DISA Red Hat Enterprise Linux 6 STIG v2r2

Audit Details

Name: DISA Red Hat Enterprise Linux 6 STIG v2r2

Updated: 11/6/2024

Authority: DISA STIG

Plugin: Unix

Revision: 1.11

Estimated Item Count: 440

File Details

Filename: DISA_STIG_RHEL_6_v2r2.audit

Size: 893 kB

MD5: ca32365da3ff47c27b8fa9268b26def5
SHA256: d9c5bcd59c78b571a4ec488bc8f7bdaa28915e6776b0b066548a9aa3d333ce01

Audit Items

DescriptionCategories
DISA_STIG_RHEL_6_v2r2.audit from DISA Red Hat Enterprise Linux 6 v2r2 STIG
RHEL-06-000001 - The system must use a separate file system for /tmp.

CONFIGURATION MANAGEMENT

RHEL-06-000002 - The system must use a separate file system for /var.

CONFIGURATION MANAGEMENT

RHEL-06-000003 - The system must use a separate file system for /var/log.

CONFIGURATION MANAGEMENT

RHEL-06-000004 - The system must use a separate file system for the system audit data path.

CONFIGURATION MANAGEMENT

RHEL-06-000005 - The audit system must alert designated staff members when the audit storage volume approaches capacity.

AUDIT AND ACCOUNTABILITY

RHEL-06-000007 - The system must use a separate file system for user home directories.

CONFIGURATION MANAGEMENT

RHEL-06-000008 - Vendor-provided cryptographic certificates must be installed to verify the integrity of system software.

CONFIGURATION MANAGEMENT

RHEL-06-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless using RHN or an RHN Satellite - 'CHKCONFIG'.

CONFIGURATION MANAGEMENT

RHEL-06-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless using RHN or an RHN Satellite - 'PROCESS_CHECK'.

CONFIGURATION MANAGEMENT

RHEL-06-000010 - The Red Hat Enterprise Linux operating system must be a vendor-supported release.

CONFIGURATION MANAGEMENT

RHEL-06-000011 - System security patches and updates must be installed and up-to-date.

SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000013 - The system package management tool must cryptographically verify the authenticity of system software packages during installation.

CONFIGURATION MANAGEMENT

RHEL-06-000015 - The system package management tool must cryptographically verify the authenticity of all software packages during installation.

CONFIGURATION MANAGEMENT

RHEL-06-000016 - A file integrity tool must be installed.

CONFIGURATION MANAGEMENT

RHEL-06-000017 - The system must use a Linux Security Module at boot time.

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000018 - A file integrity baseline must be created.

CONFIGURATION MANAGEMENT

RHEL-06-000019 - There must be no .rhosts or hosts.equiv files on the system.

CONFIGURATION MANAGEMENT

RHEL-06-000020 - The system must use a Linux Security Module configured to enforce limits on system services.

ACCESS CONTROL

RHEL-06-000021 - The Red Hat Enterprise Linux operating system must not contain .shosts or shosts.equiv files.

CONFIGURATION MANAGEMENT

RHEL-06-000023 - The system must use a Linux Security Module configured to limit the privileges of system services.

ACCESS CONTROL

RHEL-06-000025 - All device files must be monitored by the system Linux Security Module.

ACCESS CONTROL

RHEL-06-000027 - The system must prevent the root account from logging in from virtual consoles.

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000028 - The system must prevent the root account from logging in from serial consoles.

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000029 - Default operating system accounts, other than root, must be locked.

CONFIGURATION MANAGEMENT

RHEL-06-000030 - The system must not have accounts configured with blank or null passwords - password-auth.

CONFIGURATION MANAGEMENT

RHEL-06-000030 - The system must not have accounts configured with blank or null passwords - system-auth.

CONFIGURATION MANAGEMENT

RHEL-06-000031 - The /etc/passwd file must not contain password hashes.

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000032 - The root account must be the only account having a UID of 0.

CONFIGURATION MANAGEMENT

RHEL-06-000033 - The /etc/shadow file must be owned by root.

CONFIGURATION MANAGEMENT

RHEL-06-000034 - The /etc/shadow file must be group-owned by root.

CONFIGURATION MANAGEMENT

RHEL-06-000035 - The /etc/shadow file must have mode 0000.

CONFIGURATION MANAGEMENT

RHEL-06-000036 - The /etc/gshadow file must be owned by root.

CONFIGURATION MANAGEMENT

RHEL-06-000037 - The /etc/gshadow file must be group-owned by root.

CONFIGURATION MANAGEMENT

RHEL-06-000038 - The /etc/gshadow file must have mode 0000.

CONFIGURATION MANAGEMENT

RHEL-06-000039 - The /etc/passwd file must be owned by root.

CONFIGURATION MANAGEMENT

RHEL-06-000040 - The /etc/passwd file must be group-owned by root.

CONFIGURATION MANAGEMENT

RHEL-06-000041 - The /etc/passwd file must have mode 0644 or less permissive.

CONFIGURATION MANAGEMENT

RHEL-06-000042 - The /etc/group file must be owned by root.

CONFIGURATION MANAGEMENT

RHEL-06-000043 - The /etc/group file must be group-owned by root.

CONFIGURATION MANAGEMENT

RHEL-06-000044 - The /etc/group file must have mode 0644 or less permissive.

CONFIGURATION MANAGEMENT

RHEL-06-000045 - Library files must have mode 0755 or less permissive - '/lib/*'.

CONFIGURATION MANAGEMENT

RHEL-06-000045 - Library files must have mode 0755 or less permissive - '/lib64/*'.

CONFIGURATION MANAGEMENT

RHEL-06-000045 - Library files must have mode 0755 or less permissive - '/usr/lib/*'.

CONFIGURATION MANAGEMENT

RHEL-06-000045 - Library files must have mode 0755 or less permissive - '/usr/lib64/*'.

CONFIGURATION MANAGEMENT

RHEL-06-000046 - Library files must be owned by a system account - '/lib/*'.

CONFIGURATION MANAGEMENT

RHEL-06-000046 - Library files must be owned by a system account - '/lib64/*'.

CONFIGURATION MANAGEMENT

RHEL-06-000046 - Library files must be owned by a system account - '/usr/lib/*'.

CONFIGURATION MANAGEMENT

RHEL-06-000046 - Library files must be owned by a system account - '/usr/lib64/*'.

CONFIGURATION MANAGEMENT

RHEL-06-000046 - Library files must be owned by a system account - '/usr/local/lib/*'.

CONFIGURATION MANAGEMENT