DISA Oracle Linux 7 STIG v2r9

Audit Details

Name: DISA Oracle Linux 7 STIG v2r9

Updated: 11/18/2022

Authority: DISA STIG

Plugin: Unix

Revision: 1.0

Estimated Item Count: 326

File Details

Filename: DISA_STIG_Oracle_Linux_7_v2r9.audit

Size: 769 kB

MD5: 69073939737e5cddb46d3ebc0f67aab8
SHA256: ab89d3dda0c267974f20feb629a08d7647a82c6750327dae31c5f6b2dee402ac

Audit Items

DescriptionCategories
DISA_STIG_Oracle_Linux_7_v2r9.audit from DISA Oracle Linux 7 v2r9 STIG
OL07-00-010010 - The Oracle Linux operating system must be configured so that the file permissions, ownership, and group membership of system files and commands match the vendor values.

AUDIT AND ACCOUNTABILITY

OL07-00-010020 - The Oracle Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.

CONFIGURATION MANAGEMENT

OL07-00-010030 - The Oracle Linux operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon.

ACCESS CONTROL

OL07-00-010040 - The Oracle Linux operating system must display the approved Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon.

ACCESS CONTROL

OL07-00-010050 - The Oracle Linux operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a command line user logon.

ACCESS CONTROL

OL07-00-010060 - The Oracle Linux operating system must enable a user session lock until that user re-establishes access using established identification and authentication procedures.

ACCESS CONTROL

OL07-00-010061 - The Oracle Linux operating system must uniquely identify and must authenticate users using multifactor authentication via a graphical user logon.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010062 - The Oracle Linux operating system must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface.

ACCESS CONTROL

OL07-00-010070 - The Oracle Linux operating system must initiate a screensaver after a 15-minute period of inactivity for graphical user interfaces.

ACCESS CONTROL

OL07-00-010081 - The Oracle Linux operating system must prevent a user from overriding the screensaver lock-delay setting for the graphical user interface.

ACCESS CONTROL

OL07-00-010082 - The Oracle Linux operating system must prevent a user from overriding the session idle-delay setting for the graphical user interface.

ACCESS CONTROL

OL07-00-010100 - The Oracle Linux operating system must initiate a session lock for the screensaver after a period of inactivity for graphical user interfaces.

ACCESS CONTROL

OL07-00-010101 - The Oracle Linux operating system must prevent a user from overriding the screensaver idle-activation-enabled setting for the graphical user interface.

ACCESS CONTROL

OL07-00-010110 - The Oracle Linux operating system must initiate a session lock for graphical user interfaces when the screensaver is activated.

ACCESS CONTROL

OL07-00-010118 - The Oracle Linux operating system must be configured so that /etc/pam.d/passwd implements /etc/pam.d/system-auth when changing passwords.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010119 - The Oracle Linux operating system must be configured so that when passwords are changed or new passwords are established, pwquality must be used.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010120 - The Oracle Linux operating system must be configured so that when passwords are changed or new passwords are established, the new password must contain at least one upper-case character.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010130 - The Oracle Linux operating system must be configured so that when passwords are changed or new passwords are established, the new password must contain at least one lower-case character.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010140 - The Oracle Linux operating system must be configured so that when passwords are changed or new passwords are assigned, the new password must contain at least one numeric character.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010150 - The Oracle Linux operating system must be configured so that when passwords are changed or new passwords are established, the new password must contain at least one special character.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010160 - The Oracle Linux operating system must be configured so that when passwords are changed a minimum of eight of the total number of characters must be changed.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010170 - The Oracle Linux operating system must be configured so that when passwords are changed a minimum of four character classes must be changed.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010180 - The Oracle Linux operating system must be configured so that when passwords are changed the number of repeating consecutive characters must not be more than three characters.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010190 - The Oracle Linux operating system must be configured so that when passwords are changed the number of repeating characters of the same character class must not be more than four characters.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010200 - The Oracle Linux operating system must be configured so that the PAM system service is configured to store only encrypted representations of passwords.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010210 - The Oracle Linux operating system must be configured to use the shadow file to store only encrypted representations of passwords.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010220 - The Oracle Linux operating system must be configured so that user and group account administration utilities are configured to store only encrypted representations of passwords.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010230 - The Oracle Linux operating system must be configured so that passwords for new users are restricted to a 24 hours/1 day minimum lifetime.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010240 - The Oracle Linux operating system must be configured so that passwords are restricted to a 24 hours/1 day minimum lifetime.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010250 - The Oracle Linux operating system must be configured so that passwords for new users are restricted to a 60-day maximum lifetime.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010260 - The Oracle Linux operating system must be configured so that existing passwords are restricted to a 60-day maximum lifetime.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010270 - The Oracle Linux operating system must be configured so that passwords are prohibited from reuse for a minimum of five generations.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010271 - Oracle Linux operating system emergency accounts must be automatically removed or disabled after the crisis is resolved or within 72 hours.

ACCESS CONTROL

OL07-00-010280 - The Oracle Linux operating system must be configured so that passwords are a minimum of 15 characters in length.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010290 - The Oracle Linux operating system must not allow accounts configured with blank or null passwords - password-auth

CONFIGURATION MANAGEMENT

OL07-00-010290 - The Oracle Linux operating system must not allow accounts configured with blank or null passwords - system-auth

CONFIGURATION MANAGEMENT

OL07-00-010291 - The Oracle Linux operating system must not have accounts configured with blank or null passwords.

CONFIGURATION MANAGEMENT

OL07-00-010300 - The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using an empty password.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010310 - The Oracle Linux operating system must disable account identifiers (individuals, groups, roles, and devices) if the password expires - individuals, groups, roles, and devices if the password expires.

IDENTIFICATION AND AUTHENTICATION

OL07-00-010320 - The Oracle Linux operating system must be configured to lock accounts for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth deny

ACCESS CONTROL

OL07-00-010320 - The Oracle Linux operating system must be configured to lock accounts for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth even_deny_root

ACCESS CONTROL

OL07-00-010320 - The Oracle Linux operating system must be configured to lock accounts for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth fail_interval

ACCESS CONTROL

OL07-00-010320 - The Oracle Linux operating system must be configured to lock accounts for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - password-auth unlock_time

ACCESS CONTROL

OL07-00-010320 - The Oracle Linux operating system must be configured to lock accounts for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth deny

ACCESS CONTROL

OL07-00-010320 - The Oracle Linux operating system must be configured to lock accounts for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth even_deny_root

ACCESS CONTROL

OL07-00-010320 - The Oracle Linux operating system must be configured to lock accounts for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth fail_interval

ACCESS CONTROL

OL07-00-010320 - The Oracle Linux operating system must be configured to lock accounts for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe - system-auth unlock_time

ACCESS CONTROL

OL07-00-010330 - The Oracle Linux operating system must lock the associated account after three unsuccessful root logon attempts are made within a 15-minute period - password-auth default

ACCESS CONTROL

OL07-00-010330 - The Oracle Linux operating system must lock the associated account after three unsuccessful root logon attempts are made within a 15-minute period - password-auth required

ACCESS CONTROL