DISA STIG Oracle Linux 6 v1r18

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA STIG Oracle Linux 6 v1r18

Updated: 5/27/2022

Authority: DISA STIG

Plugin: Unix

Revision: 1.8

Estimated Item Count: 414

Audit Items

DescriptionCategories
DISA_STIG_Oracle_Linux_6_v1r18.audit from DISA Oracle Linux 6 v1r18 STIG
OL6-00-000001 - The system must use a separate file system for /tmp.

CONFIGURATION MANAGEMENT

OL6-00-000002 - The system must use a separate file system for /var.

CONFIGURATION MANAGEMENT

OL6-00-000003 - The system must use a separate file system for /var/log.

AUDIT AND ACCOUNTABILITY

OL6-00-000004 - The system must use a separate file system for the system audit data path.

AUDIT AND ACCOUNTABILITY

OL6-00-000005 - The audit system must alert designated staff members when the audit storage volume approaches capacity.

AUDIT AND ACCOUNTABILITY

OL6-00-000007 - The system must use a separate file system for user home directories.

CONFIGURATION MANAGEMENT

OL6-00-000008 - Vendor-provided cryptographic certificates must be installed to verify the integrity of system software.

SYSTEM AND INFORMATION INTEGRITY

OL6-00-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless it is being used to query the Oracle Unbreakable Linux Network for updates and information - CHKCONFIG

CONFIGURATION MANAGEMENT

OL6-00-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless it is being used to query the Oracle Unbreakable Linux Network for updates and information - PROCESS_CHECK

CONFIGURATION MANAGEMENT

OL6-00-000011 - System security patches and updates must be installed and up-to-date.
OL6-00-000013 - The system package management tool must cryptographically verify the authenticity of system software packages during installation.

SYSTEM AND INFORMATION INTEGRITY

OL6-00-000015 - The system package management tool must cryptographically verify the authenticity of all software packages during installation.

SYSTEM AND INFORMATION INTEGRITY

OL6-00-000016 - A file integrity tool must be installed.

CONFIGURATION MANAGEMENT

OL6-00-000017 - The system must use a Linux Security Module at boot time.

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

OL6-00-000018 - A file integrity baseline must be created.

SYSTEM AND INFORMATION INTEGRITY

OL6-00-000019 - There must be no .rhosts or hosts.equiv files on the system - '/etc/hosts.equiv'

CONFIGURATION MANAGEMENT

OL6-00-000019 - There must be no .rhosts or hosts.equiv files on the system - '~/.rhosts'

CONFIGURATION MANAGEMENT

OL6-00-000020 - The system must use a Linux Security Module configured to enforce limits on system services.

ACCESS CONTROL

OL6-00-000021 - The Oracle Linux operating system must not contain .shosts or shosts.equiv files.

CONFIGURATION MANAGEMENT

OL6-00-000023 - The system must use a Linux Security Module configured to limit the privileges of system services.

ACCESS CONTROL

OL6-00-000025 - All device files must be monitored by the system Linux Security Module.

ACCESS CONTROL

OL6-00-000027 - The system must prevent the root account from logging in from virtual consoles.

ACCESS CONTROL

OL6-00-000028 - The system must prevent the root account from logging in from serial consoles.

ACCESS CONTROL

OL6-00-000029 - Default operating system accounts, other than root, must be locked.

ACCESS CONTROL

OL6-00-000030 - The system must not have accounts configured with blank or null passwords - password-auth

CONFIGURATION MANAGEMENT

OL6-00-000030 - The system must not have accounts configured with blank or null passwords - system-auth

IDENTIFICATION AND AUTHENTICATION

OL6-00-000031 - The /etc/passwd file must not contain password hashes.

IDENTIFICATION AND AUTHENTICATION

OL6-00-000032 - The root account must be the only account having a UID of 0.

ACCESS CONTROL

OL6-00-000033 - The /etc/shadow file must be owned by root.

IDENTIFICATION AND AUTHENTICATION

OL6-00-000034 - The /etc/shadow file must be group-owned by root.

IDENTIFICATION AND AUTHENTICATION

OL6-00-000035 - The /etc/shadow file must have mode 0000.

IDENTIFICATION AND AUTHENTICATION

OL6-00-000036 - The /etc/gshadow file must be owned by root.

IDENTIFICATION AND AUTHENTICATION

OL6-00-000037 - The /etc/gshadow file must be group-owned by root.

IDENTIFICATION AND AUTHENTICATION

OL6-00-000038 - The /etc/gshadow file must have mode 0000.

IDENTIFICATION AND AUTHENTICATION

OL6-00-000039 - The /etc/passwd file must be owned by root.

IDENTIFICATION AND AUTHENTICATION

OL6-00-000040 - The /etc/passwd file must be group-owned by root.

IDENTIFICATION AND AUTHENTICATION

OL6-00-000041 - The /etc/passwd file must have mode 0644 or less permissive.

IDENTIFICATION AND AUTHENTICATION

OL6-00-000042 - The /etc/group file must be owned by root.

IDENTIFICATION AND AUTHENTICATION

OL6-00-000043 - The /etc/group file must be group-owned by root.

IDENTIFICATION AND AUTHENTICATION

OL6-00-000044 - The /etc/group file must have mode 0644 or less permissive.

IDENTIFICATION AND AUTHENTICATION

OL6-00-000045 - Library files must have mode 0755 or less permissive - '/lib'

CONFIGURATION MANAGEMENT

OL6-00-000045 - Library files must have mode 0755 or less permissive - '/lib64'

CONFIGURATION MANAGEMENT

OL6-00-000045 - Library files must have mode 0755 or less permissive - '/usr/lib'

CONFIGURATION MANAGEMENT

OL6-00-000045 - Library files must have mode 0755 or less permissive - '/usr/lib64'

CONFIGURATION MANAGEMENT

OL6-00-000046 - Library files must be owned by a system account - '/lib'

CONFIGURATION MANAGEMENT

OL6-00-000046 - Library files must be owned by a system account - '/lib64'

CONFIGURATION MANAGEMENT

OL6-00-000046 - Library files must be owned by a system account - '/usr/lib'

CONFIGURATION MANAGEMENT

OL6-00-000046 - Library files must be owned by a system account - '/usr/lib64'

CONFIGURATION MANAGEMENT

OL6-00-000046 - Library files must be owned by a system account - '/usr/local/lib'

CONFIGURATION MANAGEMENT