DISA_STIG_Oracle_Linux_6_v1r18.audit from DISA Oracle Linux 6 v1r18 STIG | |
OL6-00-000001 - The system must use a separate file system for /tmp. | CONFIGURATION MANAGEMENT |
OL6-00-000002 - The system must use a separate file system for /var. | CONFIGURATION MANAGEMENT |
OL6-00-000003 - The system must use a separate file system for /var/log. | AUDIT AND ACCOUNTABILITY |
OL6-00-000004 - The system must use a separate file system for the system audit data path. | AUDIT AND ACCOUNTABILITY |
OL6-00-000005 - The audit system must alert designated staff members when the audit storage volume approaches capacity. | AUDIT AND ACCOUNTABILITY |
OL6-00-000007 - The system must use a separate file system for user home directories. | CONFIGURATION MANAGEMENT |
OL6-00-000008 - Vendor-provided cryptographic certificates must be installed to verify the integrity of system software. | SYSTEM AND INFORMATION INTEGRITY |
OL6-00-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless it is being used to query the Oracle Unbreakable Linux Network for updates and information - CHKCONFIG | CONFIGURATION MANAGEMENT |
OL6-00-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless it is being used to query the Oracle Unbreakable Linux Network for updates and information - PROCESS_CHECK | CONFIGURATION MANAGEMENT |
OL6-00-000011 - System security patches and updates must be installed and up-to-date. | |
OL6-00-000013 - The system package management tool must cryptographically verify the authenticity of system software packages during installation. | SYSTEM AND INFORMATION INTEGRITY |
OL6-00-000015 - The system package management tool must cryptographically verify the authenticity of all software packages during installation. | SYSTEM AND INFORMATION INTEGRITY |
OL6-00-000016 - A file integrity tool must be installed. | CONFIGURATION MANAGEMENT |
OL6-00-000017 - The system must use a Linux Security Module at boot time. | ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY |
OL6-00-000018 - A file integrity baseline must be created. | SYSTEM AND INFORMATION INTEGRITY |
OL6-00-000019 - There must be no .rhosts or hosts.equiv files on the system - '/etc/hosts.equiv' | CONFIGURATION MANAGEMENT |
OL6-00-000019 - There must be no .rhosts or hosts.equiv files on the system - '~/.rhosts' | CONFIGURATION MANAGEMENT |
OL6-00-000020 - The system must use a Linux Security Module configured to enforce limits on system services. | ACCESS CONTROL |
OL6-00-000021 - The Oracle Linux operating system must not contain .shosts or shosts.equiv files. | CONFIGURATION MANAGEMENT |
OL6-00-000023 - The system must use a Linux Security Module configured to limit the privileges of system services. | ACCESS CONTROL |
OL6-00-000025 - All device files must be monitored by the system Linux Security Module. | ACCESS CONTROL |
OL6-00-000027 - The system must prevent the root account from logging in from virtual consoles. | ACCESS CONTROL |
OL6-00-000028 - The system must prevent the root account from logging in from serial consoles. | ACCESS CONTROL |
OL6-00-000029 - Default operating system accounts, other than root, must be locked. | ACCESS CONTROL |
OL6-00-000030 - The system must not have accounts configured with blank or null passwords - password-auth | CONFIGURATION MANAGEMENT |
OL6-00-000030 - The system must not have accounts configured with blank or null passwords - system-auth | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000031 - The /etc/passwd file must not contain password hashes. | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000032 - The root account must be the only account having a UID of 0. | ACCESS CONTROL |
OL6-00-000033 - The /etc/shadow file must be owned by root. | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000034 - The /etc/shadow file must be group-owned by root. | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000035 - The /etc/shadow file must have mode 0000. | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000036 - The /etc/gshadow file must be owned by root. | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000037 - The /etc/gshadow file must be group-owned by root. | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000038 - The /etc/gshadow file must have mode 0000. | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000039 - The /etc/passwd file must be owned by root. | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000040 - The /etc/passwd file must be group-owned by root. | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000041 - The /etc/passwd file must have mode 0644 or less permissive. | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000042 - The /etc/group file must be owned by root. | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000043 - The /etc/group file must be group-owned by root. | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000044 - The /etc/group file must have mode 0644 or less permissive. | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000045 - Library files must have mode 0755 or less permissive - '/lib' | CONFIGURATION MANAGEMENT |
OL6-00-000045 - Library files must have mode 0755 or less permissive - '/lib64' | CONFIGURATION MANAGEMENT |
OL6-00-000045 - Library files must have mode 0755 or less permissive - '/usr/lib' | CONFIGURATION MANAGEMENT |
OL6-00-000045 - Library files must have mode 0755 or less permissive - '/usr/lib64' | CONFIGURATION MANAGEMENT |
OL6-00-000046 - Library files must be owned by a system account - '/lib' | CONFIGURATION MANAGEMENT |
OL6-00-000046 - Library files must be owned by a system account - '/lib64' | CONFIGURATION MANAGEMENT |
OL6-00-000046 - Library files must be owned by a system account - '/usr/lib' | CONFIGURATION MANAGEMENT |
OL6-00-000046 - Library files must be owned by a system account - '/usr/lib64' | CONFIGURATION MANAGEMENT |
OL6-00-000046 - Library files must be owned by a system account - '/usr/local/lib' | CONFIGURATION MANAGEMENT |