Red Hat Enterprise Linux 8 Security Technical Implementation Guide
Open a previous version of this SCAP benchmark.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-08-010000
- Vuln IDs
- V-230221
- Rule IDs
- SV-230221r743913_rule
Fix: F-32865r567410_fix
Upgrade to a supported version of RHEL 8.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- RHEL-08-010020
- Vuln IDs
- V-230223
- Rule IDs
- SV-230223r627750_rule
Fix: F-32867r567416_fix
Configure the operating system to implement DoD-approved encryption by following the steps below: To enable strict FIPS compliance, the fips=1 kernel option needs to be added to the kernel boot parameters during system installation so key generation is done with FIPS-approved algorithms and continuous monitoring tests in place. Enable FIPS mode after installation (not strict FIPS compliant) with the following command: $ sudo fips-mode-setup --enable Reboot the system for the changes to take effect.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- RHEL-08-010110
- Vuln IDs
- V-230231
- Rule IDs
- SV-230231r627750_rule
Fix: F-32875r567440_fix
Configure RHEL 8 to encrypt all stored passwords. Edit/Modify the following line in the "/etc/login.defs" file and set "[ENCRYPT_METHOD]" to SHA512. ENCRYPT_METHOD SHA512
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- RHEL-08-010120
- Vuln IDs
- V-230232
- Rule IDs
- SV-230232r627750_rule
Fix: F-32876r567443_fix
Lock all interactive user accounts not using SHA-512 hashing until the passwords can be regenerated with SHA-512.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- RHEL-08-010130
- Vuln IDs
- V-230233
- Rule IDs
- SV-230233r743919_rule
Fix: F-32877r743918_fix
Configure RHEL 8 to encrypt all stored passwords with a strong cryptographic hash. Edit/modify the following line in the "/etc/pam.d/password-auth" file and set "rounds" to a value no lower than "5000": password sufficient pam_unix.so sha512 rounds=5000
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- RHEL-08-010140
- Vuln IDs
- V-230234
- Rule IDs
- SV-230234r743922_rule
Fix: F-32878r743921_fix
Configure the system to require a grub bootloader password for the grub superusers account with the grub2-setpassword command, which creates/overwrites the /boot/efi/EFI/redhat/user.cfg file. Generate an encrypted grub2 password for the grub superusers account with the following command: $ sudo grub2-setpassword Enter password: Confirm password:
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- RHEL-08-010150
- Vuln IDs
- V-230235
- Rule IDs
- SV-230235r743925_rule
Fix: F-32879r743924_fix
Configure the system to require a grub bootloader password for the grub superusers account with the grub2-setpassword command, which creates/overwrites the /boot/grub2/user.cfg file. Generate an encrypted grub2 password for the grub superusers account with the following command: $ sudo grub2-setpassword Enter password: Confirm password:
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- RHEL-08-010151
- Vuln IDs
- V-230236
- Rule IDs
- SV-230236r743928_rule
Fix: F-32880r743927_fix
Configure the system to require authentication upon booting into rescue mode by adding the following line to the "/usr/lib/systemd/system/rescue.service" file. ExecStart=-/usr/lib/systemd/systemd-sulogin-shell rescue
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- RHEL-08-010160
- Vuln IDs
- V-230237
- Rule IDs
- SV-230237r743931_rule
Fix: F-32881r743930_fix
Configure RHEL 8 to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication. Edit/modify the following line in the "/etc/pam.d/password-auth" file to include the sha512 option for pam_unix.so: password sufficient pam_unix.so sha512 rounds=5000
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- RHEL-08-010161
- Vuln IDs
- V-230238
- Rule IDs
- SV-230238r646862_rule
Fix: F-32882r567461_fix
Configure RHEL 8 to prevent system daemons from using Kerberos for authentication. Remove any files with the .keytab extension from the operating system.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- RHEL-08-010162
- Vuln IDs
- V-230239
- Rule IDs
- SV-230239r646864_rule
Fix: F-32883r567464_fix
Document the krb5-workstation package with the ISSO as an operational requirement or remove it from the system with the following command: $ sudo yum remove krb5-workstation
- RMF Control
- SC-3
- Severity
- L
- CCI
- CCI-001084
- Version
- RHEL-08-010171
- Vuln IDs
- V-230241
- Rule IDs
- SV-230241r627750_rule
Fix: F-32885r567470_fix
Configure the operating system to have the policycoreutils package installed with the following command: $ sudo yum install policycoreutils
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- RHEL-08-010200
- Vuln IDs
- V-230244
- Rule IDs
- SV-230244r743934_rule
Fix: F-32888r743933_fix
Configure RHEL 8 to automatically terminate all network connections associated with SSH traffic at the end of a session or after 10 minutes of inactivity. Modify or append the following lines in the "/etc/ssh/sshd_config" file: ClientAliveCountMax 0 In order for the changes to take effect, the SSH daemon must be restarted. $ sudo systemctl restart sshd.service
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- RHEL-08-010210
- Vuln IDs
- V-230245
- Rule IDs
- SV-230245r627750_rule
Fix: F-32889r567482_fix
Change the permissions of the file "/var/log/messages" to "0640" by running the following command: $ sudo chmod 0640 /var/log/messages
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- RHEL-08-010220
- Vuln IDs
- V-230246
- Rule IDs
- SV-230246r627750_rule
Fix: F-32890r567485_fix
Change the owner of the file /var/log/messages to root by running the following command: $ sudo chown root /var/log/messages
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- RHEL-08-010230
- Vuln IDs
- V-230247
- Rule IDs
- SV-230247r627750_rule
Fix: F-32891r567488_fix
Change the group of the file "/var/log/messages" to "root" by running the following command: $ sudo chgrp root /var/log/messages
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- RHEL-08-010240
- Vuln IDs
- V-230248
- Rule IDs
- SV-230248r627750_rule
Fix: F-32892r567491_fix
Change the permissions of the directory "/var/log" to "0755" by running the following command: $ sudo chmod 0755 /var/log
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- RHEL-08-010250
- Vuln IDs
- V-230249
- Rule IDs
- SV-230249r627750_rule
Fix: F-32893r567494_fix
Change the owner of the directory /var/log to root by running the following command: $ sudo chown root /var/log
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- RHEL-08-010260
- Vuln IDs
- V-230250
- Rule IDs
- SV-230250r627750_rule
Fix: F-32894r567497_fix
Change the group of the directory "/var/log" to "root" by running the following command: $ sudo chgrp root /var/log
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- RHEL-08-010292
- Vuln IDs
- V-230253
- Rule IDs
- SV-230253r627750_rule
Fix: F-32897r567506_fix
Configure the operating system SSH server to use strong entropy. Add or modify the following line in the "/etc/sysconfig/sshd" file. SSH_USE_STRONG_RNG=32 The SSH service must be restarted for changes to take effect.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- RHEL-08-010294
- Vuln IDs
- V-230255
- Rule IDs
- SV-230255r627750_rule
Fix: F-32899r567512_fix
Configure the RHEL 8 OpenSSL library to use only DoD-approved TLS encryption by editing the following line in the "/etc/crypto-policies/back-ends/opensslcnf.config" file: MinProtocol = TLSv1.2 A reboot is required for the changes to take effect.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- RHEL-08-010300
- Vuln IDs
- V-230257
- Rule IDs
- SV-230257r627750_rule
Fix: F-32901r567518_fix
Configure the system commands to be protected from unauthorized access. Run the following command, replacing "[FILE]" with any system command with a mode more permissive than "0755". $ sudo chmod 0755 [FILE]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- RHEL-08-010310
- Vuln IDs
- V-230258
- Rule IDs
- SV-230258r627750_rule
Fix: F-32902r567521_fix
Configure the system commands to be protected from unauthorized access. Run the following command, replacing "[FILE]" with any system command file not owned by "root". $ sudo chown root [FILE]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- RHEL-08-010320
- Vuln IDs
- V-230259
- Rule IDs
- SV-230259r627750_rule
Fix: F-32903r567524_fix
Configure the system commands to be protected from unauthorized access. Run the following command, replacing "[FILE]" with any system command file not group-owned by "root" or a required system account. $ sudo chgrp root [FILE]
- RMF Control
- CM-5
- Severity
- H
- CCI
- CCI-001749
- Version
- RHEL-08-010370
- Vuln IDs
- V-230264
- Rule IDs
- SV-230264r627750_rule
Fix: F-32908r567539_fix
Configure the operating system to verify the signature of packages from a repository prior to install by setting the following option in the "/etc/yum.repos.d/[your_repo_name].repo" file: gpgcheck=1
- RMF Control
- CM-5
- Severity
- H
- CCI
- CCI-001749
- Version
- RHEL-08-010371
- Vuln IDs
- V-230265
- Rule IDs
- SV-230265r627750_rule
Fix: F-32909r567542_fix
Configure the operating system to remove all software components after updated versions have been installed. Set the "localpkg_gpgcheck" option to "True" in the "/etc/dnf/dnf.conf" file: localpkg_gpgcheck=True
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- RHEL-08-010372
- Vuln IDs
- V-230266
- Rule IDs
- SV-230266r627750_rule
Fix: F-32910r567545_fix
Configure the operating system to disable kernel image loading. Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: kernel.kexec_load_disabled = 1 Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- RHEL-08-010373
- Vuln IDs
- V-230267
- Rule IDs
- SV-230267r627750_rule
Fix: F-32911r567548_fix
Configure the operating system to enable DAC on symlinks. Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: fs.protected_symlinks = 1 Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- RHEL-08-010374
- Vuln IDs
- V-230268
- Rule IDs
- SV-230268r627750_rule
Fix: F-32912r567551_fix
Configure the operating system to enable DAC on hardlinks. Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: fs.protected_hardlinks = 1 Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- SC-4
- Severity
- L
- CCI
- CCI-001090
- Version
- RHEL-08-010375
- Vuln IDs
- V-230269
- Rule IDs
- SV-230269r627750_rule
Fix: F-32913r567554_fix
Configure the operating system to restrict access to the kernel message buffer. Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: kernel.dmesg_restrict = 1 Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- SC-4
- Severity
- L
- CCI
- CCI-001090
- Version
- RHEL-08-010376
- Vuln IDs
- V-230270
- Rule IDs
- SV-230270r627750_rule
Fix: F-32914r567557_fix
Configure the operating system to prevent kernel profiling by unprivileged users. Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory: kernel.perf_event_paranoid = 2 Load settings from all system configuration files with the following command: $ sudo sysctl --system
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- RHEL-08-010380
- Vuln IDs
- V-230271
- Rule IDs
- SV-230271r627750_rule
Fix: F-32915r567560_fix
Remove any occurrence of "NOPASSWD" found in "/etc/sudoers" file or files in the "/etc/sudoers.d" directory.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- RHEL-08-010381
- Vuln IDs
- V-230272
- Rule IDs
- SV-230272r627750_rule
Fix: F-32916r567563_fix
Remove any occurrence of "!authenticate" found in "/etc/sudoers" file or files in the "/etc/sudoers.d" directory.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- RHEL-08-010390
- Vuln IDs
- V-230273
- Rule IDs
- SV-230273r743943_rule
Fix: F-32917r743942_fix
Configure the operating system to implement multifactor authentication by installing the required package with the following command: $ sudo yum install openssl-pkcs11
- RMF Control
- SI-2
- Severity
- L
- CCI
- CCI-002617
- Version
- RHEL-08-010440
- Vuln IDs
- V-230281
- Rule IDs
- SV-230281r627750_rule
Fix: F-32925r567590_fix
Configure the operating system to remove all software components after updated versions have been installed. Set the "clean_requirements_on_remove" option to "True" in the "/etc/dnf/dnf.conf" file: clean_requirements_on_remove=True
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002696
- Version
- RHEL-08-010450
- Vuln IDs
- V-230282
- Rule IDs
- SV-230282r627750_rule
Fix: F-32926r567593_fix
Configure the operating system to verify correct operation of all security functions. Set the "SELinuxtype" to the "targeted" policy by modifying the "/etc/selinux/config" file to have the following line: SELINUXTYPE=targeted A reboot is required for the changes to take effect.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-08-010460
- Vuln IDs
- V-230283
- Rule IDs
- SV-230283r627750_rule
Fix: F-32927r567596_fix
Remove any found "shosts.equiv" files from the system. $ sudo rm /etc/ssh/shosts.equiv
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-08-010470
- Vuln IDs
- V-230284
- Rule IDs
- SV-230284r627750_rule
Fix: F-32928r567599_fix
Remove any found ".shosts" files from the system. $ sudo rm /[path]/[to]/[file]/.shosts
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010480
- Vuln IDs
- V-230286
- Rule IDs
- SV-230286r627750_rule
Fix: F-32930r567605_fix
Change the mode of public host key files under "/etc/ssh" to "0644" with the following command: $ sudo chmod 0644 /etc/ssh/*key.pub The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010490
- Vuln IDs
- V-230287
- Rule IDs
- SV-230287r743951_rule
Fix: F-32931r743950_fix
Configure the mode of SSH private host key files under "/etc/ssh" to "0600" with the following command: $ sudo chmod 0600 /etc/ssh/ssh_host*key The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010500
- Vuln IDs
- V-230288
- Rule IDs
- SV-230288r627750_rule
Fix: F-32932r567611_fix
Configure SSH to perform strict mode checking of home directory configuration files. Uncomment the "StrictModes" keyword in "/etc/ssh/sshd_config" and set the value to "yes": StrictModes yes The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010510
- Vuln IDs
- V-230289
- Rule IDs
- SV-230289r743954_rule
Fix: F-32933r743953_fix
Uncomment the "Compression" keyword in "/etc/ssh/sshd_config" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) on the system and set the value to "delayed" or "no": Compression no The SSH service must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010520
- Vuln IDs
- V-230290
- Rule IDs
- SV-230290r627750_rule
Fix: F-32934r567617_fix
Configure the SSH daemon to not allow authentication using known host's authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "yes": IgnoreUserKnownHosts yes The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010521
- Vuln IDs
- V-230291
- Rule IDs
- SV-230291r743957_rule
Fix: F-32935r743956_fix
Configure the SSH daemon to not allow Kerberos authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "no": KerberosAuthentication no The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- RHEL-08-010540
- Vuln IDs
- V-230292
- Rule IDs
- SV-230292r627750_rule
Fix: F-32936r567623_fix
Migrate the "/var" path onto a separate file system.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- RHEL-08-010541
- Vuln IDs
- V-230293
- Rule IDs
- SV-230293r627750_rule
Fix: F-32937r567626_fix
Migrate the "/var/log" path onto a separate file system.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- RHEL-08-010542
- Vuln IDs
- V-230294
- Rule IDs
- SV-230294r627750_rule
Fix: F-32938r567629_fix
Migrate the system audit data path onto a separate file system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010543
- Vuln IDs
- V-230295
- Rule IDs
- SV-230295r627750_rule
Fix: F-32939r567632_fix
Migrate the "/tmp" directory onto a separate file system/partition.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- RHEL-08-010550
- Vuln IDs
- V-230296
- Rule IDs
- SV-230296r627750_rule
Fix: F-32940r567635_fix
Configure RHEL 8 to stop users from logging on remotely as the "root" user via SSH. Edit the appropriate "/etc/ssh/sshd_config" file to uncomment or add the line for the "PermitRootLogin" keyword and set its value to "no": PermitRootLogin no The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010560
- Vuln IDs
- V-230297
- Rule IDs
- SV-230297r627750_rule
Fix: F-32941r567638_fix
Start the auditd service, and enable the auditd service with the following commands: $ sudo systemctl start auditd.service $ sudo systemctl enable auditd.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010561
- Vuln IDs
- V-230298
- Rule IDs
- SV-230298r627750_rule
Fix: F-32942r567641_fix
Start the auditd service, and enable the rsyslog service with the following commands: $ sudo systemctl start rsyslog.service $ sudo systemctl enable rsyslog.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010571
- Vuln IDs
- V-230300
- Rule IDs
- SV-230300r743959_rule
Fix: F-32944r567647_fix
Configure the "/etc/fstab" to use the "nosuid" option on the /boot directory.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010580
- Vuln IDs
- V-230301
- Rule IDs
- SV-230301r627750_rule
Fix: F-32945r567650_fix
Configure the "/etc/fstab" to use the "nodev" option on all non-root local partitions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010630
- Vuln IDs
- V-230306
- Rule IDs
- SV-230306r627750_rule
Fix: F-32950r567665_fix
Configure the "/etc/fstab" to use the "noexec" option on file systems that are being imported via NFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010640
- Vuln IDs
- V-230307
- Rule IDs
- SV-230307r627750_rule
Fix: F-32951r567668_fix
Configure the "/etc/fstab" to use the "nodev" option on file systems that are being imported via NFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010650
- Vuln IDs
- V-230308
- Rule IDs
- SV-230308r627750_rule
Fix: F-32952r567671_fix
Configure the "/etc/fstab" to use the "nosuid" option on file systems that are being imported via NFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010671
- Vuln IDs
- V-230311
- Rule IDs
- SV-230311r627750_rule
Fix: F-32955r567680_fix
Configure RHEL 8 to disable storing core dumps by adding the following line to a file in the "/etc/sysctl.d" directory: kernel.core_pattern = |/bin/false The system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010673
- Vuln IDs
- V-230313
- Rule IDs
- SV-230313r627750_rule
Fix: F-32957r619861_fix
Configure the operating system to disable core dumps for all users. Add the following line to the top of the /etc/security/limits.conf or in a ".conf" file defined in /etc/security/limits.d/: * hard core 0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010674
- Vuln IDs
- V-230314
- Rule IDs
- SV-230314r627750_rule
Fix: F-32958r567689_fix
Configure the operating system to disable storing core dumps for all users. Add or modify the following line in /etc/systemd/coredump.conf: Storage=none
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010675
- Vuln IDs
- V-230315
- Rule IDs
- SV-230315r627750_rule
Fix: F-32959r567692_fix
Configure the operating system to disable core dump backtraces. Add or modify the following line in /etc/systemd/coredump.conf: ProcessSizeMax=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010760
- Vuln IDs
- V-230324
- Rule IDs
- SV-230324r627750_rule
Fix: F-32968r567719_fix
Configure RHEL 8 to assign home directories to all new local interactive users by setting the "CREATE_HOME" parameter in "/etc/login.defs" to "yes" as follows. CREATE_HOME yes
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010830
- Vuln IDs
- V-230330
- Rule IDs
- SV-230330r646870_rule
Fix: F-32974r567737_fix
Configure RHEL 8 to allow the SSH daemon to not allow unattended or automatic logon to the system. Add or edit the following line in the "/etc/ssh/sshd_config" file: PermitUserEnvironment no The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- RHEL-08-020010
- Vuln IDs
- V-230332
- Rule IDs
- SV-230332r627750_rule
Fix: F-32976r567743_fix
Configure the operating system to lock an account when three unsuccessful logon attempts occur. Add/Modify the appropriate sections of the "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" files to match the following lines: auth required pam_faillock.so preauth dir=/var/log/faillock silent audit deny=3 even_deny_root fail_interval=900 unlock_time=0 auth required pam_faillock.so authfail dir=/var/log/faillock unlock_time=0 account required pam_faillock.so The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command: $ sudo systemctl restart sssd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- RHEL-08-020011
- Vuln IDs
- V-230333
- Rule IDs
- SV-230333r743966_rule
Fix: F-32977r743965_fix
Configure the operating system to lock an account when three unsuccessful logon attempts occur. Add/Modify the "/etc/security/faillock.conf" file to match the following line: deny = 3
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- RHEL-08-020012
- Vuln IDs
- V-230334
- Rule IDs
- SV-230334r627750_rule
Fix: F-32978r567749_fix
Configure the operating system to lock an account when three unsuccessful logon attempts occur in 15 minutes. Add/Modify the appropriate sections of the "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" files to match the following lines: auth required pam_faillock.so preauth dir=/var/log/faillock silent audit deny=3 even_deny_root fail_interval=900 unlock_time=0 auth required pam_faillock.so authfail dir=/var/log/faillock unlock_time=0 account required pam_faillock.so The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command: $ sudo systemctl restart sssd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- RHEL-08-020013
- Vuln IDs
- V-230335
- Rule IDs
- SV-230335r743969_rule
Fix: F-32979r743968_fix
Configure the operating system to lock an account when three unsuccessful logon attempts occur in 15 minutes. Add/Modify the "/etc/security/faillock.conf" file to match the following line: fail_interval = 900
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- RHEL-08-020014
- Vuln IDs
- V-230336
- Rule IDs
- SV-230336r627750_rule
Fix: F-32980r567755_fix
Configure the operating system to lock an account until released by an administrator when three unsuccessful logon attempts occur in 15 minutes. Add/Modify the appropriate sections of the "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" files to match the following lines: auth required pam_faillock.so preauth dir=/var/log/faillock silent audit deny=3 even_deny_root fail_interval=900 unlock_time=0 auth required pam_faillock.so authfail dir=/var/log/faillock unlock_time=0 account required pam_faillock.so The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command: $ sudo systemctl restart sssd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- RHEL-08-020015
- Vuln IDs
- V-230337
- Rule IDs
- SV-230337r743972_rule
Fix: F-32981r743971_fix
Configure the operating system to lock an account until released by an administrator when three unsuccessful logon attempts occur in 15 minutes. Add/Modify the "/etc/security/faillock.conf" file to match the following line: unlock_time = 0
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- RHEL-08-020018
- Vuln IDs
- V-230340
- Rule IDs
- SV-230340r627750_rule
Fix: F-32984r567767_fix
Configure the operating system to prevent informative messages from being presented at logon attempts. Add/Modify the appropriate sections of the "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" files to match the following lines: auth required pam_faillock.so preauth dir=/var/log/faillock silent audit deny=3 even_deny_root fail_interval=900 unlock_time=0 auth required pam_faillock.so authfail dir=/var/log/faillock unlock_time=0 account required pam_faillock.so The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command: $ sudo systemctl restart sssd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- RHEL-08-020019
- Vuln IDs
- V-230341
- Rule IDs
- SV-230341r743978_rule
Fix: F-32985r743977_fix
Configure the operating system to prevent informative messages from being presented at logon attempts. Add/Modify the "/etc/security/faillock.conf" file to match the following line: silent
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- RHEL-08-020020
- Vuln IDs
- V-230342
- Rule IDs
- SV-230342r646872_rule
Fix: F-32986r567773_fix
Configure the operating system to log user name information when unsuccessful logon attempts occur. Add/Modify the appropriate sections of the "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" files to match the following lines: auth required pam_faillock.so preauth dir=/var/log/faillock silent audit deny=3 even_deny_root fail_interval=900 unlock_time=0 auth required pam_faillock.so authfail dir=/var/log/faillock unlock_time=0 account required pam_faillock.so The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command: $ sudo systemctl restart sssd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- RHEL-08-020021
- Vuln IDs
- V-230343
- Rule IDs
- SV-230343r743981_rule
Fix: F-32987r743980_fix
Configure the operating system to log user name information when unsuccessful logon attempts occur. Add/Modify the "/etc/security/faillock.conf" file to match the following line: audit
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- RHEL-08-020022
- Vuln IDs
- V-230344
- Rule IDs
- SV-230344r646874_rule
Fix: F-32988r567779_fix
Configure the operating system to include root when locking an account after three unsuccessful logon attempts occur in 15 minutes. Add/Modify the appropriate sections of the "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" files to match the following lines: auth required pam_faillock.so preauth dir=/var/log/faillock silent audit deny=3 even_deny_root fail_interval=900 unlock_time=0 auth required pam_faillock.so authfail dir=/var/log/faillock unlock_time=0 account required pam_faillock.so The "sssd" service must be restarted for the changes to take effect. To restart the "sssd" service, run the following command: $ sudo systemctl restart sssd.service
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- RHEL-08-020023
- Vuln IDs
- V-230345
- Rule IDs
- SV-230345r743984_rule
Fix: F-32989r743983_fix
Configure the operating system to include root when locking an account after three unsuccessful logon attempts occur in 15 minutes. Add/Modify the "/etc/security/faillock.conf" file to match the following line: even_deny_root
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- RHEL-08-020024
- Vuln IDs
- V-230346
- Rule IDs
- SV-230346r627750_rule
Fix: F-32990r619863_fix
Configure the operating system to limit the number of concurrent sessions to "10" for all accounts and/or account types. Add the following line to the top of the /etc/security/limits.conf or in a ".conf" file defined in /etc/security/limits.d/: * hard maxlogins 10
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- RHEL-08-020040
- Vuln IDs
- V-230348
- Rule IDs
- SV-230348r743987_rule
Fix: F-32992r743986_fix
Configure the operating system to enable a user to initiate a session lock via tmux. Create a global configuration file "/etc/tmux.conf" and add the following line: set -g lock-command vlock
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- RHEL-08-020041
- Vuln IDs
- V-230349
- Rule IDs
- SV-230349r627750_rule
Fix: F-32993r567794_fix
Configure the operating system to initialize the tmux terminal multiplexer as each shell is called by adding the following line to the end of the "/etc/bashrc" configuration file: [ -n "$PS1" -a -z "$TMUX" ] && exec tmux This setting will take effect at next logon.
- RMF Control
- AC-11
- Severity
- L
- CCI
- CCI-000056
- Version
- RHEL-08-020042
- Vuln IDs
- V-230350
- Rule IDs
- SV-230350r627750_rule
Fix: F-32994r567797_fix
Configure the operating system to prevent users from disabling the tmux terminal multiplexer by editing the "/etc/shells" configuration file to remove any instances of tmux.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- RHEL-08-020100
- Vuln IDs
- V-230356
- Rule IDs
- SV-230356r627750_rule
Fix: F-33000r567815_fix
Configure the operating system to use "pwquality" to enforce password complexity rules. Add the following line to both "/etc/pam.d/password-auth" and "/etc/pam.d/system-auth" (or modify the line to have the required value): password required pam_pwquality.so retry=3
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- RHEL-08-020110
- Vuln IDs
- V-230357
- Rule IDs
- SV-230357r627750_rule
Fix: F-33001r567818_fix
Configure the operating system to enforce password complexity by requiring that at least one uppercase character be used by setting the "ucredit" option. Add the following line to /etc/security/pwquality.conf (or modify the line to have the required value): ucredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- RHEL-08-020120
- Vuln IDs
- V-230358
- Rule IDs
- SV-230358r627750_rule
Fix: F-33002r567821_fix
Configure the operating system to enforce password complexity by requiring that at least one lower-case character be used by setting the "lcredit" option. Add the following line to /etc/security/pwquality.conf (or modify the line to have the required value): lcredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- RHEL-08-020130
- Vuln IDs
- V-230359
- Rule IDs
- SV-230359r627750_rule
Fix: F-33003r567824_fix
Configure the operating system to enforce password complexity by requiring that at least one numeric character be used by setting the "dcredit" option. Add the following line to /etc/security/pwquality.conf (or modify the line to have the required value): dcredit = -1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- RHEL-08-020140
- Vuln IDs
- V-230360
- Rule IDs
- SV-230360r627750_rule
Fix: F-33004r567827_fix
Configure the operating system to require the change of the number of repeating characters of the same character class when passwords are changed by setting the "maxclassrepeat" option. Add the following line to "/etc/security/pwquality.conf" conf (or modify the line to have the required value): maxclassrepeat = 4
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- RHEL-08-020150
- Vuln IDs
- V-230361
- Rule IDs
- SV-230361r627750_rule
Fix: F-33005r567830_fix
Configure the operating system to require the change of the number of repeating consecutive characters when passwords are changed by setting the "maxrepeat" option. Add the following line to "/etc/security/pwquality.conf conf" (or modify the line to have the required value): maxrepeat = 3
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- RHEL-08-020160
- Vuln IDs
- V-230362
- Rule IDs
- SV-230362r627750_rule
Fix: F-33006r567833_fix
Configure the operating system to require the change of at least four character classes when passwords are changed by setting the "minclass" option. Add the following line to "/etc/security/pwquality.conf conf" (or modify the line to have the required value): minclass = 4
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- RHEL-08-020170
- Vuln IDs
- V-230363
- Rule IDs
- SV-230363r627750_rule
Fix: F-33007r567836_fix
Configure the operating system to require the change of at least eight of the total number of characters when passwords are changed by setting the "difok" option. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): difok = 8
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- RHEL-08-020180
- Vuln IDs
- V-230364
- Rule IDs
- SV-230364r627750_rule
Fix: F-33008r567839_fix
Configure non-compliant accounts to enforce a 24 hours/1 day minimum password lifetime: $ sudo chage -m 1 [user]
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- RHEL-08-020190
- Vuln IDs
- V-230365
- Rule IDs
- SV-230365r627750_rule
Fix: F-33009r567842_fix
Configure the operating system to enforce 24 hours/1 day as the minimum password lifetime. Add the following line in "/etc/login.defs" (or modify the line to have the required value): PASS_MIN_DAYS 1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- RHEL-08-020200
- Vuln IDs
- V-230366
- Rule IDs
- SV-230366r646878_rule
Fix: F-33010r567845_fix
Configure RHEL 8 to enforce a 60-day maximum password lifetime. Add, or modify the following line in the "/etc/login.defs" file: PASS_MAX_DAYS 60
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- RHEL-08-020210
- Vuln IDs
- V-230367
- Rule IDs
- SV-230367r627750_rule
Fix: F-33011r567848_fix
Configure non-compliant accounts to enforce a 60-day maximum password lifetime restriction. $ sudo chage -M 60 [user]
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- RHEL-08-020220
- Vuln IDs
- V-230368
- Rule IDs
- SV-230368r627750_rule
Fix: F-33012r567851_fix
Configure the operating system to prohibit password reuse for a minimum of five generations. Add the following line in "/etc/pam.d/system-auth" and "/etc/pam.d/password-auth" (or modify the line to have the required value): password required pam_pwhistory.so use_authtok remember=5 retry=3
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- RHEL-08-020230
- Vuln IDs
- V-230369
- Rule IDs
- SV-230369r627750_rule
Fix: F-33013r567854_fix
Configure operating system to enforce a minimum 15-character password length. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): minlen = 15
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- RHEL-08-020231
- Vuln IDs
- V-230370
- Rule IDs
- SV-230370r627750_rule
Fix: F-33014r567857_fix
Configure operating system to enforce a minimum 15-character password length for new user accounts. Add, or modify the following line in the "/etc/login.defs" file: PASS_MIN_LEN 15
- RMF Control
- IA-4
- Severity
- M
- CCI
- CCI-000795
- Version
- RHEL-08-020260
- Vuln IDs
- V-230373
- Rule IDs
- SV-230373r627750_rule
Fix: F-33017r567866_fix
Configure RHEL 8 to disable account identifiers after 35 days of inactivity after the password expiration. Run the following command to change the configuration for useradd: $ sudo useradd -D -f 35 DoD recommendation is 35 days, but a lower value is acceptable. The value "-1" will disable this feature, and "0" will disable the account immediately after the password expires.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- RHEL-08-020280
- Vuln IDs
- V-230375
- Rule IDs
- SV-230375r627750_rule
Fix: F-33019r567872_fix
Configure the operating system to enforce password complexity by requiring that at least one special character be used by setting the "ocredit" option. Add the following line to /etc/security/pwquality.conf (or modify the line to have the required value): ocredit = -1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-020300
- Vuln IDs
- V-230377
- Rule IDs
- SV-230377r627750_rule
Fix: F-33021r567878_fix
Configure RHEL 8 to prevent the use of dictionary words for passwords. Add or update the following line in the "/etc/security/pwquality.conf" file or a configuration file in the /etc/pwquality.conf.d/ directory to contain the "dictcheck" parameter: dictcheck=1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-020310
- Vuln IDs
- V-230378
- Rule IDs
- SV-230378r627750_rule
Fix: F-33022r567881_fix
Configure the operating system to enforce a delay of at least four seconds between logon prompts following a failed console logon attempt. Modify the "/etc/login.defs" file to set the "FAIL_DELAY" parameter to "4" or greater: FAIL_DELAY 4
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-08-020330
- Vuln IDs
- V-230380
- Rule IDs
- SV-230380r743993_rule
Fix: F-33024r743992_fix
Edit the following line in "etc/ssh/sshd_config" to prevent logons with empty passwords. PermitEmptyPasswords no The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command: $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-020350
- Vuln IDs
- V-230382
- Rule IDs
- SV-230382r627750_rule
Fix: F-33026r567893_fix
Configure SSH to provide users with feedback on when account accesses last occurred by setting the required configuration options in "/etc/pam.d/sshd" or in the "sshd_config" file used by the system ("/etc/ssh/sshd_config" will be used in the example) (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor). Modify the "PrintLastLog" line in "/etc/ssh/sshd_config" to match the following: PrintLastLog yes The SSH service must be restarted for changes to "sshd_config" to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-020351
- Vuln IDs
- V-230383
- Rule IDs
- SV-230383r627750_rule
Fix: F-33027r567896_fix
Configure the operating system to define default permissions for all authenticated users in such a way that the user can only read and modify their own files. Add or edit the line for the "UMASK" parameter in "/etc/login.defs" file to "077": UMASK 077
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- RHEL-08-030000
- Vuln IDs
- V-230386
- Rule IDs
- SV-230386r627750_rule
Fix: F-33030r567905_fix
Configure RHEL 8 to audit the execution of the "execve" system call. Add or update the following file system rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k execpriv The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- RHEL-08-030020
- Vuln IDs
- V-230388
- Rule IDs
- SV-230388r627750_rule
Fix: F-33032r567911_fix
Configure "auditd" service to notify the SA and ISSO in the event of an audit processing failure. Edit the following line in "/etc/audit/auditd.conf" to ensure that administrators are notified via email for those situations: action_mail_acct = root
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- RHEL-08-030040
- Vuln IDs
- V-230390
- Rule IDs
- SV-230390r627750_rule
Fix: F-33034r567917_fix
Configure RHEL 8 to shut down by default upon audit failure (unless availability is an overriding concern). Add or update the following line (depending on configuration "disk_error_action" can be set to "SYSLOG" or "SINGLE" depending on configuration) in "/etc/audit/auditd.conf" file: disk_error_action = HALT If availability has been determined to be more important, and this decision is documented with the ISSO, configure the operating system to notify system administration staff and ISSO staff in the event of an audit processing failure by setting the "disk_error_action" to "SYSLOG".
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- RHEL-08-030050
- Vuln IDs
- V-230391
- Rule IDs
- SV-230391r743998_rule
Fix: F-33035r743997_fix
Configure RHEL 8 to notify the System Administrator (SA) and Information System Security Officer (ISSO) when the audit storage volume is full by configuring the "max_log_file_action" parameter in the "/etc/audit/auditd.conf" file with the a value of "syslog" or "keep_logs": max_log_file_action = syslog
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- RHEL-08-030060
- Vuln IDs
- V-230392
- Rule IDs
- SV-230392r627750_rule
Fix: F-33036r567923_fix
Configure RHEL 8 to shut down by default upon audit failure (unless availability is an overriding concern). Add or update the following line (depending on configuration "disk_full_action" can be set to "SYSLOG" or "SINGLE" depending on configuration) in "/etc/audit/auditd.conf" file: disk_full_action = HALT If availability has been determined to be more important, and this decision is documented with the ISSO, configure the operating system to notify system administration staff and ISSO staff in the event of an audit processing failure by setting the "disk_full_action" to "SYSLOG".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-030061
- Vuln IDs
- V-230393
- Rule IDs
- SV-230393r627750_rule
Fix: F-33037r567926_fix
Configure RHEL 8 to audit local events on the system. Add or update the following line in "/etc/audit/auditd.conf" file: local_events = yes
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- RHEL-08-030062
- Vuln IDs
- V-230394
- Rule IDs
- SV-230394r627750_rule
Fix: F-33038r567929_fix
Edit the /etc/audit/auditd.conf file and add or update the "name_format" option: name_format = hostname The audit daemon must be restarted for changes to take effect.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- RHEL-08-030063
- Vuln IDs
- V-230395
- Rule IDs
- SV-230395r627750_rule
Fix: F-33039r567932_fix
Edit the /etc/audit/auditd.conf file and add or update the "log_format" option: log_format = ENRICHED The audit daemon must be restarted for changes to take effect.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- RHEL-08-030070
- Vuln IDs
- V-230396
- Rule IDs
- SV-230396r627750_rule
Fix: F-33040r567935_fix
Configure the audit log to be protected from unauthorized read access by configuring the log group in the /etc/audit/auditd.conf file: log_group = root
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- RHEL-08-030080
- Vuln IDs
- V-230397
- Rule IDs
- SV-230397r627750_rule
Fix: F-33041r567938_fix
Configure the audit log to be protected from unauthorized read access, by setting the correct owner as "root" with the following command: $ sudo chown root [audit_log_file] Replace "[audit_log_file]" to the correct audit log path, by default this location is "/var/log/audit/audit.log".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- RHEL-08-030090
- Vuln IDs
- V-230398
- Rule IDs
- SV-230398r627750_rule
Fix: F-33042r567941_fix
Configure the audit log to be owned by root by configuring the log group in the /etc/audit/auditd.conf file: log_group = root
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- RHEL-08-030100
- Vuln IDs
- V-230399
- Rule IDs
- SV-230399r627750_rule
Fix: F-33043r567944_fix
Configure the audit log to be protected from unauthorized read access, by setting the correct owner as "root" with the following command: $ sudo chown root [audit_log_directory] Replace "[audit_log_directory]" with the correct audit log directory path, by default this location is usually "/var/log/audit".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- RHEL-08-030110
- Vuln IDs
- V-230400
- Rule IDs
- SV-230400r627750_rule
Fix: F-33044r567947_fix
Configure the audit log to be protected from unauthorized read access by setting the correct group-owner as "root" with the following command: $ sudo chgrp root [audit_log_directory] Replace "[audit_log_directory]" with the correct audit log directory path, by default this location is usually "/var/log/audit".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- RHEL-08-030120
- Vuln IDs
- V-230401
- Rule IDs
- SV-230401r627750_rule
Fix: F-33045r567950_fix
Configure the audit log directory to be protected from unauthorized read access by setting the correct permissive mode with the following command: $ sudo chmod 0700 [audit_log_directory] Replace "[audit_log_directory]" to the correct audit log directory path, by default this location is "/var/log/audit".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- RHEL-08-030121
- Vuln IDs
- V-230402
- Rule IDs
- SV-230402r627750_rule
Fix: F-33046r567953_fix
Configure the audit system to set the audit rules to be immutable by adding the following line to "/etc/audit/rules.d/audit.rules" -e 2 Note: Once set, the system must be rebooted for auditing to be changed. It is recommended to add this option as the last step in securing the system.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- RHEL-08-030122
- Vuln IDs
- V-230403
- Rule IDs
- SV-230403r627750_rule
Fix: F-33047r567956_fix
Configure the audit system to set the logon UIDs to be immutable by adding the following line to "/etc/audit/rules.d/audit.rules" --loginuid-immutable
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030130
- Vuln IDs
- V-230404
- Rule IDs
- SV-230404r627750_rule
Fix: F-33048r567959_fix
Configure RHEL 8 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/shadow". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/shadow -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030140
- Vuln IDs
- V-230405
- Rule IDs
- SV-230405r627750_rule
Fix: F-33049r567962_fix
Configure RHEL 8 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/security/opasswd". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/security/opasswd -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030150
- Vuln IDs
- V-230406
- Rule IDs
- SV-230406r627750_rule
Fix: F-33050r567965_fix
Configure RHEL 8 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/passwd". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/passwd -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030160
- Vuln IDs
- V-230407
- Rule IDs
- SV-230407r627750_rule
Fix: F-33051r567968_fix
Configure RHEL 8 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/gshadow". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/gshadow -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030170
- Vuln IDs
- V-230408
- Rule IDs
- SV-230408r627750_rule
Fix: F-33052r567971_fix
Configure RHEL 8 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/group". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/group -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030171
- Vuln IDs
- V-230409
- Rule IDs
- SV-230409r627750_rule
Fix: F-33053r567974_fix
Configure RHEL 8 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/sudoers -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030172
- Vuln IDs
- V-230410
- Rule IDs
- SV-230410r627750_rule
Fix: F-33054r567977_fix
Configure RHEL 8 to generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/". Add or update the following file system rule to "/etc/audit/rules.d/audit.rules": -w /etc/sudoers.d/ -p wa -k identity The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030180
- Vuln IDs
- V-230411
- Rule IDs
- SV-230411r744000_rule
Fix: F-33055r646880_fix
Configure the audit service to produce audit records containing the information needed to establish when (date and time) an event occurred. Install the audit service (if the audit service is not already installed) with the following command: $ sudo yum install audit
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030190
- Vuln IDs
- V-230412
- Rule IDs
- SV-230412r627750_rule
Fix: F-33056r567983_fix
Configure RHEL 8 to generate audit records when successful/unsuccessful attempts to use the "su" command occur by adding or updating the following rule in "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/su -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030200
- Vuln IDs
- V-230413
- Rule IDs
- SV-230413r627750_rule
Fix: F-33057r567986_fix
Configure RHEL 8 to audit the execution of the "lremovexattr" system call, by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S lremovexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S lremovexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b32 -S lremovexattr -F auid=0 -k perm_mod -a always,exit -F arch=b64 -S lremovexattr -F auid=0 -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030210
- Vuln IDs
- V-230414
- Rule IDs
- SV-230414r627750_rule
Fix: F-33058r567989_fix
Configure RHEL 8 to audit the execution of the "removexattr" system call, by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S removexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S removexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b32 -S removexattr -F auid=0 -k perm_mod -a always,exit -F arch=b64 -S removexattr -F auid=0 -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030220
- Vuln IDs
- V-230415
- Rule IDs
- SV-230415r627750_rule
Fix: F-33059r567992_fix
Configure RHEL 8 to audit the execution of the "lsetxattr" system call, by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S lsetxattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S lsetxattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b32 -S lsetxattr -F auid=0 -k perm_mod -a always,exit -F arch=b64 -S lsetxattr -F auid=0 -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030230
- Vuln IDs
- V-230416
- Rule IDs
- SV-230416r627750_rule
Fix: F-33060r567995_fix
Configure RHEL 8 to audit the execution of the "fsetxattr" system call, by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S fsetxattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S fsetxattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b32 -S fsetxattr -F auid=0 -k perm_mod -a always,exit -F arch=b64 -S fsetxattr -F auid=0 -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030240
- Vuln IDs
- V-230417
- Rule IDs
- SV-230417r627750_rule
Fix: F-33061r567998_fix
Configure RHEL 8 to audit the execution of the "fremovexattr" system call by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S fremovexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S fremovexattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b32 -S fremovexattr -F auid=0 -k perm_mod -a always,exit -F arch=b64 -S fremovexattr -F auid=0 -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030250
- Vuln IDs
- V-230418
- Rule IDs
- SV-230418r627750_rule
Fix: F-33062r568001_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "chage" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chage -F perm=x -F auid>=1000 -F auid!=unset -k privileged-chage The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030260
- Vuln IDs
- V-230419
- Rule IDs
- SV-230419r627750_rule
Fix: F-33063r568004_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "chcon" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chcon -F perm=x -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030270
- Vuln IDs
- V-230420
- Rule IDs
- SV-230420r627750_rule
Fix: F-33064r568007_fix
Configure RHEL 8 to audit the execution of the "setxattr" system call, by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S setxattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S setxattr -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b32 -S setxattr -F auid=0 -k perm_mod -a always,exit -F arch=b64 -S setxattr -F auid=0 -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030280
- Vuln IDs
- V-230421
- Rule IDs
- SV-230421r627750_rule
Fix: F-33065r568010_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "ssh-agent" by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/ssh-agent -F perm=x -F auid>=1000 -F auid!=unset -k privileged-ssh The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030290
- Vuln IDs
- V-230422
- Rule IDs
- SV-230422r627750_rule
Fix: F-33066r568013_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "passwd" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/passwd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-passwd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030300
- Vuln IDs
- V-230423
- Rule IDs
- SV-230423r627750_rule
Fix: F-33067r568016_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "mount" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/mount -F perm=x -F auid>=1000 -F auid!=unset -k privileged-mount The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030301
- Vuln IDs
- V-230424
- Rule IDs
- SV-230424r627750_rule
Fix: F-33068r568019_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "umount" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/umount -F perm=x -F auid>=1000 -F auid!=unset -k privileged-mount The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030302
- Vuln IDs
- V-230425
- Rule IDs
- SV-230425r627750_rule
Fix: F-33069r568022_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "mount" syscall by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S mount -F auid>=1000 -F auid!=unset -k privileged-mount -a always,exit -F arch=b64 -S mount -F auid>=1000 -F auid!=unset -k privileged-mount The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030310
- Vuln IDs
- V-230426
- Rule IDs
- SV-230426r627750_rule
Fix: F-33070r568025_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "unix_update" by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/unix_update -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030311
- Vuln IDs
- V-230427
- Rule IDs
- SV-230427r627750_rule
Fix: F-33071r568028_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "postdrop" by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/postdrop -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030312
- Vuln IDs
- V-230428
- Rule IDs
- SV-230428r627750_rule
Fix: F-33072r568031_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "postqueue" by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/postqueue -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030313
- Vuln IDs
- V-230429
- Rule IDs
- SV-230429r627750_rule
Fix: F-33073r568034_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "semanage" by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/semanage -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030314
- Vuln IDs
- V-230430
- Rule IDs
- SV-230430r627750_rule
Fix: F-33074r568037_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "setfiles" by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/setfiles -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030315
- Vuln IDs
- V-230431
- Rule IDs
- SV-230431r627750_rule
Fix: F-33075r568040_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "userhelper" by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/userhelper -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030316
- Vuln IDs
- V-230432
- Rule IDs
- SV-230432r627750_rule
Fix: F-33076r568043_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "setsebool" by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/setsebool -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030317
- Vuln IDs
- V-230433
- Rule IDs
- SV-230433r627750_rule
Fix: F-33077r568046_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "unix_chkpwd" by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030320
- Vuln IDs
- V-230434
- Rule IDs
- SV-230434r744002_rule
Fix: F-33078r744001_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "ssh-keysign" by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/libexec/openssh/ssh-keysign -F perm=x -F auid>=1000 -F auid!=unset -k privileged-ssh The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030330
- Vuln IDs
- V-230435
- Rule IDs
- SV-230435r627750_rule
Fix: F-33079r568052_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "setfacl" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/setfacl -F perm=x -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030340
- Vuln IDs
- V-230436
- Rule IDs
- SV-230436r627750_rule
Fix: F-33080r568055_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "pam_timestamp_check" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/pam_timestamp_check -F perm=x -F auid>=1000 -F auid!=unset -k privileged-pam_timestamp_check The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030350
- Vuln IDs
- V-230437
- Rule IDs
- SV-230437r627750_rule
Fix: F-33081r568058_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "newgrp" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/newgrp -F perm=x -F auid>=1000 -F auid!=unset -k priv_cmd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030360
- Vuln IDs
- V-230438
- Rule IDs
- SV-230438r627750_rule
Fix: F-33082r568061_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "init_module" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S init_module -F auid>=1000 -F auid!=unset -k module_chng -a always,exit -F arch=b64 -S init_module -F auid>=1000 -F auid!=unset -k module_chng The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030361
- Vuln IDs
- V-230439
- Rule IDs
- SV-230439r627750_rule
Fix: F-33083r568064_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "rename" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S rename -F auid>=1000 -F auid!=unset -k delete -a always,exit -F arch=b64 -S rename -F auid>=1000 -F auid!=unset -k delete The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030362
- Vuln IDs
- V-230440
- Rule IDs
- SV-230440r627750_rule
Fix: F-33084r568067_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "renameat" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S renameat -F auid>=1000 -F auid!=unset -k delete -a always,exit -F arch=b64 -S renameat -F auid>=1000 -F auid!=unset -k delete The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030363
- Vuln IDs
- V-230441
- Rule IDs
- SV-230441r627750_rule
Fix: F-33085r568070_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "rmdir" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S rmdir -F auid>=1000 -F auid!=unset -k delete -a always,exit -F arch=b64 -S rmdir -F auid>=1000 -F auid!=unset -k delete The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030364
- Vuln IDs
- V-230442
- Rule IDs
- SV-230442r627750_rule
