Item Search

NameAudit NamePluginCategory
RHEL-10-400095 - RHEL 10 must be configured so that the "/var/log/messages" file is group-owned by "root".DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-10-400135 - RHEL 10 must be configured so that cron configuration files directories are group-owned by root.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400180 - RHEL 10 must enforce group ownership by "root" or a restricted logging group for audit log files to prevent unauthorized access.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

RHEL-10-400230 - RHEL 10 must be configured to prohibit modification of permissions for cron configuration files and directories from the operating system defaults.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-400245 - RHEL 10 must enforce mode "0644" or less permissive for the "/etc/group" file to prevent unauthorized access.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400255 - RHEL 10 must enforce mode "0000" or less permissive for the "/etc/gshadow" file to prevent unauthorized access.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400320 - RHEL 10 must define default permissions for the c shell.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400335 - RHEL 10 must enforce that all local initialization files configured by systemd-tmpfiles have mode "0600" or less permissive.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400350 - RHEL 10 must enforce "root" ownership of the "/boot/grub2/grub.cfg" file.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-400360 - RHEL 10 must prevent files with the "setuid" and "setgid" bit set from being executed on file systems that contain user home directories.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-500025 - RHEL 10 must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

RHEL-10-500040 - RHEL 10 must take action when allocated audit record storage volume reaches 75 percent of the audit record storage capacity.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

RHEL-10-500115 - RHEL 10 must take appropriate action when the internal event queue is full.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

RHEL-10-500300 - RHEL 10 must generate audit records for successful and unsuccessful uses of the "execve" system call.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-500310 - RHEL 10 must generate audit records for successful and unsuccessful uses of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-500400 - RHEL 10 must generate audit records for successful and unsuccessful uses of the "delete_module" system call.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-500510 - RHEL 10 must generate audit records for successful and unsuccessful uses of the "postqueue" command.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-500530 - RHEL 10 must generate audit records for successful and unsuccessful uses of the "ssh-keysign" command.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-500540 - RHEL 10 must generate audit records for successful and unsuccessful uses of the "su" command.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-500550 - RHEL 10 must generate audit records for successful and unsuccessful uses of the "sudo" command.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-500760 - RHEL 10 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/var/log/lastlog".DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-10-600110 - RHEL 10 must, for user account passwords, have a 60-day maximum password lifetime restriction.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-600200 - RHEL 10 must enforce a delay of at least four seconds between login prompts following a failed login attempt.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-600320 - RHEL 10 must prevent the use of dictionary words for passwords.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-600415 - RHEL 10 must automatically lock the root account until the root account is released by an administrator when three unsuccessful login attempts occur during a 15-minute time period.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-600430 - RHEL 10 must ensure account lockouts persist.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-600600 - RHEL 10 must configure the use of the pam_faillock.so module in the "/etc/pam.d/system-auth" file.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-700020 - RHEL 10 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a graphical user login.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-700105 - RHEL 10 must prevent code from being executed on file systems that are imported via Network File System (NFS).DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-700180 - RHEL 10 must mount "/var/log" with the "nosuid" option.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-700400 - RHEL 10 must enable the SELinux targeted policy.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-10-700430 - RHEL 10 must configure SELinux context type to allow the use of a nondefault faillock tally directory.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-700500 - RHEL 10 must be configured so that Secure Shell (SSH) public host key files have mode "0644" or less permissive.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-10-700670 - RHEL 10 must forward mail from postmaster to the root account using a postfix alias.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

RHEL-10-700690 - RHEL 10 must not have any ".shosts" files on the system.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-700710 - RHEL 10 must prevent a user from overriding the disabling of the graphical user interface autorun function.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-700730 - RHEL 10 must prevent a user from overriding the disabling of the graphical user smart card removal action.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-700750 - RHEL 10 must automatically lock graphical user sessions after 15 minutes of inactivity.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-700760 - RHEL 10 must prevent a user from overriding the session idle-delay setting for the graphical user interface.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-700780 - RHEL 10 must prevent a user from overriding the session lock-delay setting for the graphical user interface.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-700790 - RHEL 10 must conceal, via the session lock, information previously visible on the display with a publicly viewable image.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-700820 - RHEL 10 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-10-700850 - RHEL 10 must be configured to disable USB mass storage.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-700920 - RHEL 10 must automatically exit interactive command shell user sessions after 15 minutes of inactivity.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-10-700930 - RHEL 10 must be configured with a timeout interval for the Secure Shell (SSH) daemon.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-10-700980 - RHEL 10 must disable the ability of systemd to spawn an interactive boot process.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT

RHEL-10-701220 - RHEL 10 must enable certificate-based smart card authentication.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-701250 - RHEL 10 must require authentication to access emergency mode.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

RHEL-10-701280 - RHEL 10 must map the authenticated identity to the user or group account for public key infrastructure (PKI)-based authentication.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-10-800020 - RHEL 10 must enforce that network interfaces not be in promiscuous mode.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION