Item Search

NameAudit NamePluginCategory
OL08-00-010520 - The OL 8 SSH daemon must not allow authentication using known host's authentication.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010561 - OL 8 must have the rsyslog service enabled and active.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010600 - OL 8 file systems must not interpret character or block special devices from untrusted file systems.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010640 - OL 8 file systems must not interpret character or block special devices that are imported via NFS.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010674 - OL 8 must disable storing core dumps.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010690 - Executable search paths within the initialization files of all local interactive OL 8 users must only contain paths that resolve to the system default or the user's home directory.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010710 - All OL 8 world-writable directories must be group-owned by root, sys, bin, or an application group.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010741 - OL 8 must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010790 - All OL 8 files and directories must have a valid group owner.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010800 - A separate OL 8 filesystem must be used for user home directories (such as "/home" or an equivalent).DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-020035 - OL 8 must terminate idle user sessions.DISA Oracle Linux 8 STIG v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-020101 - OL 8 must ensure the password complexity module is enabled in the system-auth file.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-020103 - OL 8 systems below version 8.4 must ensure the password complexity module in the password-auth file is configured for three retries or less.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-020264 - The OL 8 lastlog command must be group-owned by root.DISA Oracle Linux 8 STIG v2r5Unix

SYSTEM AND INFORMATION INTEGRITY

OL08-00-020320 - OL 8 must not have unnecessary accounts.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-020352 - OL 8 must set the umask value to 077 for all local interactive user accounts.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-030010 - Cron logging must be implemented in OL 8.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-030020 - The OL 8 System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) must be alerted of an audit processing failure event.DISA Oracle Linux 8 STIG v2r5Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030040 - The OL 8 System must take appropriate action when an audit processing failure occurs.DISA Oracle Linux 8 STIG v2r5Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030060 - The OL 8 audit system must take appropriate action when the audit storage volume is full.DISA Oracle Linux 8 STIG v2r5Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030315 - OL 8 must generate audit records for any use of the "userhelper" command.DISA Oracle Linux 8 STIG v2r5Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030603 - OL 8 must enable Linux audit logging for the USBGuard daemon.DISA Oracle Linux 8 STIG v2r5Unix

AUDIT AND ACCOUNTABILITY

OL08-00-030620 - OL 8 audit tools must have a mode of "0755" or less permissive.DISA Oracle Linux 8 STIG v2r5Unix

AUDIT AND ACCOUNTABILITY

OL08-00-040022 - OL 8 must not have the Controller Area Network (CAN) kernel module installed if not required for operational support.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040140 - OL 8 must block unauthorized peripherals before establishing a connection.DISA Oracle Linux 8 STIG v2r5Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-040279 - OL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040283 - OL 8 must restrict exposed kernel pointer addresses access.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040321 - The graphical display manager must not be the default target on OL 8 unless approved.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040380 - OL 8 must not have the "iprutils" package installed if not required for operational support.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

RHEL-07-010063 - The Red Hat Enterprise Linux operating system must disable the login screen user list for graphical user interfaces.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-010339 - The Red Hat Enterprise Linux operating system must specify the default 'include' directory for the /etc/sudoers file - include directory for the /etc/sudoers file.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-020029 - The Red Hat Enterprise Linux operating system must use a file integrity tool to verify correct operation of all security functions.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010050 - RHEL 8 must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

ACCESS CONTROL

RHEL-08-010149 - RHEL 8 operating systems booted with a BIOS must require a unique superusers name upon booting into single-user and maintenance modes.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

ACCESS CONTROL

RHEL-08-010160 - The RHEL 8 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-010201 - RHEL 8 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010210 - The RHEL 8 /var/log/messages file must have mode 0640 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010230 - The RHEL 8 /var/log/messages file must be group-owned by root.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010450 - RHEL 8 must enable the SELinux targeted policy.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010561 - The rsyslog service must be running in RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-010590 - RHEL 8 must prevent code from being executed on file systems that contain user home directories.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-010620 - RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-010671 - RHEL 8 must disable the kernel.core_pattern.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-010672 - RHEL 8 must disable acquiring, saving, and processing core dumps.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-010770 - All RHEL 8 local initialization files must have mode 0740 or less permissive.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-010780 - All RHEL 8 local files and directories must have a valid owner.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-020012 - RHEL 8 must automatically lock an account when three unsuccessful logon attempts occur during a 15-minute time period.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

ACCESS CONTROL

RHEL-08-020026 - RHEL 8 must configure the use of the pam_faillock.so module in the /etc/pam.d/password-auth file.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

ACCESS CONTROL

RHEL-08-020030 - RHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for graphical user sessions.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

ACCESS CONTROL

RHEL-08-020100 - RHEL 8 must ensure the password complexity module is enabled in the password-auth file.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT