DISA Red Hat Enterprise Linux 7 STIG v3r15

Audit Details

Name: DISA Red Hat Enterprise Linux 7 STIG v3r15

Updated: 10/15/2024

Authority: DISA STIG

Plugin: Unix

Revision: 1.1

Estimated Item Count: 245

File Details

Filename: DISA_STIG_Red_Hat_Enterprise_Linux_7_v3r15.audit

Size: 698 kB

MD5: f2be853578783dd62afbad958902cebc
SHA256: 53edd126c6c92d269252c6e97dacc4061d38cf4b1d5b73b47d59445d0867d5f8

Audit Items

DescriptionCategories
DISA_STIG_Red_Hat_Enterprise_Linux_7_v3r15.audit from DISA Red Hat Enterprise Linux 7 v3r15 STIG
RHEL-07-010010 - The Red Hat Enterprise Linux operating system must be configured so that the file permissions, ownership, and group membership of system files and commands match the vendor values.

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

RHEL-07-010019 - The Red Hat Enterprise Linux operating system must ensure cryptographic verification of vendor software packages.

CONFIGURATION MANAGEMENT

RHEL-07-010020 - The Red Hat Enterprise Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.

CONFIGURATION MANAGEMENT

RHEL-07-010030 - The Red Hat Enterprise Linux operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon.

ACCESS CONTROL

RHEL-07-010040 - The Red Hat Enterprise Linux operating system must display the approved Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon.

ACCESS CONTROL

RHEL-07-010050 - The Red Hat Enterprise Linux operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a command line user logon.

ACCESS CONTROL

RHEL-07-010060 - The Red Hat Enterprise Linux operating system must enable a user session lock until that user re-establishes access using established identification and authentication procedures.

ACCESS CONTROL

RHEL-07-010061 - The Red Hat Enterprise Linux operating system must uniquely identify and must authenticate users using multifactor authentication via a graphical user logon.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010062 - The Red Hat Enterprise Linux operating system must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface.

ACCESS CONTROL

RHEL-07-010063 - The Red Hat Enterprise Linux operating system must disable the login screen user list for graphical user interfaces.

CONFIGURATION MANAGEMENT

RHEL-07-010070 - The Red Hat Enterprise Linux operating system must initiate a screensaver after a 15-minute period of inactivity for graphical user interfaces.

ACCESS CONTROL

RHEL-07-010081 - The Red Hat Enterprise Linux operating system must prevent a user from overriding the screensaver lock-delay setting for the graphical user interface.

ACCESS CONTROL

RHEL-07-010082 - The Red Hat Enterprise Linux operating system must prevent a user from overriding the session idle-delay setting for the graphical user interface.

ACCESS CONTROL

RHEL-07-010090 - The Red Hat Enterprise Linux operating system must have the screen package installed.

ACCESS CONTROL

RHEL-07-010100 - The Red Hat Enterprise Linux operating system must initiate a session lock for the screensaver after a period of inactivity for graphical user interfaces.

ACCESS CONTROL

RHEL-07-010101 - The Red Hat Enterprise Linux operating system must prevent a user from overriding the screensaver idle-activation-enabled setting for the graphical user interface.

ACCESS CONTROL

RHEL-07-010110 - The Red Hat Enterprise Linux operating system must initiate a session lock for graphical user interfaces when the screensaver is activated.

ACCESS CONTROL

RHEL-07-010118 - The Red Hat Enterprise Linux operating system must be configured so that /etc/pam.d/passwd implements /etc/pam.d/system-auth when changing passwords.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010119 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed or new passwords are established, pwquality must be used.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010120 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed or new passwords are established, the new password must contain at least one upper-case character.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010130 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed or new passwords are established, the new password must contain at least one lower-case character.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010140 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed or new passwords are assigned, the new password must contain at least one numeric character.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010150 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed or new passwords are established, the new password must contain at least one special character.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010160 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed a minimum of eight of the total number of characters must be changed.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010170 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed a minimum of four character classes must be changed.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010180 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed the number of repeating consecutive characters must not be more than three characters.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010190 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed the number of repeating characters of the same character class must not be more than four characters.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010199 - The Red Hat Enterprise Linux operating system must be configured to prevent overwriting of custom authentication configuration settings by the authconfig utility.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010200 - The Red Hat Enterprise Linux operating system must be configured so that the PAM system service is configured to store only encrypted representations of passwords.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010210 - The Red Hat Enterprise Linux operating system must be configured to use the shadow file to store only encrypted representations of passwords.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010220 - The Red Hat Enterprise Linux operating system must be configured so that user and group account administration utilities are configured to store only encrypted representations of passwords.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010230 - The Red Hat Enterprise Linux operating system must be configured so that passwords for new users are restricted to a 24 hours/1 day minimum lifetime.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010240 - The Red Hat Enterprise Linux operating system must be configured so that passwords are restricted to a 24 hours/1 day minimum lifetime.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010250 - The Red Hat Enterprise Linux operating system must be configured so that passwords for new users are restricted to a 60-day maximum lifetime.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010260 - The Red Hat Enterprise Linux operating system must be configured so that existing passwords are restricted to a 60-day maximum lifetime.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010270 - The Red Hat Enterprise Linux operating system must be configured so that passwords are prohibited from reuse for a minimum of five generations.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010271 - The Red Hat Enterprise Linux operating system must automatically expire temporary accounts within 72 hours.

ACCESS CONTROL

RHEL-07-010280 - The Red Hat Enterprise Linux operating system must be configured so that passwords are a minimum of 15 characters in length.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010290 - The Red Hat Enterprise Linux operating system must not allow accounts configured with blank or null passwords.

CONFIGURATION MANAGEMENT

RHEL-07-010291 - The Red Hat Enterprise Linux operating system must not have accounts configured with blank or null passwords.

CONFIGURATION MANAGEMENT

RHEL-07-010300 - The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using an empty password.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010310 - The Red Hat Enterprise Linux operating system must disable account identifiers (individuals, groups, roles, and devices) if the password expires.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010320 - The Red Hat Enterprise Linux operating system must be configured to lock accounts for a minimum of 15 minutes after three unsuccessful logon attempts within a 15-minute timeframe.

ACCESS CONTROL

RHEL-07-010330 - The Red Hat Enterprise Linux operating system must lock the associated account after three unsuccessful root logon attempts are made within a 15-minute period.

ACCESS CONTROL

RHEL-07-010339 - The Red Hat Enterprise Linux operating system must specify the default 'include' directory for the /etc/sudoers file - include directory for the /etc/sudoers file.

CONFIGURATION MANAGEMENT

RHEL-07-010340 - The Red Hat Enterprise Linux operating system must be configured so that users must provide a password for privilege escalation.

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010341 - The Red Hat Enterprise Linux operating system must restrict privilege elevation to authorized personnel.

CONFIGURATION MANAGEMENT

RHEL-07-010342 - The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - sudo.

ACCESS CONTROL

RHEL-07-010343 - The Red Hat Enterprise Linux operating system must require re-authentication when using the 'sudo' command - sudo command.

IDENTIFICATION AND AUTHENTICATION