Fix: F-33086r568073_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "unlink" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S unlink -F auid>=1000 -F auid!=unset -k delete -a always,exit -F arch=b64 -S unlink -F auid>=1000 -F auid!=unset -k delete The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030365
- Vuln IDs
- V-230443
- Rule IDs
- SV-230443r627750_rule
Fix: F-33087r568076_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "unlinkat" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S unlinkat -F auid>=1000 -F auid!=unset -k delete -a always,exit -F arch=b64 -S unlinkat -F auid>=1000 -F auid!=unset -k delete The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030370
- Vuln IDs
- V-230444
- Rule IDs
- SV-230444r627750_rule
Fix: F-33088r568079_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "gpasswd" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-gpasswd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030380
- Vuln IDs
- V-230445
- Rule IDs
- SV-230445r627750_rule
Fix: F-33089r568082_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "finit_module" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S finit_module -F auid>=1000 -F auid!=unset -k module_chng -a always,exit -F arch=b64 -S finit_module -F auid>=1000 -F auid!=unset -k module_chng The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030390
- Vuln IDs
- V-230446
- Rule IDs
- SV-230446r627750_rule
Fix: F-33090r568085_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "delete_module" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S delete_module -F auid>=1000 -F auid!=unset -k module_chng -a always,exit -F arch=b64 -S delete_module -F auid>=1000 -F auid!=unset -k module_chng The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030400
- Vuln IDs
- V-230447
- Rule IDs
- SV-230447r627750_rule
Fix: F-33091r568088_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "crontab" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/crontab -F perm=x -F auid>=1000 -F auid!=unset -k privileged-crontab The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030410
- Vuln IDs
- V-230448
- Rule IDs
- SV-230448r627750_rule
Fix: F-33092r568091_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "chsh" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chsh -F perm=x -F auid>=1000 -F auid!=unset -k priv_cmd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030420
- Vuln IDs
- V-230449
- Rule IDs
- SV-230449r627750_rule
Fix: F-33093r568094_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "truncate" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S truncate -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S truncate -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b32 -S truncate -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S truncate -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030430
- Vuln IDs
- V-230450
- Rule IDs
- SV-230450r627750_rule
Fix: F-33094r568097_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "openat" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S openat -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S openat -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b32 -S openat -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S openat -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030440
- Vuln IDs
- V-230451
- Rule IDs
- SV-230451r627750_rule
Fix: F-33095r568100_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "open" system call by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S open -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S open -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b32 -S open -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S open -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030450
- Vuln IDs
- V-230452
- Rule IDs
- SV-230452r627750_rule
Fix: F-33096r568103_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "open_by_handle_at" system call by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b32 -S open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030460
- Vuln IDs
- V-230453
- Rule IDs
- SV-230453r627750_rule
Fix: F-33097r568106_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "ftruncate" command by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S ftruncate -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S ftruncate -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b32 -S ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030470
- Vuln IDs
- V-230454
- Rule IDs
- SV-230454r627750_rule
Fix: F-33098r568109_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "creat" system call by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access -a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030480
- Vuln IDs
- V-230455
- Rule IDs
- SV-230455r627750_rule
Fix: F-33099r568112_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "chown" command by adding or updating the following line to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S chown -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S chown -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030490
- Vuln IDs
- V-230456
- Rule IDs
- SV-230456r627750_rule
Fix: F-33100r568115_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "chmod" command by adding or updating the following line to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S chmod -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S chmod -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030500
- Vuln IDs
- V-230457
- Rule IDs
- SV-230457r627750_rule
Fix: F-33101r568118_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "lchown" system call by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S lchown -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S lchown -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030510
- Vuln IDs
- V-230458
- Rule IDs
- SV-230458r627750_rule
Fix: F-33102r568121_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "fchownat" system call by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S fchownat -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S fchownat -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030520
- Vuln IDs
- V-230459
- Rule IDs
- SV-230459r627750_rule
Fix: F-33103r568124_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "fchown" system call by adding or updating the following line to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S fchown -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S fchown -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030530
- Vuln IDs
- V-230460
- Rule IDs
- SV-230460r627750_rule
Fix: F-33104r568127_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "fchmodat" system call by adding or updating the following lines to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S fchmodat -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S fchmodat -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030540
- Vuln IDs
- V-230461
- Rule IDs
- SV-230461r627750_rule
Fix: F-33105r568130_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "fchmod" system call by adding or updating the following line to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S fchmod -F auid>=1000 -F auid!=unset -k perm_mod -a always,exit -F arch=b64 -S fchmod -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030550
- Vuln IDs
- V-230462
- Rule IDs
- SV-230462r627750_rule
Fix: F-33106r568133_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "sudo" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/sudo -F perm=x -F auid>=1000 -F auid!=unset -k priv_cmd The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030560
- Vuln IDs
- V-230463
- Rule IDs
- SV-230463r627750_rule
Fix: F-33107r568136_fix
Configure the audit system to generate an audit event for any successful/unsuccessful uses of the "usermod" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/usermod -F perm=x -F auid>=1000 -F auid!=unset -k privileged-usermod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030570
- Vuln IDs
- V-230464
- Rule IDs
- SV-230464r627750_rule
Fix: F-33108r568139_fix
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "chacl" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chacl -F perm=x -F auid>=1000 -F auid!=unset -k perm_mod The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030580
- Vuln IDs
- V-230465
- Rule IDs
- SV-230465r627750_rule
Fix: F-33109r568142_fix
Configure RHEL 8 to audit the execution of the module management program "kmod" by adding or updating the following line to "/etc/audit/rules.d/audit.rules": -a always,exit -F path=/usr/bin/kmod -F perm=x -F auid>=1000 -F auid!=unset -k modules The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- RHEL-08-030600
- Vuln IDs
- V-230467
- Rule IDs
- SV-230467r627750_rule
Fix: F-33111r568148_fix
Configure the audit system to generate an audit event for any successful/unsuccessful modifications to the "lastlog" file by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file: -w /var/log/lastlog -p wa -k logins The audit daemon must be restarted for the changes to take effect.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- RHEL-08-030610
- Vuln IDs
- V-230471
- Rule IDs
- SV-230471r627750_rule
Fix: F-33115r568160_fix
Configure the files in directory "/etc/audit/rules.d/" and the "/etc/audit/auditd.conf" file to have a mode of "0640" with the following commands: $ sudo chmod 0640 /etc/audit/rules.d/audit.rules $ sudo chmod 0640 /etc/audit/rules.d/[customrulesfile].rules $ sudo chmod 0640 /etc/audit/auditd.conf
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- RHEL-08-030620
- Vuln IDs
- V-230472
- Rule IDs
- SV-230472r627750_rule
Fix: F-33116r568163_fix
Configure the audit tools to be protected from unauthorized access by setting the correct permissive mode using the following command: $ sudo chmod 0755 [audit_tool] Replace "[audit_tool]" with the audit tool that does not have the correct permissive mode.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- RHEL-08-030630
- Vuln IDs
- V-230473
- Rule IDs
- SV-230473r744008_rule
Fix: F-33117r568166_fix
Configure the audit tools to be owned by "root", by running the following command: $ sudo chown root [audit_tool] Replace "[audit_tool]" with each audit tool not owned by "root".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- RHEL-08-030640
- Vuln IDs
- V-230474
- Rule IDs
- SV-230474r627750_rule
Fix: F-33118r568169_fix
Configure the audit tools to be group-owned by "root", by running the following command: $ sudo chgrp root [audit_tool] Replace "[audit_tool]" with each audit tool not group-owned by "root".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-030670
- Vuln IDs
- V-230477
- Rule IDs
- SV-230477r627750_rule
Fix: F-33121r568178_fix
Configure the operating system to offload audit logs by installing the required packages with the following command: $ sudo yum install rsyslog
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-030680
- Vuln IDs
- V-230478
- Rule IDs
- SV-230478r744011_rule
Fix: F-33122r744010_fix
Configure the operating system to encrypt offloaded audit logs by installing the required packages with the following command: $ sudo yum install rsyslog-gnutls
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- RHEL-08-030700
