Item Search

NameAudit NamePluginCategory
RHEL-10-200643 - RHEL 10 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-10-200646 - RHEL 10 must encrypt, via the gtls driver, the transfer of audit records off-loaded onto a different system or media from the system being audited via rsyslog.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

RHEL-10-200660 - RHEL 10 must have the "audit" package installed.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-200680 - RHEL 10 must have the "libreswan" package installed.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-200691 - RHEL 10 must have mail aliases to notify the information system security officer (ISSO) and system administrator (SA) (at a minimum) of an audit processing failure.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

RHEL-10-200722 - RHEL 10 must have the "openssh-clients" package installed.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-300050 - RHEL 10 must be configured so that Secure Shell (SSH) clients use only DOD-approved Message Authentication Codes (MACs) employing FIPS 140-3-validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL, MAINTENANCE

RHEL-10-300080 - RHEL 10 must implement DOD-approved encryption in the bind package.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-10-400010 - RHEL 10 must be configured so that the "/etc/group-" file is owned by "root".DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400035 - RHEL 10 must be configured so that the "/etc/gshadow-" file is group-owned by "root".DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400100 - RHEL 10 must be configured so that system commands are owned by "root".DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-400120 - RHEL 10 must be configured so that library directories are owned by "root".DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-400130 - RHEL 10 must be configured so that cron configuration file directories are owned by root.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-10-400150 - RHEL 10 must be configured so that the Secure Shell (SSH) server configuration file is group-owned by "root".DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400175 - RHEL 10 must enforce "root" ownership of audit logs to prevent unauthorized access.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

RHEL-10-400195 - RHEL 10 must enforce root ownership of the "/etc/audit/" directory.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

RHEL-10-400200 - RHEL 10 must enforce root group ownership of the "/etc/audit/" directory.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

RHEL-10-400210 - RHEL 10 must enforce mode "755" or less permissive on library directories.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-400220 - RHEL 10 must enforce mode "0755" or less permissive for the "/var/log" directory.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-10-400235 - RHEL 10 must enforce mode "0740" or less permissive for local initialization files.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400250 - RHEL 10 must enforce mode "0644" or less permissive for the "/etc/group-" file to prevent unauthorized access.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400280 - RHEL 10 must be configured so that a sticky bit is set on all public directories.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-10-400295 - RHEL 10 must enforce mode "0000" for "/etc/shadow" to prevent unauthorized access.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400310 - RHEL 10 must set the umask value to "077" for all local interactive user accounts.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400355 - RHEL 10 must prevent device files from being interpreted on file systems that contain user home directories.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-400365 - RHEL 10 must prevent code from being executed on file systems that contain user home directories.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400400 - RHEL 10 must mount "/var/log/audit" with the "nodev" option.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-400410 - RHEL 10 must mount "/var/log/audit" with the "nosuid" option.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-500010 - RHEL 10 must audit local events.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

RHEL-10-500205 - RHEL 10 must notify the system administrator (SA) and information system security officer (ISSO) (at a minimum) when allocated audit record storage volume 75 percent utilization.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

RHEL-10-500320 - RHEL 10 must generate audit records for successful and unsuccessful uses of "umount" system calls.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-500410 - RHEL 10 must generate audit records for successful and unsuccessful uses of the "init_module" and "finit_module" system calls.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-500470 - RHEL 10 must generate audit records for successful and unsuccessful uses of the "newgrp" command.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-500490 - RHEL 10 must generate audit records for successful and unsuccessful uses of the "passwd" command.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-500600 - RHEL 10 must generate audit records for successful and unsuccessful uses of the "usermod" command.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-500610 - RHEL 10 must generate audit records for successful and unsuccessful uses of the "mount" command.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-500640 - RHEL 10 must generate audit records for successful and unsuccessful uses of the "reboot" command.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

RHEL-10-500680 - RHEL 10 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-500700 - RHEL 10 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/group".DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-600180 - RHEL 10 must assign a home directory to all local interactive users in the "/etc/passwd" file.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-10-600260 - RHEL 10 must require the change of at least eight characters when passwords are changed.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-600300 - RHEL 10 must require the change of at least four character classes when passwords are changed.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-600405 - RHEL 10 must enforce password complexity rules for the "root" account.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-600420 - RHEL 10 must automatically lock an account when three unsuccessful login attempts occur during a 15-minute time period.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-600425 - RHEL 10 must maintain an account lock until the locked account is released by an administrator.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-600485 - RHEL 10 must ensure the password complexity module in the system-auth file is configured for three or fewer retries.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-600510 - RHEL 10 must be configured to not bypass password requirements for privilege escalation.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-600520 - RHEL 10 must restrict privilege elevation to authorized personnel.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-10-600540 - RHEL 10 must require reauthentication when using the "sudo" command.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-600650 - RHEL 10 must ensure that the pam_unix.so module is configured in the password-auth file to use a FIPS 140-3-approved cryptographic hashing algorithm for system authentication.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION