Item Search

NameAudit NamePluginCategory
RHEL-08-010540 - RHEL 8 must use a separate file system for /var.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-010600 - RHEL 8 must prevent special devices on file systems that are used with removable media.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-010640 - RHEL 8 must prevent special devices on file systems that are imported via Network File System (NFS).DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-010670 - RHEL 8 must disable kernel dumps unless needed.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-010680 - For RHEL 8 systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-010690 - Executable search paths within the initialization files of all local interactive RHEL 8 users must only contain paths that resolve to the system default or the users home directory.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-010780 - All RHEL 8 local files and directories must have a valid owner.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-010830 - RHEL 8 must not allow users to override SSH environment variables.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-020010 - RHEL 8 must automatically lock an account when three unsuccessful logon attempts occur.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

ACCESS CONTROL

RHEL-08-020011 - RHEL 8 must automatically lock an account when three unsuccessful logon attempts occur.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

ACCESS CONTROL

RHEL-08-020032 - RHEL 8 must disable the user list at logon for graphical user interfaces.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-020050 - RHEL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

ACCESS CONTROL

RHEL-08-020101 - RHEL 8 must ensure the password complexity module is enabled in the system-auth file.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-020130 - RHEL 8 must enforce password complexity by requiring that at least one numeric character be used.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020332 - RHEL 8 must not allow blank or null passwords in the password-auth file.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-020352 - RHEL 8 must set the umask value to 077 for all local interactive user accounts.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-030000 - The RHEL 8 audit system must be configured to audit the execution of privileged functions and prevent all software from executing at higher privilege levels than users executing the software.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

ACCESS CONTROL

RHEL-08-030060 - The RHEL 8 audit system must take appropriate action when the audit storage volume is full.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030110 - RHEL 8 audit log directory must be group-owned by root to prevent unauthorized read access.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030121 - RHEL 8 audit system must protect auditing rules from unauthorized change.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030171 - RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030172 - RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030180 - The RHEL 8 audit package must be installed.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030190 - Successful/unsuccessful uses of the su command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030280 - Successful/unsuccessful uses of the ssh-agent in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030313 - Successful/unsuccessful uses of semanage in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030330 - Successful/unsuccessful uses of the setfacl command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030400 - Successful/unsuccessful uses of the crontab command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030420 - Successful/unsuccessful uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030610 - RHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030630 - RHEL 8 audit tools must be owned by root.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030660 - RHEL 8 must allocate audit record storage capacity to store at least one week of audit records, when audit records are not immediately sent to a central audit record storage facility.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030670 - RHEL 8 must have the packages required for offloading audit logs installed.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-030720 - RHEL 8 must authenticate the remote logging server for off-loading audit logs.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030740 - RHEL 8 must securely compare internal information system clocks at least every 24 hours with a server synchronized to an authoritative time source, such as the United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-040023 - RHEL 8 must disable the stream control transmission protocol (SCTP).DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-040100 - A firewall must be installed on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

ACCESS CONTROL

RHEL-08-040120 - RHEL 8 must mount /dev/shm with the nodev option.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-040126 - RHEL 8 must mount /var/log with the nodev option.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-040134 - RHEL 8 must mount /var/tmp with the noexec option.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-040135 - The RHEL 8 fapolicy module must be installed.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-040139 - RHEL 8 must have the USBGuard installed.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-040141 - RHEL 8 must enable the USBGuard.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-040172 - The systemd Ctrl-Alt-Delete burst key sequence in RHEL 8 must be disabled.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-040250 - RHEL 8 must not forward IPv6 source-routed packets by default.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-040282 - RHEL 8 must restrict usage of ptrace to descendant processes.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-040300 - The RHEL 8 file integrity tool must be configured to verify extended attributes.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-040330 - RHEL 8 network interfaces must not be in promiscuous mode.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-040340 - RHEL 8 remote X connections for interactive users must be disabled unless to fulfill documented and validated mission requirements.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-08-040360 - A File Transfer Protocol (FTP) server package must not be installed unless mission essential on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

CONFIGURATION MANAGEMENT