- Vuln IDs
- V-230480
- Rule IDs
- SV-230480r627750_rule
Fix: F-33124r568187_fix
Edit the /etc/audit/auditd.conf file and add or update the "overflow_action" option: overflow_action = syslog The audit daemon must be restarted for changes to take effect.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- RHEL-08-030730
- Vuln IDs
- V-230483
- Rule IDs
- SV-230483r744014_rule
Fix: F-33127r744013_fix
Configure the operating system to initiate an action to notify the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity by adding/modifying the following line in the /etc/audit/auditd.conf file. space_left = 25% Note: Option names and values in the auditd.conf file are case insensitive.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- RHEL-08-030741
- Vuln IDs
- V-230485
- Rule IDs
- SV-230485r627750_rule
Fix: F-33129r568202_fix
Configure the operating system to disable the chrony daemon from acting as a server by adding/modifying the following line in the /etc/chrony.conf file. port 0
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- RHEL-08-030742
- Vuln IDs
- V-230486
- Rule IDs
- SV-230486r627750_rule
Fix: F-33130r568205_fix
Configure the operating system disable network management of the chrony daemon by adding/modifying the following line in the /etc/chrony.conf file. cmdport 0
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- RHEL-08-040000
- Vuln IDs
- V-230487
- Rule IDs
- SV-230487r627750_rule
Fix: F-33131r568208_fix
Configure the operating system to disable non-essential capabilities by removing the telnet-server package from the system with the following command: $ sudo yum remove telnet-server
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- RHEL-08-040001
- Vuln IDs
- V-230488
- Rule IDs
- SV-230488r627750_rule
Fix: F-33132r568211_fix
Configure the operating system to disable non-essential capabilities by removing automated bug reporting packages from the system with the following command: $ sudo yum remove abrt*
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- RHEL-08-040002
- Vuln IDs
- V-230489
- Rule IDs
- SV-230489r627750_rule
Fix: F-33133r568214_fix
Configure the operating system to disable non-essential capabilities by removing the sendmail package from the system with the following command: $ sudo yum remove sendmail
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- RHEL-08-040010
- Vuln IDs
- V-230492
- Rule IDs
- SV-230492r627750_rule
Fix: F-33136r568223_fix
Configure the operating system to disable non-essential capabilities by removing the rsh-server package from the system with the following command: $ sudo yum remove rsh-server
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- RHEL-08-040021
- Vuln IDs
- V-230494
- Rule IDs
- SV-230494r627750_rule
Fix: F-33138r568229_fix
Configure the operating system to disable the ability to use the ATM protocol kernel module. Add or update the following lines in the file "/etc/modprobe.d/blacklist.conf": install ATM /bin/true blacklist ATM Reboot the system for the settings to take effect.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- RHEL-08-040022
- Vuln IDs
- V-230495
- Rule IDs
- SV-230495r627750_rule
Fix: F-33139r568232_fix
Configure the operating system to disable the ability to use the CAN protocol kernel module. Add or update the following lines in the file "/etc/modprobe.d/blacklist.conf": install CAN /bin/true blacklist CAN Reboot the system for the settings to take effect.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- RHEL-08-040023
- Vuln IDs
- V-230496
- Rule IDs
- SV-230496r744017_rule
Fix: F-33140r744016_fix
Configure the operating system to disable the ability to use the SCTP kernel module. Add or update the following lines in the file "/etc/modprobe.d/blacklist.conf": install SCTP /bin/true blacklist SCTP Reboot the system for the settings to take effect.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- RHEL-08-040024
- Vuln IDs
- V-230497
- Rule IDs
- SV-230497r627750_rule
Fix: F-33141r568238_fix
Configure the operating system to disable the ability to use the TIPC protocol kernel module. Add or update the following lines in the file "/etc/modprobe.d/blacklist.conf": install TIPC /bin/true blacklist TIPC Reboot the system for the settings to take effect.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- RHEL-08-040025
- Vuln IDs
- V-230498
- Rule IDs
- SV-230498r627750_rule
Fix: F-33142r568241_fix
Configure the operating system to disable the ability to use the cramfs kernel module. Add or update the following lines in the file "/etc/modprobe.d/blacklist.conf": install cramfs /bin/true blacklist cramfs Reboot the system for the settings to take effect.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- RHEL-08-040026
- Vuln IDs
- V-230499
- Rule IDs
- SV-230499r627750_rule
Fix: F-33143r568244_fix
Configure the operating system to disable the ability to use the firewire-core kernel module. Add or update the following lines in the file "/etc/modprobe.d/blacklist.conf": install firewire-core /bin/true blacklist firewire-core Reboot the system for the settings to take effect.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- RHEL-08-040080
- Vuln IDs
- V-230503
- Rule IDs
- SV-230503r627750_rule
Fix: F-33147r568256_fix
Configure the operating system to disable the ability to use the USB Storage kernel module. Create a file under "/etc/modprobe.d" with the following command: $ sudo touch /etc/modprobe.d/usb-storage.conf Add the following line to the created file: install usb-storage /bin/true Configure the operating system to disable the ability to use USB mass storage devices. $ sudo vi /etc/modprobe.d/blacklist.conf Add or update the line: blacklist usb-storage
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001443
- Version
- RHEL-08-040111
- Vuln IDs
- V-230507
- Rule IDs
- SV-230507r627750_rule
Fix: F-33151r568268_fix
Configure the operating system to disable the Bluetooth adapter when not in use. Build or modify the "/etc/modprobe.d/bluetooth.conf" file with the following line: install bluetooth /bin/true Reboot the system for the settings to take effect.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040120
- Vuln IDs
- V-230508
- Rule IDs
- SV-230508r627750_rule
Fix: F-33152r568271_fix
Configure the system so that /dev/shm is mounted with the "nodev" option by adding /modifying the /etc/fstab with the following line: tmpfs /dev/shm tmpfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040121
- Vuln IDs
- V-230509
- Rule IDs
- SV-230509r627750_rule
Fix: F-33153r568274_fix
Configure the system so that /dev/shm is mounted with the "nosuid" option by adding /modifying the /etc/fstab with the following line: tmpfs /dev/shm tmpfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040122
- Vuln IDs
- V-230510
- Rule IDs
- SV-230510r627750_rule
Fix: F-33154r568277_fix
Configure the system so that /dev/shm is mounted with the "noexec" option by adding /modifying the /etc/fstab with the following line: tmpfs /dev/shm tmpfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040123
- Vuln IDs
- V-230511
- Rule IDs
- SV-230511r627750_rule
Fix: F-33155r568280_fix
Configure the system so that /tmp is mounted with the "nodev" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/rhel-tmp /tmp xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040124
- Vuln IDs
- V-230512
- Rule IDs
- SV-230512r627750_rule
Fix: F-33156r568283_fix
Configure the system so that /tmp is mounted with the "nosuid" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/rhel-tmp /tmp xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040125
- Vuln IDs
- V-230513
- Rule IDs
- SV-230513r627750_rule
Fix: F-33157r568286_fix
Configure the system so that /tmp is mounted with the "noexec" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/rhel-tmp /tmp xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040126
- Vuln IDs
- V-230514
- Rule IDs
- SV-230514r627750_rule
Fix: F-33158r568289_fix
Configure the system so that /var/log is mounted with the "nodev" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/rhel-var-log /var/log xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040127
- Vuln IDs
- V-230515
- Rule IDs
- SV-230515r627750_rule
Fix: F-33159r568292_fix
Configure the system so that /var/log is mounted with the "nosuid" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/rhel-var-log /var/log xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040128
- Vuln IDs
- V-230516
- Rule IDs
- SV-230516r627750_rule
Fix: F-33160r568295_fix
Configure the system so that /var/log is mounted with the "noexec" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/rhel-var-log /var/log xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040129
- Vuln IDs
- V-230517
- Rule IDs
- SV-230517r627750_rule
Fix: F-33161r568298_fix
Configure the system so that /var/log/audit is mounted with the "nodev" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/rhel-var-log-audit /var/log/audit xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040130
- Vuln IDs
- V-230518
- Rule IDs
- SV-230518r627750_rule
Fix: F-33162r568301_fix
Configure the system so that /var/log/audit is mounted with the "nosuid" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/rhel-var-log-audit /var/log/audit xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040131
- Vuln IDs
- V-230519
- Rule IDs
- SV-230519r627750_rule
Fix: F-33163r568304_fix
Configure the system so that /var/log/audit is mounted with the "noexec" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/rhel-var-log-audit /var/log/audit xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040132
- Vuln IDs
- V-230520
- Rule IDs
- SV-230520r627750_rule
Fix: F-33164r568307_fix
Configure the system so that /var/tmp is mounted with the "nodev" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/rhel-var-log-audit /var/tmp xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040133
- Vuln IDs
- V-230521
- Rule IDs
- SV-230521r627750_rule
Fix: F-33165r568310_fix
Configure the system so that /var/tmp is mounted with the "nosuid" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/rhel-var-log-audit /var/tmp xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- RHEL-08-040134
- Vuln IDs
- V-230522
- Rule IDs
- SV-230522r627750_rule
Fix: F-33166r568313_fix
Configure the system so that /var/tmp is mounted with the "noexec" option by adding /modifying the /etc/fstab with the following line: /dev/mapper/rhel-var-log-audit /var/tmp xfs defaults,nodev,nosuid,noexec 0 0
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- RHEL-08-040160
- Vuln IDs
- V-230526
- Rule IDs
- SV-230526r744032_rule
Fix: F-33170r744031_fix
Configure the SSH service to automatically start after reboot with the following command: $ sudo systemctl enable sshd.service
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- RHEL-08-040161
- Vuln IDs
- V-230527
- Rule IDs
- SV-230527r627750_rule
Fix: F-33171r568328_fix
Configure the system to force a frequent session key renegotiation for SSH connections to the server by add or modifying the following line in the "/etc/ssh/sshd_config" file: RekeyLimit 1G 1h Restart the SSH daemon for the settings to take effect. $ sudo systemctl restart sshd.service
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-08-040172
- Vuln IDs
- V-230531
- Rule IDs
- SV-230531r627750_rule
Fix: F-33175r619890_fix
Configure the system to disable the CtrlAltDelBurstAction by added or modifying the following line in the "/etc/systemd/system.conf" configuration file: CtrlAltDelBurstAction=none Reload the daemon for this change to take effect. $ sudo systemctl daemon-reload
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-08-040190
- Vuln IDs
- V-230533
- Rule IDs
- SV-230533r627750_rule
Fix: F-33177r568346_fix
Remove the TFTP package from the system with the following command: $ sudo yum remove tftp-server
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-08-040200
- Vuln IDs
- V-230534
- Rule IDs
- SV-230534r627750_rule
Fix: F-33178r568349_fix
Change the UID of any account on the system, other than root, that has a UID of "0". If the account is associated with system commands or applications, the UID should be changed to one greater than "0" but less than "1000". Otherwise, assign a UID of greater than "1000" that has not already been assigned.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040210
- Vuln IDs
- V-230535
- Rule IDs
- SV-230535r744035_rule
Fix: F-33179r744034_fix
Configure RHEL 8 to prevent IPv6 ICMP redirect messages from being accepted with the following command: $ sudo sysctl -w net.ipv6.conf.default.accept_redirects=0 If "0" is not the system's default value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv6.conf.default.accept_redirects=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040220
- Vuln IDs
- V-230536
- Rule IDs
- SV-230536r744037_rule
Fix: F-33180r568355_fix
Configure RHEL 8 to not allow interfaces to perform IPv4 ICMP redirects with the following command: $ sudo sysctl -w net.ipv4.conf.all.send_redirects=0 If "0" is not the system's default value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv4.conf.all.send_redirects=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040230
- Vuln IDs
- V-230537
- Rule IDs
- SV-230537r744039_rule
Fix: F-33181r568358_fix
Configure RHEL 8 to not respond to IPv4 ICMP echoes sent to a broadcast address with the following command: $ sudo sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1 If "1" is not the system's default value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv4.icmp_echo_ignore_broadcasts=1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040240
- Vuln IDs
- V-230538
- Rule IDs
- SV-230538r744042_rule
Fix: F-33182r744041_fix
Configure RHEL 8 to not forward IPv6 source-routed packets with the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_source_route=0 If "0" is not the system's all value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv6.conf.all.accept_source_route=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040250
- Vuln IDs
- V-230539
- Rule IDs
- SV-230539r744045_rule
Fix: F-33183r744044_fix
Configure RHEL 8 to not forward IPv6 source-routed packets by default with the following command: $ sudo sysctl -w net.ipv6.conf.default.accept_source_route=0 If "0" is not the system's default value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv6.conf.default.accept_source_route=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040260
- Vuln IDs
- V-230540
- Rule IDs
- SV-230540r627750_rule
Fix: F-33184r568367_fix
Configure RHEL 8 to not allow packet forwarding, unless the system is a router with the following commands: $ sudo sysctl -w net.ipv4.ip_forward=0 $ sudo sysctl -w net.ipv6.conf.all.forwarding=0 If "0" is not the system's default value then add or update the following lines in the appropriate file under "/etc/sysctl.d": net.ipv4.ip_forward=0 net.ipv6.conf.all.forwarding=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040261
- Vuln IDs
- V-230541
- Rule IDs
- SV-230541r627750_rule
Fix: F-33185r568370_fix
Configure RHEL 8 to not accept router advertisements on all IPv6 interfaces unless the system is a router with the following commands: $ sudo sysctl -w net.ipv6.conf.all.accept_ra=0 If "0" is not the system's default value then add or update the following lines in the appropriate file under "/etc/sysctl.d": net.ipv6.conf.all.accept_ra=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040262
- Vuln IDs
- V-230542
- Rule IDs
- SV-230542r627750_rule
Fix: F-33186r568373_fix
Configure RHEL 8 to not accept router advertisements on all IPv6 interfaces by default unless the system is a router with the following commands: $ sudo sysctl -w net.ipv6.conf.default.accept_ra=0 If "0" is not the system's default value then add or update the following lines in the appropriate file under "/etc/sysctl.d": net.ipv6.conf.default.accept_ra=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040270
- Vuln IDs
- V-230543
- Rule IDs
- SV-230543r744047_rule
Fix: F-33187r568376_fix
Configure RHEL 8 to not allow interfaces to perform Internet Protocol version 4 (IPv4) ICMP redirects by default with the following command: $ sudo sysctl -w net.ipv4.conf.default.send_redirects=0 If "0" is not the system's default value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv4.conf.default.send_redirects=0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040280
- Vuln IDs
- V-230544
- Rule IDs
- SV-230544r744050_rule
Fix: F-33188r744049_fix
Configure RHEL 8 to ignore IPv6 ICMP redirect messages with the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0 If "0" is not the system's default value then add or update the following line in the appropriate file under "/etc/sysctl.d": net.ipv6.conf.all.accept_redirects = 0
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040281
- Vuln IDs
- V-230545
- Rule IDs
- SV-230545r627750_rule
Fix: F-33189r568382_fix
Configure RHEL 8 to prevent privilege escalation thru the kernel by disabling access to the bpf syscall by adding the following line to a file in the "/etc/sysctl.d" directory: kernel.unprivileged_bpf_disabled = 1 The system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040282
- Vuln IDs
- V-230546
- Rule IDs
- SV-230546r627750_rule
Fix: F-33190r568385_fix
Configure RHEL 8 to restrict usage of ptrace to descendant processes by adding the following line to a file in the "/etc/sysctl.d" directory: kernel.yama.ptrace_scope = 1 The system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040283
- Vuln IDs
- V-230547
- Rule IDs
- SV-230547r627750_rule
Fix: F-33191r568388_fix
Configure RHEL 8 to restrict exposed kernel pointer addresses access by adding the following line to a file in the "/etc/sysctl.d" directory: kernel.kptr_restrict = 1 The system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040284
- Vuln IDs
- V-230548
- Rule IDs
- SV-230548r627750_rule
Fix: F-33192r568391_fix
Configure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the "/etc/sysctl.d" directory: Note: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable. user.max_user_namespaces = 0 The system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040285
- Vuln IDs
- V-230549
- Rule IDs
- SV-230549r627750_rule
Fix: F-33193r568394_fix
Configure RHEL 8 to use reverse path filtering on all IPv4 interfaces by adding the following line to a file in the "/etc/sysctl.d" directory: net.ipv4.conf.all.rp_filter = 1 The system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command: $ sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040290
- Vuln IDs
- V-230550
- Rule IDs
- SV-230550r627750_rule
Fix: F-33194r568397_fix
If "postfix" is installed, modify the "/etc/postfix/main.cf" file to restrict client connections to the local network with the following command: $ sudo postconf -e 'smtpd_client_restrictions = permit_mynetworks,reject'
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040340
- Vuln IDs
- V-230555
- Rule IDs
- SV-230555r627750_rule
Fix: F-33199r568412_fix
Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "X11Forwarding" keyword and set its value to "no" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): X11Forwarding no The SSH service must be restarted for changes to take effect: $ sudo systemctl restart sshd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040341
- Vuln IDs
- V-230556
- Rule IDs
- SV-230556r627750_rule
Fix: F-33200r568415_fix
Configure the SSH daemon to prevent remote hosts from connecting to the proxy display. Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "X11UseLocalhost" keyword and set its value to "yes" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): X11UseLocalhost yes
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040350
- Vuln IDs
- V-230557
- Rule IDs
- SV-230557r627750_rule
Fix: F-33201r568418_fix
Configure the TFTP daemon to operate in secure mode by adding the following line to "/etc/xinetd.d/tftp" (or modify the line to have the required value): server_args = -s /var/lib/tftpboot
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- RHEL-08-040360
- Vuln IDs
- V-230558
- Rule IDs
- SV-230558r627750_rule
Fix: F-33202r568421_fix
Document the FTP server package with the ISSO as an operational requirement or remove it from the system with the following command: $ sudo yum remove vsftpd
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- RHEL-08-040370
- Vuln IDs
- V-230559
- Rule IDs
- SV-230559r646887_rule
Fix: F-33203r568424_fix
Document the gssproxy package with the ISSO as an operational requirement or remove it from the system with the following command: $ sudo yum remove gssproxy
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040380
- Vuln IDs
- V-230560
- Rule IDs
- SV-230560r627750_rule
Fix: F-33204r568427_fix
Document the iprutils package with the ISSO as an operational requirement or remove it from the system with the following command: $ sudo yum remove iprutils
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-040390
- Vuln IDs
- V-230561
- Rule IDs
- SV-230561r627750_rule
Fix: F-33205r568430_fix
Document the tuned package with the ISSO as an operational requirement or remove it from the system with the following command: $ sudo yum remove tuned
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- RHEL-08-010163
- Vuln IDs
- V-237640
- Rule IDs
- SV-237640r646890_rule
Fix: F-40822r646889_fix
Document the krb5-server package with the ISSO as an operational requirement or remove it from the system with the following command: $ sudo yum remove krb5-server
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- RHEL-08-010382
- Vuln IDs
- V-237641
- Rule IDs
- SV-237641r646893_rule
Fix: F-40823r646892_fix
Remove the following entries from the sudoers file: ALL ALL=(ALL) ALL ALL ALL=(ALL:ALL) ALL
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002227
- Version
- RHEL-08-010383
- Vuln IDs
- V-237642
- Rule IDs
- SV-237642r646896_rule
Fix: F-40824r646895_fix
Define the following in the Defaults section of the /etc/sudoers file or a configuration file in the /etc/sudoers.d/ directory: Defaults !targetpw Defaults !rootpw Defaults !runaspw
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- RHEL-08-010384
- Vuln IDs
- V-237643
- Rule IDs
- SV-237643r646899_rule
Fix: F-40825r646898_fix
Configure the "sudo" command to require re-authentication. Edit the /etc/sudoers file: $ sudo visudo Add or modify the following line: Defaults timestamp_timeout=[value] Note: The "[value]" must be a number that is greater than or equal to "0".