DISA Red Hat Enterprise Linux 8 STIG v1r6

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA Red Hat Enterprise Linux 8 STIG v1r6

Updated: 10/4/2022

Authority: Operating Systems and Applications

Plugin: Unix

Revision: 1.2

Estimated Item Count: 514

File Details

Filename: DISA_STIG_Red_Hat_Enterprise_Linux_8_v1r6.audit

Size: 1.17 MB

MD5: 4925d88190d71dae23b77d71ce8a966c
SHA256: 6453daab526fb6bf9cff49126621f12ce27f573215bc619427062e8a3487407c

Audit Changelog

 
Revision 1.2

Oct 4, 2022

Functional Update
  • RHEL-08-020028 - RHEL 8 systems below version 8.2 must configure SELinux context type to allow the use of a non-default faillock tally directory.
  • RHEL-08-020352 - RHEL 8 must set the umask value to 077 for all local interactive user accounts.
  • RHEL-08-030590 - Successful/unsuccessful modifications to the faillock log file in RHEL 8 must generate an audit record.
Miscellaneous
  • Audit deprecated.
  • Metadata updated.
  • References updated.
Revision 1.1

Jul 27, 2022

Functional Update
  • RHEL-08-020028 - RHEL 8 systems below version 8.2 must configure SELinux context type to allow the use of a non-default faillock tally directory.
  • RHEL-08-020330 - RHEL 8 must not allow accounts configured with blank or null passwords.
  • RHEL-08-030590 - Successful/unsuccessful modifications to the faillock log file in RHEL 8 must generate an audit record.
  • RHEL-08-040340 - RHEL 8 remote X connections for interactive users must be disabled unless to fulfill documented and validated mission requirements.
Revision 1.0

Jun 10, 2022

Functional Update
  • RHEL-08-020028 - RHEL 8 systems below version 8.2 must configure SELinux context type to allow the use of a non-default faillock tally directory.
  • RHEL-08-030590 - Successful/unsuccessful modifications to the faillock log file in RHEL 8 must generate an audit record.