Item Search

NameAudit NamePluginCategory
RHEL-08-010171 - RHEL 8 must have policycoreutils package installed.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010190 - A sticky bit must be set on all RHEL 8 public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010240 - The RHEL 8 /var/log directory must have mode 0755 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010250 - The RHEL 8 /var/log directory must be owned by root.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010294 - The RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

ACCESS CONTROL

RHEL-08-010370 - RHEL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010372 - RHEL 8 must prevent the loading of a new kernel for later execution.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010376 - RHEL 8 must prevent kernel profiling by unprivileged users.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010382 - RHEL 8 must restrict privilege elevation to authorized personnel.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010450 - RHEL 8 must enable the SELinux targeted policy.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010460 - There must be no shosts.equiv files on the RHEL 8 operating system.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010470 - There must be no .shosts files on the RHEL 8 operating system.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010471 - RHEL 8 must enable the hardware random number generator entropy gatherer service.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010540 - RHEL 8 must use a separate file system for /var.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010541 - RHEL 8 must use a separate file system for /var/log.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010572 - RHEL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010600 - RHEL 8 must prevent special devices on file systems that are used with removable media.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010630 - RHEL 8 must prevent code from being executed on file systems that are imported via Network File System (NFS).DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010671 - RHEL 8 must disable the kernel.core_pattern.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010672 - RHEL 8 must disable acquiring, saving, and processing core dumps.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010741 - RHEL 8 must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-020015 - RHEL 8 must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

ACCESS CONTROL

RHEL-08-020016 - RHEL 8 must ensure account lockouts persist.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

ACCESS CONTROL

RHEL-08-020017 - RHEL 8 must ensure account lockouts persist.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

ACCESS CONTROL

RHEL-08-020022 - RHEL 8 must include root when automatically locking an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

ACCESS CONTROL

RHEL-08-020024 - RHEL 8 must limit the number of concurrent sessions to ten for all accounts and/or account types.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

ACCESS CONTROL

RHEL-08-020080 - RHEL 8 must prevent a user from overriding the session lock-delay setting for the graphical user interface.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

ACCESS CONTROL

RHEL-08-020101 - RHEL 8 must ensure the password complexity module is enabled in the system-auth file.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-020104 - RHEL 8 systems, version 8.4 and above, must ensure the password complexity module is configured for three retries or less.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-020130 - RHEL 8 must enforce password complexity by requiring that at least one numeric character be used.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020160 - RHEL 8 must require the change of at least four character classes when passwords are changed.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020331 - RHEL 8 must not allow blank or null passwords in the system-auth file.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-020353 - RHEL 8 must define default permissions for logon and non-logon shells.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-030060 - The RHEL 8 audit system must take appropriate action when the audit storage volume is full.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030061 - The RHEL 8 audit system must audit local events.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-030100 - RHEL 8 audit log directory must be owned by root to prevent unauthorized read access.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030130 - RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030140 - RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030150 - RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030260 - Successful/unsuccessful uses of the chcon command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030290 - Successful/unsuccessful uses of the passwd command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030310 - Successful/unsuccessful uses of the unix_update in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030313 - Successful/unsuccessful uses of semanage in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030316 - Successful/unsuccessful uses of setsebool in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030590 - Successful/unsuccessful modifications to the faillock log file in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030680 - RHEL 8 must have the packages required for encrypting offloaded audit logs installed.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040022 - RHEL 8 must disable the controller area network (CAN) protocol.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040090 - A RHEL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

ACCESS CONTROL

RHEL-08-040127 - RHEL 8 must mount /var/log with the nosuid option.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT