-030910
- Vuln IDs
- V-204572
- Rule IDs
- SV-204572r853985_rule
Fix: F-4696r853984_fix
Configure the operating system to generate audit records upon successful/unsuccessful attempts to use the "unlink", "unlinkat", "rename", "renameat", and "rmdir" syscalls. Add the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S unlink,unlinkat,rename,renameat,rmdir -F auid>=1000 -F auid!=unset -k delete -a always,exit -F arch=b64 -S unlink,unlinkat,rename,renameat,rmdir -F auid>=1000 -F auid!=unset -k delete The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- RHEL-07-040000
- Vuln IDs
- V-204576
- Rule IDs
- SV-204576r877399_rule
Fix: F-4700r88921_fix
Configure the operating system to limit the number of concurrent sessions to "10" for all accounts and/or account types. Add the following line to the top of the /etc/security/limits.conf or in a ".conf" file defined in /etc/security/limits.d/ : * hard maxlogins 10
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- RHEL-07-040110
- Vuln IDs
- V-204578
- Rule IDs
- SV-204578r877398_rule
Fix: F-4702r622306_fix
Configure SSH to use FIPS 140-2 approved cryptographic algorithms. Add the following line (or modify the line to have the required value) to the "/etc/ssh/sshd_config" file (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor). Ciphers aes256-ctr,aes192-ctr,aes128-ctr The SSH service must be restarted for changes to take effect.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- RHEL-07-040160
- Vuln IDs
- V-204579
- Rule IDs
- SV-204579r861070_rule
Fix: F-4703r646843_fix
Configure the operating system to terminate all network connections associated with a communications session at the end of the session or after a period of inactivity. Create a script to enforce the inactivity timeout (for example /etc/profile.d/tmout.sh) such as: #!/bin/bash declare -xr TMOUT=900
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040201
- Vuln IDs
- V-204584
- Rule IDs
- SV-204584r880794_rule
Fix: F-4708r880793_fix
Configure the operating system implement virtual address space randomization. Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a config file in the /etc/sysctl.d/ directory (or modify the line to have the required value): kernel.randomize_va_space = 2 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- RHEL-07-040300
- Vuln IDs
- V-204585
- Rule IDs
- SV-204585r916422_rule
Fix: F-4709r88948_fix
Install SSH packages onto the host with the following commands: # yum install openssh-server.x86_64
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- RHEL-07-040320
- Vuln IDs
- V-204587
- Rule IDs
- SV-204587r917833_rule
Fix: F-4711r917832_fix
Note: This setting must be applied in conjunction with RHEL-07-040340 to function correctly. Configure the SSH server to terminate a user session automatically after the SSH client has been unresponsive for 10 minutes. Add the following line (or modify the line to have the required value) to the "/etc/ssh/sshd_config" file (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): ClientAliveInterval 600 The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040330
- Vuln IDs
- V-204588
- Rule IDs
- SV-204588r603261_rule
Fix: F-4712r88957_fix
Configure the SSH daemon to not allow authentication using RSA rhosts authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "no": RhostsRSAAuthentication no The SSH service must be restarted for changes to take effect.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- RHEL-07-040340
- Vuln IDs
- V-204589
- Rule IDs
- SV-204589r917836_rule
Fix: F-4713r917835_fix
Note: This setting must be applied in conjunction with RHEL-07-040320 to function correctly. Configure the SSH server to terminate a user session automatically after the SSH client has become unresponsive. Add the following line (or modify the line to have the required value) to the "/etc/ssh/sshd_config" file (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): ClientAliveCountMax 0 The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040350
- Vuln IDs
- V-204590
- Rule IDs
- SV-204590r603261_rule
Fix: F-4714r88963_fix
Configure the SSH daemon to not allow authentication using known hosts authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "yes": IgnoreRhosts yes
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000052
- Version
- RHEL-07-040360
- Vuln IDs
- V-204591
- Rule IDs
- SV-204591r858477_rule
Fix: F-4715r88966_fix
Configure SSH to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/sshd" or in the "sshd_config" file used by the system ("/etc/ssh/sshd_config" will be used in the example) (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor). Modify the "PrintLastLog" line in "/etc/ssh/sshd_config" to match the following: PrintLastLog yes The SSH service must be restarted for changes to "sshd_config" to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040370
- Vuln IDs
- V-204592
- Rule IDs
- SV-204592r603261_rule
Fix: F-4716r88969_fix
Configure SSH to stop users from logging on remotely as the root user. Edit the appropriate "/etc/ssh/sshd_config" file to uncomment or add the line for the "PermitRootLogin" keyword and set its value to "no" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): PermitRootLogin no The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040380
- Vuln IDs
- V-204593
- Rule IDs
- SV-204593r603261_rule
Fix: F-4717r88972_fix
Configure the SSH daemon to not allow authentication using known hosts authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "yes": IgnoreUserKnownHosts yes The SSH service must be restarted for changes to take effect.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- RHEL-07-040390
- Vuln IDs
- V-204594
- Rule IDs
- SV-204594r877396_rule
Fix: F-4718r88975_fix
Remove all Protocol lines that reference version "1" in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor). The "Protocol" line must be as follows: Protocol 2 The SSH service must be restarted for changes to take effect.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- RHEL-07-040400
- Vuln IDs
- V-204595
- Rule IDs
- SV-204595r877394_rule
Fix: F-4719r622309_fix
Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "MACs" keyword and set its value to "hmac-sha2-512" and/or "hmac-sha2-256" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): MACs hmac-sha2-512,hmac-sha2-256 The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040410
- Vuln IDs
- V-204596
- Rule IDs
- SV-204596r603261_rule
Fix: F-4720r88981_fix
Note: SSH public key files may be found in other directories on the system depending on the installation. Change the mode of public host key files under "/etc/ssh" to "0644" with the following command: # chmod 0644 /etc/ssh/*.key.pub
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040420
- Vuln IDs
- V-204597
- Rule IDs
- SV-204597r880743_rule
Fix: F-4721r880742_fix
Configure the mode of SSH private host key files under "/etc/ssh" to "0640" with the following command: # chmod 0640 /path/to/file/ssh_host*key
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-000318
- Version
- RHEL-07-040430
- Vuln IDs
- V-204598
- Rule IDs
- SV-204598r853993_rule
Fix: F-4722r88987_fix
Uncomment the "GSSAPIAuthentication" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to "no": GSSAPIAuthentication no The SSH service must be restarted for changes to take effect. If GSSAPI authentication is required, it must be documented, to include the location of the configuration file, with the ISSO.
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-000318
- Version
- RHEL-07-040440
- Vuln IDs
- V-204599
- Rule IDs
- SV-204599r853994_rule
Fix: F-4723r88990_fix
Uncomment the "KerberosAuthentication" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to "no": KerberosAuthentication no The SSH service must be restarted for changes to take effect. If Kerberos authentication is required, it must be documented, to include the location of the configuration file, with the ISSO.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040450
- Vuln IDs
- V-204600
- Rule IDs
- SV-204600r603261_rule
Fix: F-4724r88993_fix
Uncomment the "StrictModes" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to "yes": StrictModes yes The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040460
- Vuln IDs
- V-204601
- Rule IDs
- SV-204601r603261_rule
Fix: F-4725r88996_fix
Uncomment the "UsePrivilegeSeparation" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to "sandbox" or "yes": UsePrivilegeSeparation sandbox The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040470
- Vuln IDs
- V-204602
- Rule IDs
- SV-204602r880758_rule
Fix: F-4726r880757_fix
Uncomment the "Compression" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) on the system and set the value to "delayed" or "no": Compression no The SSH service must be restarted for changes to take effect.
- RMF Control
- AC-9
- Severity
- L
- CCI
- CCI-000052
- Version
- RHEL-07-040530
- Vuln IDs
- V-204605
- Rule IDs
- SV-204605r858478_rule
Fix: F-4729r89008_fix
Configure the operating system to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/postlogin". Add the following line to the top of "/etc/pam.d/postlogin": session required pam_lastlog.so showfailed
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-07-040540
- Vuln IDs
- V-204606
- Rule IDs
- SV-204606r603261_rule
Fix: F-4730r89011_fix
Remove any found ".shosts" files from the system. # rm /[path]/[to]/[file]/.shosts
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-07-040550
- Vuln IDs
- V-204607
- Rule IDs
- SV-204607r603261_rule
Fix: F-4731r89014_fix
Remove any found "shosts.equiv" files from the system. # rm /[path]/[to]/[file]/shosts.equiv
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040610
- Vuln IDs
- V-204609
- Rule IDs
- SV-204609r880797_rule
Fix: F-4733r880796_fix
Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.all.accept_source_route = 0 Issue the following command to make the changes take effect: # sysctl -system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040620
- Vuln IDs
- V-204612
- Rule IDs
- SV-204612r880806_rule
Fix: F-4736r880805_fix
Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.default.accept_source_route = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040630
- Vuln IDs
- V-204613
- Rule IDs
- SV-204613r880809_rule
Fix: F-4737r880808_fix
Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.icmp_echo_ignore_broadcasts = 1 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040640
- Vuln IDs
- V-204614
- Rule IDs
- SV-204614r880812_rule
Fix: F-4738r880811_fix
Set the system to not accept IPv4 ICMP redirect messages by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.default.accept_redirects = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040641
- Vuln IDs
- V-204615
- Rule IDs
- SV-204615r880815_rule
Fix: F-4739r880814_fix
Set the system to ignore IPv4 ICMP redirect messages by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.all.accept_redirects = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040650
- Vuln IDs
- V-204616
- Rule IDs
- SV-204616r880818_rule
Fix: F-4740r880817_fix
Configure the system to not allow interfaces to perform IPv4 ICMP redirects by default. Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.default.send_redirects = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040660
- Vuln IDs
- V-204617
- Rule IDs
- SV-204617r880821_rule
Fix: F-4741r880820_fix
Configure the system to not allow interfaces to perform IPv4 ICMP redirects. Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.conf.all.send_redirects = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-07-040690
- Vuln IDs
- V-204620
- Rule IDs
- SV-204620r603261_rule
Fix: F-4744r89053_fix
Document the "vsftpd" package with the ISSO as an operational requirement or remove it from the system with the following command: # yum remove vsftpd
- RMF Control
- CM-3
- Severity
- H
- CCI
- CCI-000318
- Version
- RHEL-07-040700
- Vuln IDs
- V-204621
- Rule IDs
- SV-204621r853996_rule
Fix: F-4745r89056_fix
Remove the TFTP package from the system with the following command: # yum remove tftp-server
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040710
- Vuln IDs
- V-204622
- Rule IDs
- SV-204622r603849_rule
Fix: F-4746r622312_fix
Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "X11Forwarding" keyword and set its value to "no" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): X11Forwarding no The SSH service must be restarted for changes to take effect: # systemctl restart sshd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040730
- Vuln IDs
- V-204624
- Rule IDs
- SV-204624r646847_rule
Fix: F-36316r646846_fix
Document the requirement for a graphical user interface with the ISSO or reinstall the operating system without the graphical user interface. If reinstallation is not feasible, then continue with the following procedure: Open an SSH session and enter the following commands: $ sudo systemctl set-default multi-user.target $ sudo yum remove xorg-x11-server-Xorg xorg-x11-server-common xorg-x11-server-utils A reboot is required for the changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040740
- Vuln IDs
- V-204625
- Rule IDs
- SV-204625r880824_rule
Fix: F-4749r880823_fix
Set the system to the required kernel parameter by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv4.ip_forward = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-07-040800
- Vuln IDs
- V-204627
- Rule IDs
- SV-204627r603261_rule
Fix: F-4751r89074_fix
If the "/etc/snmp/snmpd.conf" file exists, modify any lines that contain a community string value of "public" or "private" to another string value.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-040830
- Vuln IDs
- V-204630
- Rule IDs
- SV-204630r880827_rule
Fix: F-4754r880826_fix
Set the system to the required kernel parameter, if IPv6 is enabled, by adding the following line to "/etc/sysctl.conf" or a configuration file in the /etc/sysctl.d/ directory (or modify the line to have the required value): net.ipv6.conf.all.accept_source_route = 0 Issue the following command to make the changes take effect: # sysctl --system
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- RHEL-07-041001
- Vuln IDs
- V-204631
- Rule IDs
- SV-204631r853997_rule
Fix: F-4755r462473_fix
Configure the operating system to implement multifactor authentication by installing the required packages. Install the pam_pkcs11 package with the following command: # yum install pam_pkcs11
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- RHEL-07-041002
- Vuln IDs
- V-204632
- Rule IDs
- SV-204632r853998_rule
Fix: F-4756r89089_fix
Configure the operating system to implement multifactor authentication for remote access to privileged accounts via pluggable authentication modules (PAM). Modify all of the services lines in "/etc/sssd/sssd.conf" or in configuration files found under "/etc/sssd/conf.d" to include pam.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- RHEL-07-041003
- Vuln IDs
- V-204633
- Rule IDs
- SV-204633r853999_rule
Fix: F-4757r89092_fix
Configure the operating system to do certificate status checking for PKI authentication. Modify all of the "cert_policy" lines in "/etc/pam_pkcs11/pam_pkcs11.conf" to include "ocsp_on".
- RMF Control
- CM-5
- Severity
- H
- CCI
- CCI-001749
- Version
- RHEL-07-010020
- Vuln IDs
- V-214799
- Rule IDs
- SV-214799r854001_rule
Fix: F-15997r192363_fix
Run the following command to determine which package owns the file: # rpm -qf <filename> The package can be reinstalled from a yum repository using the command: # sudo yum reinstall <packagename> Alternatively, the package can be reinstalled from trusted media using the command: # sudo rpm -Uvh <packagename>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-07-010341
- Vuln IDs
- V-237633
- Rule IDs
- SV-237633r646850_rule
Fix: F-40815r646849_fix
Remove the following entries from the sudoers file: ALL ALL=(ALL) ALL ALL ALL=(ALL:ALL) ALL
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002227
- Version
- RHEL-07-010342
- Vuln IDs
- V-237634
- Rule IDs
- SV-237634r880755_rule
Fix: F-40816r880754_fix
Define the following in the Defaults section of the /etc/sudoers file or a configuration file in the /etc/sudoers.d/ directory: Defaults !targetpw Defaults !rootpw Defaults !runaspw Remove any configurations that conflict with the above from the following locations: /etc/sudoers /etc/sudoers.d/
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- RHEL-07-010343
- Vuln IDs
- V-237635
- Rule IDs
- SV-237635r861075_rule
Fix: F-40817r858491_fix
Configure the "sudo" command to require re-authentication. Edit the /etc/sudoers file: $ sudo visudo Add or modify the following line: Defaults timestamp_timeout=[value] Note: The "[value]" must be a number that is greater than or equal to "0". Remove any duplicate or conflicting lines from /etc/sudoers and /etc/sudoers.d/ files.