Definition of Oracle Linux 9 Security Technical Implementation Guide for ol9

based on https://public.cyber.mil/stigs/downloads/

needed_rules: None

Description: None

Levels:

Automated: no

Selections:

211010: OL 9 must be a vendor-supported release.

Description: None

Levels:

Automated: yes

Selections:

211015: OL 9 vendor packaged system security patches and updates must be installed and up to date.

Description: None

Levels:

Automated: yes

Selections:

211020: OL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a command line user logon.

Description: None

Levels:

Automated: yes

Selections:

211025: OL 9 must implement the Endpoint Security for Linux Threat Prevention tool.

Description: None

Levels:

Automated: yes

Selections:

211030: The graphical display manager must not be the default target on OL 9 unless approved.

Description: None

Levels:

Automated: yes

Selections:

211035: OL 9 must enable the hardware random number generator entropy gatherer service.

Description: None

Levels:

Automated: no

No rules selected

211040: OL 9 systemd-journald service must be enabled.

Description: None

Levels:

Automated: yes

Selections:

211045: The systemd Ctrl-Alt-Delete burst key sequence in OL 9 must be disabled.

Description: None

Levels:

Automated: yes

Selections:

211050: The x86 Ctrl-Alt-Delete key sequence must be disabled on OL 9.

Description: None

Levels:

Automated: yes

Selections:

211055: OL 9 debug-shell systemd service must be disabled.

Description: None

Levels:

Automated: yes

Selections:

212010: OL 9 must require a boot loader superuser password.

Description: None

Levels:

Automated: yes

Selections:

212015: OL 9 must disable the ability of systemd to spawn an interactive boot process.

Description: None

Levels:

Automated: yes

Selections:

212020: OL 9 must require a unique superusers name upon booting into single-user and maintenance modes.

Description: None

Levels:

Automated: yes

Selections:

212025: OL 9 /boot/grub2/grub.cfg file must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

212030: OL 9 /boot/grub2/grub.cfg file must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

212035: OL 9 must disable virtual system calls.

Description: None

Levels:

Automated: yes

Selections:

212040: OL 9 must clear the page allocator to prevent use-after-free attacks.

Description: None

Levels:

Automated: yes

Selections:

212045: OL 9 must clear SLUB/SLAB objects to prevent use-after-free attacks.

Description: None

Levels:

Automated: yes

Selections:

212050: OL 9 must enable mitigations against processor-based vulnerabilities.

Description: None

Levels:

Automated: yes

Selections:

212055: OL 9 must enable auditing of processes that start prior to the audit daemon.

Description: None

Levels:

Automated: yes

Selections:

213010: OL 9 must restrict access to the kernel message buffer.

Description: None

Levels:

Automated: yes

Selections:

213015: OL 9 must prevent kernel profiling by nonprivileged users.

Description: None

Levels:

Automated: yes

Selections:

213020: OL 9 must prevent the loading of a new kernel for later execution.

Description: None

Levels:

Automated: yes

Selections:

213025: OL 9 must restrict exposed kernel pointer addresses access.

Description: None

Levels:

Automated: yes

Selections:

213030: OL 9 must enable kernel parameters to enforce discretionary access control on hardlinks.

Description: None

Levels:

Automated: yes

Selections:

213035: OL 9 must enable kernel parameters to enforce discretionary access control on symlinks.

Description: None

Levels:

Automated: yes

Selections:

213040: OL 9 must disable the kernel.core_pattern.

Description: None

Levels:

Automated: yes

Selections:

213045: OL 9 must be configured to disable the Asynchronous Transfer Mode kernel module.

Description: None

Levels:

Automated: yes

Selections:

213050: OL 9 must be configured to disable the Controller Area Network kernel module.

Description: None

Levels:

Automated: yes

Selections:

213055: OL 9 must be configured to disable the FireWire kernel module.

Description: None

Levels:

Automated: yes

Selections:

213060: OL 9 must disable the Stream Control Transmission Protocol (SCTP) kernel module.

Description: None

Levels:

Automated: yes

Selections:

213065: OL 9 must disable the Transparent Inter Process Communication (TIPC) kernel module.

Description: None

Levels:

Automated: yes

Selections:

213070: OL 9 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.

Description: None

Levels:

Automated: yes

Selections:

213075: OL 9 must disable access to network bpf system call from nonprivileged processes.

Description: None

Levels:

Automated: yes

Selections:

213080: OL 9 must restrict usage of ptrace to descendant processes.

Description: None

Levels:

Automated: yes

Selections:

213085: OL 9 must disable core dump backtraces.

Description: None

Levels:

Automated: yes

Selections:

213090: OL 9 must disable storing core dumps.

