SUSE Linux Enterprise Server 15 STIG SCAP Benchmark
Open a previous version of this SCAP benchmark.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-001230
- Version
- SLES-15-010000
- Vuln IDs
- V-234800
- Rule IDs
- SV-234800r991589_rule
Fix: F-37951r618670_fix
Upgrade the SUSE operating system to a version supported by the vendor. If the system is not registered with the SUSE Customer Center, register the system against the correct subscription. If the system requires Long-Term Service Pack Support (LTSS), obtain the correct LTSS subscription for the system.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SLES-15-010030
- Vuln IDs
- V-234804
- Rule IDs
- SV-234804r987796_rule
Fix: F-37955r618682_fix
Document the "vsftpd" package with the ISSO as an operational requirement or remove it from the system with the following command: > sudo zypper remove vsftpd
- RMF Control
- AC-11
- Severity
- L
- CCI
- CCI-000056
- Version
- SLES-15-010110
- Vuln IDs
- V-234811
- Rule IDs
- SV-234811r1009610_rule
Fix: F-37962r618703_fix
Allow users to lock the console by installing the "kbd" package using zypper: > sudo zypper install kbd
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SLES-15-010150
- Vuln IDs
- V-234815
- Rule IDs
- SV-234815r958406_rule
Fix: F-37966r618715_fix
Configure SSH to verbosely log connection attempts and failed logon attempts to the SUSE operating system. Add or update the following line in the "/etc/ssh/sshd_config" file: LogLevel VERBOSE The SSH service will need to be restarted in order for the changes to take effect.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SLES-15-010160
- Vuln IDs
- V-234816
- Rule IDs
- SV-234816r958408_rule
Fix: F-37967r618718_fix
Edit the SSH daemon configuration (/etc/ssh/sshd_config) and remove any ciphers not starting with "aes" and remove any ciphers ending with "cbc". If necessary, add a "Ciphers" line: Ciphers aes256-ctr,aes192-ctr,aes128-ctr Restart the SSH daemon: > sudo systemctl restart sshd.service
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SLES-15-010180
- Vuln IDs
- V-234818
- Rule IDs
- SV-234818r987796_rule
Fix: F-37969r618724_fix
Remove the telnet-server package from the SUSE operating system by running the following command: > sudo zypper remove telnet-server
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SLES-15-010260
- Vuln IDs
- V-234825
- Rule IDs
- SV-234825r971535_rule
Fix: F-37976r618745_fix
Configure the SUSE operating system to require "ENCRYPT_METHOD" of "SHA512". Edit the "/etc/login.defs" file with the following line: ENCRYPT_METHOD SHA512
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- SLES-15-010270
- Vuln IDs
- V-234826
- Rule IDs
- SV-234826r958510_rule
Fix: F-37977r618748_fix
Configure the SUSE operating system SSH daemon to only use MACs that employ FIPS 140-2 approved hashes. Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "MACs" keyword and set its value to "hmac-sha2-512" and/or "hmac-sha2-256" (The file might be named differently or be in a different location): MACs hmac-sha2-512,hmac-sha2-256
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- SLES-15-010280
- Vuln IDs
- V-234827
- Rule IDs
- SV-234827r986464_rule
Fix: F-37978r618751_fix
Configure the SUSE operating system SSH daemon to timeout idle sessions. Add or modify (to match exactly) the following line in the "/etc/ssh/sshd_config" file: ClientAliveInterval 600 The SSH daemon must be restarted for any changes to take effect.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SLES-15-010310
- Vuln IDs
- V-234829
- Rule IDs
- SV-234829r958528_rule
Fix: F-37980r618757_fix
Configure the SUSE operating system to use IPv4 TCP syncookies by running the following command as an administrator: > sudo sysctl -w net.ipv4.tcp_syncookies=1 If "1" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv4.tcp_syncookies=1" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- SLES-15-010320
- Vuln IDs
- V-234830
- Rule IDs
- SV-234830r1069400_rule
Fix: F-37981r1069399_fix
Configure the SUSE operating system to automatically terminate all network connections associated with SSH traffic at the end of a session or after a 10-minute period of inactivity. Modify or append the following lines in the "/etc/ssh/sshd_config" file: ClientAliveCountMax 1 For the changes to take effect, the SSH daemon must be restarted. > sudo systemctl restart sshd.service
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SLES-15-010340
- Vuln IDs
- V-234832
- Rule IDs
- SV-234832r958564_rule
Fix: F-37983r880883_fix
Configure the SUSE operating system to set permissions of all log files under /var/log directory to "640" or more restricted, by using the following command: Note: The btmp, wtmp, and lastlog files are excluded. Refer to the Discussion for details. > sudo find /var/log -perm /137 ! -name '*[bw]tmp' ! -name '*lastlog' -type f -exec chmod 640 '{}' \;
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SLES-15-010351
- Vuln IDs
- V-234834
- Rule IDs
- SV-234834r991560_rule
Fix: F-37985r618772_fix
Configure the library files to be protected from unauthorized access. Run the following command: > sudo find /lib /lib64 /usr/lib /usr/lib64 -perm /022 -type f -exec chmod 755 '{}' \;
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SLES-15-010352
- Vuln IDs
- V-234835
- Rule IDs
- SV-234835r991560_rule
Fix: F-37986r618775_fix
Configure the shared library directories to be protected from unauthorized access. Run the following command: > sudo find /lib /lib64 /usr/lib /usr/lib64 -perm /022 -type d -exec chmod 755 '{}' \;
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SLES-15-010353
- Vuln IDs
- V-234836
- Rule IDs
- SV-234836r991560_rule
Fix: F-37987r618778_fix
Configure the system library files to be protected from unauthorized access. Run the following command: > sudo find /lib /lib64 /usr/lib /usr/lib64 ! -user root -type f -exec chown root '{}' \;
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SLES-15-010354
- Vuln IDs
- V-234837
- Rule IDs
- SV-234837r991560_rule
Fix: F-37988r618781_fix
Configure the library files and their respective parent directories to be protected from unauthorized access. Run the following command: > sudo find /lib /lib64 /usr/lib /usr/lib64 ! -user root -type d -exec chown root '{}' \;
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SLES-15-010355
- Vuln IDs
- V-234838
- Rule IDs
- SV-234838r991560_rule
Fix: F-37989r618784_fix
Configure the system library files to be protected from unauthorized access. Run the following command: > sudo find /lib /lib64 /usr/lib /usr/lib64 ! -group root -type f -exec chgrp root '{}' \;
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SLES-15-010356
- Vuln IDs
- V-234839
- Rule IDs
- SV-234839r991560_rule
Fix: F-37990r618787_fix
Configure the system library directories to be protected from unauthorized access. Run the following command: > sudo find /lib /lib64 /usr/lib /usr/lib64 ! -group root -type d -exec chgrp root '{}' \;
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SLES-15-010357
- Vuln IDs
- V-234840
- Rule IDs
- SV-234840r991560_rule
Fix: F-37991r618790_fix
Configure the system commands to be protected from unauthorized access. Run the following command: > sudo find -L /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin -perm /022 -type f -exec chmod 755 '{}' \;
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SLES-15-010358
- Vuln IDs
- V-234841
- Rule IDs
- SV-234841r991560_rule
Fix: F-37992r618793_fix
Configure the system commands directories to be protected from unauthorized access. Run the following command: > sudo find -L /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin -perm /022 -type d -exec chmod -R 755 '{}' \;
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SLES-15-010359
- Vuln IDs
- V-234842
- Rule IDs
- SV-234842r991560_rule
Fix: F-37993r618796_fix
Configure the system commands - and their respective parent directories - to be protected from unauthorized access. Run the following command: > sudo find -L /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin ! -user root -type f -exec chown root '{}' \;
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SLES-15-010360
- Vuln IDs
- V-234843
- Rule IDs
- SV-234843r991560_rule
Fix: F-37994r618799_fix
Configure the system commands directories to be protected from unauthorized access. Run the following command: > sudo find -L /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin ! -user root -type d -exec chown root '{}' \;
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SLES-15-010361
- Vuln IDs
- V-234844
- Rule IDs
- SV-234844r991560_rule
Fix: F-37995r833002_fix
Configure the system commands to be protected from unauthorized access. Run the following command, replacing "[FILE]" with any system command file not group-owned by "root" or a required system account. > sudo chgrp root [FILE]
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SLES-15-010362
- Vuln IDs
- V-234845
- Rule IDs
- SV-234845r991560_rule
Fix: F-37996r618805_fix
Configure the system commands directories to be protected from unauthorized access. Run the following command: > sudo find -L /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin ! -group root -type d -exec chgrp root '{}' \;
- RMF Control
- Severity
- H
- CCI
- CCI-004895
- Version
- SLES-15-010450
- Vuln IDs
- V-234853
- Rule IDs
- SV-234853r1050789_rule
Fix: F-38004r618829_fix
Configure the SUSE operating system to remove any occurrence of "NOPASSWD" or "!authenticate" found in the "/etc/sudoers" file. If the system does not use passwords for authentication, the "NOPASSWD" tag may exist in the file.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SLES-15-010510
- Vuln IDs
- V-234859
- Rule IDs
- SV-234859r987791_rule
Fix: F-38010r618847_fix
To configure the SUSE operating system to run in FIPS mode, add "fips=1" to the kernel parameter during the SUSE operating system install. Enabling FIPS mode on a preexisting system involves a number of modifications to the SUSE operating system. Refer to section 9.1, "Crypto Officer Guidance", of the following document for installation guidance: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp2435.pdf
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SLES-15-010530
- Vuln IDs
- V-234860
- Rule IDs
- SV-234860r958908_rule
Fix: F-38011r618850_fix
Note: If the system is not networked, this requirement is Not Applicable. Configure the SUSE operating system to implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission. Install the OpenSSH package on the SUSE operating system with the following command: > sudo zypper in openssh Enable the OpenSSH service to start automatically on reboot with the following command: > sudo systemctl enable sshd.service For the changes to take effect immediately, start the service with the following command: > sudo systemctl restart sshd.service
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- SLES-15-010540
- Vuln IDs
- V-234861
- Rule IDs
- SV-234861r958928_rule
Fix: F-38012r618853_fix
Configure the SUSE operating system to prevent leaking of internal kernel addresses by running the following command: > sudo sysctl -w kernel.kptr_restrict=1 If "1" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "kernel.kptr_restrict=1" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- SLES-15-010550
- Vuln IDs
- V-234862
- Rule IDs
- SV-234862r958928_rule
Fix: F-38013r618856_fix
Configure the SUSE operating system to implement ASLR by running the following command as an administrator: > sudo sysctl -w kernel.randomize_va_space=2 If "2" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "kernel.randomize_va_space=2" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- SLES-15-020020
- Vuln IDs
- V-234868
- Rule IDs
- SV-234868r958398_rule
Fix: F-38019r618874_fix
Configure the SUSE operating system to limit the number of concurrent sessions to "10" or less for all accounts and/or account types. Add the following line to the file "/etc/security/limits.conf": * hard maxlogins 10
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SLES-15-020040
- Vuln IDs
- V-234870
- Rule IDs
- SV-234870r1009618_rule
Fix: F-38021r618880_fix
Configure the SUSE operating system to deny direct logons to the root account using remote access via SSH. Edit the appropriate "/etc/ssh/sshd_config" file, add or uncomment the line for "PermitRootLogin" and set its value to "no" (this file may be named differently or be in a different location): PermitRootLogin no
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SLES-15-020100
- Vuln IDs
- V-234876
- Rule IDs
- SV-234876r991589_rule
Fix: F-38027r618898_fix
Change the UID of any account on the SUSE operating system, other than the root account, that has a UID of "0". If the account is associated with system commands or applications, the UID should be changed to one greater than "0" but less than "1000". Otherwise, assign a UID of greater than "1000" that has not already been assigned.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-020101
- Vuln IDs
- V-234877
- Rule IDs
- SV-234877r991589_rule
Fix: F-38028r618901_fix
Remove the following entries from the sudoers file: ALL ALL=(ALL) ALL ALL ALL=(ALL:ALL) ALL
- RMF Control
- Severity
- M
- CCI
- CCI-004895
- Version
- SLES-15-020102
- Vuln IDs
- V-234878
- Rule IDs
- SV-234878r1050789_rule
Fix: F-38029r986476_fix
Configure the "sudo" command to require reauthentication. Edit the /etc/sudoers file: > sudo visudo Add or modify the following line: Defaults timestamp_timeout=[value] Note: The "[value]" must be a number that is greater than or equal to "0".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-020103
- Vuln IDs
- V-234879
- Rule IDs
- SV-234879r991589_rule
Fix: F-38030r618907_fix
Define the following in the Defaults section of the /etc/sudoers file or a configuration file in the /etc/sudoers.d/ directory: Defaults !targetpw Defaults !rootpw Defaults !runaspw
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-020110
- Vuln IDs
- V-234880
- Rule IDs
- SV-234880r991589_rule
Fix: F-38031r618910_fix
Configure the SUSE operating system to assign home directories to all new local interactive users by setting the "CREATE_HOME" parameter in "/etc/login.defs" to "yes" as follows. CREATE_HOME yes
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000052
- Version
- SLES-15-020120
- Vuln IDs
- V-234881
- Rule IDs
- SV-234881r991589_rule
Fix: F-38032r618913_fix
Configure the SUSE operating system to provide users with feedback on when account accesses last occurred. Add or edit the following lines in the "/etc/ssh/sshd_config" file: PrintLastLog yes
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- SLES-15-020180
- Vuln IDs
- V-234887
- Rule IDs
- SV-234887r1009626_rule
Fix: F-38038r618931_fix
Configure the SUSE operating system to encrypt all stored passwords with a strong cryptographic hash. Edit/modify the following line in the "/etc/login.defs" file and set "ENCRYPT_METHOD" to have a value of "SHA512". ENCRYPT_METHOD SHA512 Lock all interactive user accounts not using SHA512 hashing until the passwords can be regenerated.
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- SLES-15-020190
- Vuln IDs
- V-234888
- Rule IDs
- SV-234888r1044810_rule
Fix: F-38039r1044809_fix
Configure the SUSE operating system to encrypt all stored passwords with a strong cryptographic hash. Edit/modify the following line in the "/etc/login.defs" file and set "SHA_CRYPT_MIN_ROUNDS" to a value no lower than "100000": SHA_CRYPT_MIN_ROUNDS 100000
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SLES-15-020200
- Vuln IDs
- V-234889
- Rule IDs
- SV-234889r1009628_rule
Fix: F-38040r986485_fix
Configure the SUSE operating system to enforce 24 hours/one day or greater as the minimum password age. Edit the file "/etc/login.defs" and add or correct the following line. Replace [DAYS] with the appropriate amount of days: PASS_MIN_DAYS [DAYS] The DOD requirement is "1" but a greater value is acceptable.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SLES-15-020210
- Vuln IDs
- V-234890
- Rule IDs
- SV-234890r1009629_rule
Fix: F-38041r618940_fix
Configure the SUSE operating system to enforce 24 hours/one day or greater as the minimum password age for user accounts. Change the minimum time period between password changes for each [USER] account to "1" day with the command, replacing [USER] with the user account that must be changed: > sudo passwd -n 1 [USER]
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SLES-15-020220
- Vuln IDs
- V-234891
- Rule IDs
- SV-234891r1038967_rule
Fix: F-38042r986489_fix
Configure the SUSE operating system to enforce a maximum password age of 60 days or less. Edit the file "/etc/login.defs" and add or correct the following line. Replace [DAYS] with the appropriate amount of days: PASS_MAX_DAYS [DAYS] The DOD requirement is 60 days or less (greater than zero, as zero days will lock the account immediately).
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SLES-15-020230
- Vuln IDs
- V-234892
- Rule IDs
- SV-234892r1038967_rule
Fix: F-38043r986491_fix
Configure the SUSE operating system to enforce a maximum password age of each [USER] account to 60 days. The command in the check text will give a list of users that need to be updated to be in compliance: > sudo passwd -x 60 [USER] The DOD requirement is 60 days.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SLES-15-030000
- Vuln IDs
- V-234899
- Rule IDs
- SV-234899r1009634_rule
Fix: F-38050r986497_fix
Configure the SUSE operating system to generate an audit record when all modifications to the "/etc/passwd" file occur. Add or update the following rule to "/etc/audit/rules.d/audit.rules": -w /etc/passwd -p wa -k account_mod To reload the rules file, restart the audit daemon: > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SLES-15-030010
- Vuln IDs
- V-234900
- Rule IDs
- SV-234900r1009635_rule
Fix: F-38051r986500_fix
Configure the SUSE operating system to generate an audit record when all modifications to the "/etc/group" file occur. Add or update the following rule to "/etc/audit/rules.d/audit.rules": -w /etc/group -p wa -k account_mod To reload the rules file, restart the audit daemon: > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SLES-15-030020
- Vuln IDs
- V-234901
- Rule IDs
- SV-234901r1009636_rule
Fix: F-38052r986503_fix
Configure the SUSE operating system to generate an audit record when all modifications to the "/etc/shadow" file occur. Add or update the following rule to "/etc/audit/rules.d/audit.rules": -w /etc/shadow -p wa -k account_mod To reload the rules file, restart the audit daemon: > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SLES-15-030030
- Vuln IDs
- V-234902
- Rule IDs
- SV-234902r1009637_rule
Fix: F-38053r986506_fix
Configure the SUSE operating system to generate an audit record when all modifications to the "/etc/security/opasswd" file occur. Add or update the following rule to "/etc/audit/rules.d/audit.rules": -w /etc/security/opasswd -p wa -k account_mod To reload the rules file, restart the audit daemon: > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SLES-15-030040
- Vuln IDs
- V-234903
- Rule IDs
- SV-234903r958368_rule
Fix: F-38054r618979_fix
Configure the SUSE operating system to generate an audit record when all modifications to the "/etc/gshadow" file occur. Add or update the following rule to "/etc/audit/rules.d/audit.rules": -w /etc/gshadow -p wa -k account_mod To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030050
- Vuln IDs
- V-234904
- Rule IDs
- SV-234904r958412_rule
Fix: F-38055r618982_fix
Enable the SUSE operating system auditd service by performing the following commands: > sudo systemctl enable auditd.service > sudo systemctl start auditd.service
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SLES-15-030060
- Vuln IDs
- V-234905
- Rule IDs
- SV-234905r958412_rule
Fix: F-38056r618985_fix
Configure the SUSE operating system to generate an audit record for all uses of the "ssh-keysign" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/lib/ssh/ssh-keysign -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-ssh-keysign To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030070
- Vuln IDs
- V-234906
- Rule IDs
- SV-234906r958412_rule
Fix: F-38057r618988_fix
Configure the SUSE operating system to generate an audit record for all uses of the "passwd" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/passwd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passwd To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SLES-15-030080
- Vuln IDs
- V-234907
- Rule IDs
- SV-234907r958412_rule
Fix: F-38058r618991_fix
Configure the SUSE operating system to generate an audit record for all uses of the "gpasswd" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-gpasswd To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SLES-15-030090
- Vuln IDs
- V-234908
- Rule IDs
- SV-234908r958412_rule
Fix: F-38059r618994_fix
Configure the SUSE operating system to generate an audit record for all uses of the "newgrp" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/newgrp -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-newgrp To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SLES-15-030100
- Vuln IDs
- V-234909
- Rule IDs
- SV-234909r958412_rule
Fix: F-38060r618997_fix
Configure the SUSE operating system to generate an audit record for all uses of the "chsh" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chsh -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-chsh To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030110
- Vuln IDs
- V-234910
- Rule IDs
- SV-234910r958412_rule
Fix: F-38061r619000_fix
Configure the SUSE operating system to generate an audit record for all uses of the "unix_chkpwd" and "unix2_chkpwd" commands. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-unix-chkpwd -a always,exit -F path=/sbin/unix2_chkpwd -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-unix2-chkpwd To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030120
- Vuln IDs
- V-234911
- Rule IDs
- SV-234911r958412_rule
Fix: F-38062r619003_fix
Configure the SUSE operating system to generate an audit record for all uses of the "chage" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chage -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-chage To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030130
- Vuln IDs
- V-234912
- Rule IDs
- SV-234912r958412_rule
Fix: F-38063r619006_fix
Configure the SUSE operating system to generate an audit record for all uses of the "crontab" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/crontab -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-crontab To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030140
- Vuln IDs
- V-234913
- Rule IDs
- SV-234913r958412_rule
Fix: F-38064r619009_fix
Configure the SUSE operating system to generate audit records when successful/unsuccessful attempts to access the "/etc/sudoers" file and files in the "/etc/sudoers.d/" directory. Add or update the following rule in "/etc/audit/rules.d/audit.rules": -w /etc/sudoers -p wa -k privileged-actions -w /etc/sudoers.d -p wa -k privileged-actions To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030150
- Vuln IDs
- V-234914
- Rule IDs
- SV-234914r958412_rule
Fix: F-38065r854231_fix
Configure the SUSE operating system to generate an audit record for all uses of the "creat", "open", "openat", "open_by_handle_at", "truncate", and "ftruncate" system calls. Add or update the following rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid>=1000 -F auid!=4294967295 -k perm_access -a always,exit -F arch=b64 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EPERM -F auid>=1000 -F auid!=4294967295 -k perm_access -a always,exit -F arch=b32 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=4294967295 -k perm_access -a always,exit -F arch=b64 -S creat,open,openat,open_by_handle_at,truncate,ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=4294967295 -k perm_access To reload the rules file, restart the audit daemon: > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030190
- Vuln IDs
- V-234918
- Rule IDs
- SV-234918r958412_rule
Fix: F-38069r854233_fix
Configure the SUSE operating system to generate an audit record for all uses of the "setxattr", "fsetxattr", "lsetxattr","removexattr", "fremovexattr", and "lremovexattr" system calls. Add or update the following rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid>=1000 -F auid!=4294967295 -k perm_mod -a always,exit -F arch=b64 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid>=1000 -F auid!=4294967295 -k perm_mod To reload the rules file, restart the audit daemon: > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030250
- Vuln IDs
- V-234924
- Rule IDs
- SV-234924r958412_rule
Fix: F-38075r854235_fix
Configure the SUSE operating system to generate an audit record for all uses of the "chown", "fchown", "fchownat", and "lchown" system calls. Add or update the following rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S chown,fchown,fchownat,lchown -F auid>=1000 -F auid!=4294967295 -k perm_mod -a always,exit -F arch=b64 -S chown,fchown,fchownat,lchown -F auid>=1000 -F auid!=4294967295 -k perm_mod To reload the rules file, restart the audit daemon: > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030290
- Vuln IDs
- V-234928
- Rule IDs
- SV-234928r958412_rule
Fix: F-38079r854237_fix
Configure the SUSE operating system to generate an audit record for all uses of the "chmod", "fchmod", and "fchmodat" system calls. Add or update the following rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S chmod,fchmod,fchmodat -F auid>=1000 -F auid!=4294967295 -k perm_mod -a always,exit -F arch=b64 -S chmod,fchmod,fchmodat -F auid>=1000 -F auid!=4294967295 -k perm_mod To reload the rules file, restart the audit daemon: > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030330
- Vuln IDs
- V-234932
- Rule IDs
- SV-234932r958412_rule
Fix: F-38083r619066_fix
Configure the SUSE operating system to generate an audit record for all uses of the "sudoedit" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/sudoedit -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-sudoedit To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SLES-15-030340
- Vuln IDs
- V-234933
- Rule IDs
- SV-234933r958412_rule
Fix: F-38084r619069_fix
Configure the SUSE operating system to generate an audit record for all uses of the "chfn" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chfn -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-chfn To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SLES-15-030350
- Vuln IDs
- V-234934
- Rule IDs
- SV-234934r958412_rule
Fix: F-38085r619072_fix
Configure the SUSE operating system to generate an audit record for all uses of the "mount" system call. Add or update the following rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S mount -F auid>=1000 -F auid!=4294967295 -k privileged-mount -a always,exit -F arch=b64 -S mount -F auid>=1000 -F auid!=4294967295 -k privileged-mount To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SLES-15-030360
- Vuln IDs
- V-234935
- Rule IDs
- SV-234935r958412_rule
Fix: F-38086r619075_fix
Configure the SUSE operating system to generate an audit record for all uses of the "umount" and "umount2" system calls. Add or update the following rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S umount -F auid>=1000 -F auid!=4294967295 -k privileged-umount -a always,exit -F arch=b32 -S umount2 -F auid>=1000 -F auid!=4294967295 -k privileged-umount -a always,exit -F arch=b64 -S umount2 -F auid>=1000 -F auid!=4294967295 -k privileged-umount To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SLES-15-030370
- Vuln IDs
- V-234936
- Rule IDs
- SV-234936r958412_rule
Fix: F-38087r619078_fix
Configure the SUSE operating system to generate an audit record for all uses of the "ssh-agent" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/ssh-agent -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-ssh-agent To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030380
- Vuln IDs
- V-234937
- Rule IDs
- SV-234937r958412_rule
Fix: F-38088r619081_fix
Configure the SUSE operating system to audit the execution of the module management program "insmod" by adding the following line to "/etc/audit/rules.d/audit.rules": -w /sbin/insmod -p x -k modules To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030390
- Vuln IDs
- V-234938
- Rule IDs
- SV-234938r958412_rule
Fix: F-38089r619084_fix
Configure the SUSE operating system to audit the execution of the module management program "rmmod" by adding the following line to "/etc/audit/rules.d/audit.rules": -w /sbin/rmmod -p x -k modules To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030400
- Vuln IDs
- V-234939
- Rule IDs
- SV-234939r958412_rule
Fix: F-38090r619087_fix
Configure the SUSE operating system to audit the execution of the module management program "modprobe" by adding the following line to "/etc/audit/rules.d/audit.rules": -w /sbin/modprobe -p x -k modules To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030410
- Vuln IDs
- V-234940
- Rule IDs
- SV-234940r958412_rule
Fix: F-38091r619090_fix
Configure the SUSE operating system to audit the execution of the module management program "kmod" by adding the following line to "/etc/audit/rules.d/audit.rules": -w /usr/bin/kmod -p x -k modules To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030420
- Vuln IDs
- V-234941
- Rule IDs
- SV-234941r958412_rule
Fix: F-38092r619093_fix
Configure the SUSE operating system to generate an audit record for all uses of the "chmod" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chmod -F perm=x -F auid>=1000 -F auid!=4294967295 -k prim_mod To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030430
- Vuln IDs
- V-234942
- Rule IDs
- SV-234942r958412_rule
Fix: F-38093r619096_fix
Configure the SUSE operating system to generate an audit record for all uses of the "setfacl" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/setfacl -F perm=x -F auid>=1000 -F auid!=4294967295 -k prim_mod To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030440
- Vuln IDs
- V-234943
- Rule IDs
- SV-234943r958412_rule
Fix: F-38094r619099_fix
Configure the SUSE operating system to generate an audit record for all uses of the "chacl" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chacl -F perm=x -F auid>=1000 -F auid!=4294967295 -k prim_mod To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030450
- Vuln IDs
- V-234944
- Rule IDs
- SV-234944r958412_rule
Fix: F-38095r619102_fix
Configure the SUSE operating system to generate an audit record for all uses of the "chcon" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/chcon -F perm=x -F auid>=1000 -F auid!=4294967295 -k prim_mod To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030460
- Vuln IDs
- V-234945
- Rule IDs
- SV-234945r958412_rule
Fix: F-38096r619105_fix
Configure the SUSE operating system to generate an audit record for all uses of the "rm" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/rm -F perm=x -F auid>=1000 -F auid!=4294967295 -k prim_mod To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030470
- Vuln IDs
- V-234946
- Rule IDs
- SV-234946r958412_rule
Fix: F-38097r619108_fix
Configure the SUSE operating system to generate an audit record for any all modifications to the "tallylog" file occur. Add or update the following rule to "/etc/audit/rules.d/audit.rules": -w /var/log/tallylog -p wa -k logins To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030480
- Vuln IDs
- V-234947
- Rule IDs
- SV-234947r958412_rule
Fix: F-38098r619111_fix
Configure the SUSE operating system to generate an audit record for any all modifications to the "lastlog" file occur. Add or update the following rule to "/etc/audit/rules.d/audit.rules": -w /var/log/lastlog -p wa -k logins To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030490
- Vuln IDs
- V-234948
- Rule IDs
- SV-234948r958412_rule
Fix: F-38099r619114_fix
Configure the SUSE operating system to generate an audit record for all uses of the "passmass" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/passmass -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-passmass To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030500
- Vuln IDs
- V-234949
- Rule IDs
- SV-234949r958412_rule
Fix: F-38100r619117_fix
Configure the SUSE operating system to generate an audit record for all uses of the "usermod" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/usermod -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-usermod To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030510
- Vuln IDs
- V-234950
- Rule IDs
- SV-234950r958412_rule
Fix: F-38101r619120_fix
Configure the SUSE operating system to generate an audit record for all uses of the "pam_timestamp_check" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/sbin/pam_timestamp_check -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-pam_timestamp_check To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030520
- Vuln IDs
- V-234951
- Rule IDs
- SV-234951r958412_rule
Fix: F-38102r619123_fix
Configure the SUSE operating system to generate an audit record for all uses of the "delete_module" system call. Add or update the following rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S delete_module -F auid>=1000 -F auid!=4294967295 -k unload_module -a always,exit -F arch=b64 -S delete_module -F auid>=1000 -F auid!=4294967295 -k unload_module To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030530
- Vuln IDs
- V-234952
- Rule IDs
- SV-234952r958412_rule
Fix: F-38103r854259_fix
Configure the SUSE operating system to generate an audit record for all uses of the "init_module" and "finit_module" system calls. Add or update the following rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S init_module,finit_module -F auid>=1000 -F auid!=4294967295 -k moduleload -a always,exit -F arch=b64 -S init_module,finit_module -F auid>=1000 -F auid!=4294967295 -k moduleload To reload the rules file, restart the audit daemon: > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SLES-15-030550
- Vuln IDs
- V-234954
- Rule IDs
- SV-234954r958412_rule
Fix: F-38105r619132_fix
Configure the SUSE operating system to generate an audit record for all uses of the "su" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/su -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-priv_change To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SLES-15-030560
- Vuln IDs
- V-234955
- Rule IDs
- SV-234955r958412_rule
Fix: F-38106r619135_fix
Configure the SUSE operating system to generate an audit record for all uses of the "sudo" command. Add or update the following rules in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/sudo -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-sudo To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- Severity
- L
- CCI
- CCI-003938
- Version
- SLES-15-030640
- Vuln IDs
- V-234963
- Rule IDs
- SV-234963r1009638_rule
Fix: F-38114r986509_fix
Configure the SUSE operating system to generate an audit record for any privileged use of the "execve" system call. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k setuid -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k setuid -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k setgid -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k setgid To reload the rules file, restart the audit daemon: > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SLES-15-030650
- Vuln IDs
- V-234964
- Rule IDs
- SV-234964r1009639_rule
Fix: F-38115r619162_fix
The SUSE operating system auditd package must be installed on the system. If it is not installed, use the following command to install it: > sudo zypper in audit
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SLES-15-030670
- Vuln IDs
- V-234966
- Rule IDs
- SV-234966r1009564_rule
Fix: F-38117r1009563_fix
Install the "audit-audispd-plugins" package on the SUSE operating system by running the following command: > sudo zypper install audit-audispd-plugins
