DISA Red Hat Enterprise Linux 8 STIG v1r14

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA Red Hat Enterprise Linux 8 STIG v1r14

Updated: 11/15/2024

Authority: DISA STIG

Plugin: Unix

Revision: 1.4

Estimated Item Count: 376

File Details

Filename: DISA_STIG_Red_Hat_Enterprise_Linux_8_v1r14.audit

Size: 942 kB

MD5: b8e0cf5f286ecbbee03c48e5eadc9463
SHA256: af98997c64693af60511905ab6dac7dbb3530e8152911e08837a2497047328f2

Audit Changelog

 
Revision 1.4

Nov 15, 2024

Miscellaneous
  • Audit deprecated.
  • Metadata updated.
  • References updated.
Revision 1.3

Oct 15, 2024

Functional Update
  • RHEL-08-010460 - There must be no shosts.equiv files on the RHEL 8 operating system.
  • RHEL-08-010470 - There must be no .shosts files on the RHEL 8 operating system.
Revision 1.2

Sep 9, 2024

Functional Update
  • RHEL-08-020025 - RHEL 8 must configure the use of the pam_faillock.so module in the /etc/pam.d/system-auth file.
  • RHEL-08-020026 - RHEL 8 must configure the use of the pam_faillock.so module in the /etc/pam.d/password-auth file.
Miscellaneous
  • References updated.
Revision 1.1

Jul 1, 2024

Functional Update
  • RHEL-08-010292 - RHEL 8 must ensure the SSH server uses strong entropy.
  • RHEL-08-010471 - RHEL 8 must enable the hardware random number generator entropy gatherer service.
  • RHEL-08-020010 - RHEL 8 must automatically lock an account when three unsuccessful logon attempts occur.
  • RHEL-08-020011 - RHEL 8 must automatically lock an account when three unsuccessful logon attempts occur.
  • RHEL-08-020012 - RHEL 8 must automatically lock an account when three unsuccessful logon attempts occur during a 15-minute time period.
  • RHEL-08-020013 - RHEL 8 must automatically lock an account when three unsuccessful logon attempts occur during a 15-minute time period.
  • RHEL-08-020014 - RHEL 8 must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.
  • RHEL-08-020015 - RHEL 8 must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.
  • RHEL-08-020016 - RHEL 8 must ensure account lockouts persist.
  • RHEL-08-020017 - RHEL 8 must ensure account lockouts persist.
  • RHEL-08-020018 - RHEL 8 must prevent system messages from being presented when three unsuccessful logon attempts occur.
  • RHEL-08-020019 - RHEL 8 must prevent system messages from being presented when three unsuccessful logon attempts occur.
  • RHEL-08-020020 - RHEL 8 must log user name information when unsuccessful logon attempts occur.
  • RHEL-08-020021 - RHEL 8 must log user name information when unsuccessful logon attempts occur.
  • RHEL-08-020022 - RHEL 8 must include root when automatically locking an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.
  • RHEL-08-020023 - RHEL 8 must include root when automatically locking an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.
  • RHEL-08-020025 - RHEL 8 must configure the use of the pam_faillock.so module in the /etc/pam.d/system-auth file.
  • RHEL-08-020026 - RHEL 8 must configure the use of the pam_faillock.so module in the /etc/pam.d/password-auth file.
  • RHEL-08-020027 - RHEL 8 systems, versions 8.2 and above, must configure SELinux context type to allow the use of a non-default faillock tally directory.
  • RHEL-08-020028 - RHEL 8 systems below version 8.2 must configure SELinux context type to allow the use of a non-default faillock tally directory.
  • RHEL-08-020102 - RHEL 8 systems below version 8.4 must ensure the password complexity module in the system-auth file is configured for three retries or less.
  • RHEL-08-020103 - RHEL 8 systems below version 8.4 must ensure the password complexity module in the password-auth file is configured for three retries or less.
  • RHEL-08-020104 - RHEL 8 systems, version 8.4 and above, must ensure the password complexity module is configured for three retries or less.