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SLES-15-030740
- Vuln IDs
- V-234973
- Rule IDs
- SV-234973r991577_rule
Fix: F-38124r809558_fix
Configure the SUSE operating system to generate an audit record for all uses of the "unlink", "unlinkat", "rename", "renameat", and "rmdir" system calls. Add or update the following rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S unlink,unlinkat,rename,renameat,rmdir -F auid>=1000 -F auid!=4294967295 -k perm_mod -a always,exit -F arch=b64 -S unlink,unlinkat,rename,renameat,rmdir -F auid>=1000 -F auid!=4294967295 -k perm_mod To reload the rules file, restart the audit daemon: > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SLES-15-030760
- Vuln IDs
- V-234975
- Rule IDs
- SV-234975r991581_rule
Fix: F-38126r619195_fix
Configure the SUSE operating system to generate an audit record for the "/run/utmp" file. Add or update the following rules to "/etc/audit/rules.d/audit.rules": -w /run/utmp -p wa -k login_mod To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SLES-15-030770
- Vuln IDs
- V-234976
- Rule IDs
- SV-234976r991581_rule
Fix: F-38127r619198_fix
Configure the SUSE operating system to generate an audit record for the "/var/log/wtmp" file. Add or update the following rules to "/etc/audit/rules.d/audit.rules": -w /var/log/wtmp -p wa -k login_mod To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SLES-15-030780
- Vuln IDs
- V-234977
- Rule IDs
- SV-234977r991581_rule
Fix: F-38128r619201_fix
Configure the SUSE operating system to generate an audit record for the "/var/log/btmp" file. Add or update the following rules to "/etc/audit/rules.d/audit.rules": -w /var/log/btmp -p wa -k login_mod To reload the rules file, restart the audit daemon > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SLES-15-030790
- Vuln IDs
- V-234978
- Rule IDs
- SV-234978r1009573_rule
Fix: F-38129r1009572_fix
Configure the SUSE operating system to take the appropriate action if it cannot off-load audit records to a different system or storage media from the system being audited due to a network failure. Uncomment the "network_failure_action" option in "/etc/audit/audisp-remote.conf" and set it to "syslog", "single", or "halt". See the example below: network_failure_action = syslog
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-030820
- Vuln IDs
- V-234981
- Rule IDs
- SV-234981r991589_rule
Fix: F-38132r619213_fix
Remove the "-a task,never" rule from the /etc/audit/rules.d/audit.rules file. The audit daemon must be restarted for the changes to take effect. > sudo systemctl restart auditd.service
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SLES-15-040020
- Vuln IDs
- V-234984
- Rule IDs
- SV-234984r991589_rule
Fix: F-38135r619222_fix
Remove any ".shosts" files found on the SUSE operating system. > sudo rm /[path]/[to]/[file]/.shosts
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SLES-15-040030
- Vuln IDs
- V-234985
- Rule IDs
- SV-234985r991589_rule
Fix: F-38136r619225_fix
Remove any "shosts.equiv" files found on the SUSE operating system. > sudo rm /[path]/[to]/[file]/shosts.equiv
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SLES-15-040062
- Vuln IDs
- V-234990
- Rule IDs
- SV-234990r991589_rule
Fix: F-38141r619240_fix
Configure the system to disable the CtrlAltDelBurstAction by added or modifying the following line in the "/etc/systemd/system.conf" configuration file: CtrlAltDelBurstAction=none Reload the daemon for this change to take effect > sudo systemctl daemon-reload
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040160
- Vuln IDs
- V-235000
- Rule IDs
- SV-235000r991589_rule
Fix: F-38151r619270_fix
Configure the SUSE operating system "/etc/fstab" file to use the "nosuid" option on file systems that are being exported via NFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040170
- Vuln IDs
- V-235001
- Rule IDs
- SV-235001r991589_rule
Fix: F-38152r619273_fix
Configure the SUSE operating system "/etc/fstab" file to use the "noexec" option on file systems that are being exported via NFS.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SLES-15-040210
- Vuln IDs
- V-235005
- Rule IDs
- SV-235005r991589_rule
Fix: F-38156r619285_fix
Create a separate file system/partition on the SUSE operating system for "/var". Migrate "/var" onto the separate file system/partition.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040230
- Vuln IDs
- V-235007
- Rule IDs
- SV-235007r991589_rule
Fix: F-38158r619291_fix
Configure the SUSE operating system SSH daemon to not allow authentication using "known hosts" authentication. Add the following line in "/etc/ssh/sshd_config", or uncomment the line and set the value to "yes": IgnoreUserKnownHosts yes
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040240
- Vuln IDs
- V-235008
- Rule IDs
- SV-235008r991589_rule
Fix: F-38159r619294_fix
Configure the SUSE operating system SSH daemon public host key files have mode "0644" or less permissive. Note: SSH public key files may be found in other directories on the system depending on the installation. Change the mode of public host key files under "/etc/ssh" to "0644" with the following command: > sudo chmod 0644 /etc/ssh/ssh_host*key.pub
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040250
- Vuln IDs
- V-235009
- Rule IDs
- SV-235009r991589_rule
Fix: F-38160r880957_fix
Configure the mode of the SUSE operating system SSH daemon private host key files under "/etc/ssh" to "0640" with the following command: > sudo chmod 0640 /etc/ssh/ssh_host*key
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040260
- Vuln IDs
- V-235010
- Rule IDs
- SV-235010r991589_rule
Fix: F-38161r619300_fix
Configure the SUSE operating system SSH daemon performs strict mode checking of home directory configuration files. Uncomment the "StrictModes" keyword in "/etc/ssh/sshd_config" and set the value to "yes": StrictModes yes
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040290
- Vuln IDs
- V-235013
- Rule IDs
- SV-235013r991589_rule
Fix: F-38164r619309_fix
Configure the SUSE operating system SSH daemon to disable forwarded X connections for interactive users. Edit the "/etc/ssh/sshd_config" file to uncomment or add the line for the "X11Forwarding" keyword and set its value to "no" (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor): X11Forwarding no
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040300
- Vuln IDs
- V-235014
- Rule IDs
- SV-235014r991589_rule
Fix: F-38165r619312_fix
Configure the SUSE operating system to disable IPv4 source routing by running the following command as an administrator: > sudo sysctl -w net.ipv4.conf.all.accept_source_route=0 If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv4.conf.all.accept_source_route=0" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040310
- Vuln IDs
- V-235015
- Rule IDs
- SV-235015r991589_rule
Fix: F-38166r619315_fix
Configure the SUSE operating system to disable IPv6 source routing by running the following command as an administrator: > sudo sysctl -w net.ipv6.conf.all.accept_source_route=0 If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv6.conf.all.accept_source_route=0" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040320
- Vuln IDs
- V-235016
- Rule IDs
- SV-235016r991589_rule
Fix: F-38167r619318_fix
Configure the SUSE operating system to disable IPv4 default source routing by running the following command as an administrator: > sudo sysctl -w net.ipv4.conf.default.accept_source_route=0 If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv4.conf.default.accept_source_route=0" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040321
- Vuln IDs
- V-235017
- Rule IDs
- SV-235017r991589_rule
Fix: F-38168r619321_fix
Configure the SUSE operating system to disable IPv6 default source routing by running the following command as an administrator: > sudo sysctl -w net.ipv6.conf.default.accept_source_route=0 If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv6.conf.default.accept_source_route=0" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040330
- Vuln IDs
- V-235018
- Rule IDs
- SV-235018r991589_rule
Fix: F-38169r619324_fix
Configure the SUSE operating system to not accept IPv4 ICMP redirect messages by running the following command as an administrator: > sudo sysctl -w net.ipv4.conf.all.accept_redirects=0 If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv4.conf.all.accept_redirects=0" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040340
- Vuln IDs
- V-235019
- Rule IDs
- SV-235019r991589_rule
Fix: F-38170r619327_fix
Configure the SUSE operating system to not accept IPv4 ICMP redirect messages by default by running the following command as an administrator: > sudo sysctl -w net.ipv4.conf.default.accept_redirects=0 If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv4.conf.default.accept_redirects=0" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040341
- Vuln IDs
- V-235020
- Rule IDs
- SV-235020r991589_rule
Fix: F-38171r619330_fix
Configure the SUSE operating system to not accept IPv6 ICMP redirect messages by running the following command as an administrator: > sudo sysctl -w net.ipv6.conf.all.accept_redirects=0 If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv6.conf.all.accept_redirects=0" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040350
- Vuln IDs
- V-235021
- Rule IDs
- SV-235021r991589_rule
Fix: F-38172r619333_fix
Configure the SUSE operating system to not accept IPv6 ICMP redirect messages by default by running the following command as an administrator: > sudo sysctl -w net.ipv6.conf.default.accept_redirects=0 If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv6.conf.default.accept_redirects=0" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040360
- Vuln IDs
- V-235022
- Rule IDs
- SV-235022r991589_rule
Fix: F-38173r619336_fix
Configure the SUSE operating system to not allow interfaces to perform IPv4 ICMP redirects by default by running the following command as an administrator: > sudo sysctl -w net.ipv4.conf.default.send_redirects=0 If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv4.conf.default.send_redirects=0" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040370
- Vuln IDs
- V-235023
- Rule IDs
- SV-235023r991589_rule
Fix: F-38174r619339_fix
Configure the SUSE operating system to not allow interfaces to perform IPv4 ICMP redirects by running the following command as an administrator: > sudo sysctl -w net.ipv4.conf.all.send_redirects=0 If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv4.conf.all.send_redirects=0" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040380
- Vuln IDs
- V-235024
- Rule IDs
- SV-235024r991589_rule
Fix: F-38175r619342_fix
Configure the SUSE operating system to not performing IPv4 packet forwarding by running the following command as an administrator: > sudo sysctl -w net.ipv4.ip_forward=0 If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv4.ip_forward=0" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040381
- Vuln IDs
- V-235025
- Rule IDs
- SV-235025r991589_rule
Fix: F-38176r619345_fix
Configure the SUSE operating system to not performing IPv6 packet forwarding by running the following command as an administrator: > sudo sysctl -w net.ipv6.conf.all.forwarding=0 If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv6.conf.all.forwarding=0" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040382
- Vuln IDs
- V-235026
- Rule IDs
- SV-235026r991589_rule
Fix: F-38177r619348_fix
Configure the SUSE operating system to not performing IPv6 packet forwarding by default by running the following command as an administrator: > sudo sysctl -w net.ipv6.conf.default.forwarding=0 If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf": > sudo sh -c 'echo "net.ipv6.conf.default.forwarding=0" >> /etc/sysctl.d/99-stig.conf' > sudo sysctl --system
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SLES-15-040420
- Vuln IDs
- V-235030
- Rule IDs
- SV-235030r991590_rule
Fix: F-38181r619360_fix
Configure the SUSE operating system to define the default permissions for all authenticated users in such a way that the users can only read and modify their own files. Add or edit the "UMASK" parameter in the "/etc/login.defs" file to match the example below: UMASK 077
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SLES-15-040430
- Vuln IDs
- V-235031
- Rule IDs
- SV-235031r991591_rule
Fix: F-38182r619363_fix
Note: If a graphical user interface is not installed, this requirement is Not Applicable. Configure the SUSE operating system GUI to not allow unattended or automatic logon to the system. Add or edit the following lines in the "/etc/sysconfig/displaymanager" configuration file: DISPLAYMANAGER_AUTOLOGIN="" DISPLAYMANAGER_PASSWORD_LESS_LOGIN="no"