Description: None

Levels:

Automated: yes

Selections:

213095: OL 9 must disable core dumps for all users.

Description: None

Levels:

Automated: yes

Selections:

213100: OL 9 must disable acquiring, saving, and processing core dumps.

Description: None

Levels:

Automated: yes

Selections:

213105: OL 9 must disable the use of user namespaces.

Description: None

Levels:

Automated: yes

Selections:

213115: The kdump service on OL 9 must be disabled.

Description: None

Levels:

Automated: yes

Selections:

214010: OL 9 must ensure cryptographic verification of vendor software packages.

Description: None

Levels:

Automated: yes

Selections:

214015: OL 9 must check the GPG signature of software packages originating from external software repositories before installation.

Description: None

Levels:

Automated: yes

Selections:

214020: OL 9 must check the GPG signature of locally installed software packages before installation.

Description: None

Levels:

Automated: yes

Selections:

214025: OL 9 must have GPG signature verification enabled for all software repositories.

Description: None

Levels:

Automated: yes

Selections:

214030: OL 9 must be configured so that the cryptographic hashes of system files match vendor values.

Description: None

Levels:

Automated: no

No rules selected

214035: OL 9 must remove all software components after updated versions have been installed.

Description: None

Levels:

Automated: yes

Selections:

215015: OL 9 must not have a File Transfer Protocol (FTP) server package installed.

Description: None

Levels:

Automated: yes

Selections:

215020: OL 9 must not have the sendmail package installed.

Description: None

Levels:

Automated: yes

Selections:

215025: OL 9 must not have the nfs-utils package installed.

Description: None

Levels:

Automated: yes

Selections:

215035: OL 9 must not have the rsh-server package installed.

Description: None

Levels:

Automated: yes

Selections:

215040: OL 9 must not have the telnet-server package installed.

Description: None

Levels:

Automated: yes

Selections:

215045: OL 9 must not have the gssproxy package installed.

Description: None

Levels:

Automated: yes

Selections:

215050: OL 9 must not have the iprutils package installed.

Description: None

Levels:

Automated: yes

Selections:

215055: OL 9 must not have the tuned package installed.

Description: None

Levels:

Automated: yes

Selections:

215060: OL 9 must not have a Trivial File Transfer Protocol (TFTP) server package installed.

Description: None

Levels:

Automated: yes

Selections:

215065: OL 9 must not have the quagga package installed.

Description: None

Levels:

Automated: yes

Selections:

215070: A graphical display manager must not be installed on OL 9 unless approved.

Description: None

Levels:

Automated: yes

Selections:

215075: OL 9 must have the openssl-pkcs11 package installed.

Description: None

Levels:

Automated: yes

Selections:

215080: OL 9 must have the gnutls-utils package installed.

Description: None

Levels:

Automated: yes

Selections:

215085: OL 9 must have the nss-tools package installed.

Description: None

Levels:

Automated: yes

Selections:

215090: OL 9 must have the rng-tools package installed.

Description: None

Levels:

Automated: yes

Selections:

215095: OL 9 must have the s-nail package installed.

Description: None

Levels:

Automated: yes

Selections:

231010: A separate OL 9 file system must be used for user home directories (such as /home or an equivalent).

Description: None

Levels:

Automated: yes

Selections:

231015: OL 9 must use a separate file system for /tmp.

Description: None

Levels:

Automated: yes

Selections:

231020: OL 9 must use a separate file system for /var.

Description: None

Levels:

Automated: yes

Selections:

231025: OL 9 must use a separate file system for /var/log.

Description: None

Levels:

Automated: yes

Selections:

231030: OL 9 must use a separate file system for the system audit data path.

Description: None

Levels:

Automated: yes

Selections:

231035: OL 9 must use a separate file system for /var/tmp.

Description: None

Levels:

Automated: yes

Selections:

231040: OL 9 file system automount function must be disabled unless required.

Description: None

Levels:

Automated: yes

Selections:

231045: OL 9 must prevent device files from being interpreted on file systems that contain user home directories.

Description: None

Levels:

Automated: yes

Selections:

231050: OL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.

Description: None

Levels:

Automated: yes

Selections:

231055: OL 9 must prevent code from being executed on file systems that contain user home directories.

Description: None

Levels:

Automated: yes

Selections:

231060: OL 9 must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.

Description: None

Levels:

Automated: yes

Selections:

231065: OL 9 must prevent special devices on file systems that are imported via Network File System (NFS).

Description: None

Levels:

Automated: yes

Selections:

231070: OL 9 must prevent code from being executed on file systems that are imported via Network File System (NFS).

Description: None

Levels:

Automated: yes

Selections:

231075: OL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).

Description: None

Levels:

Automated: yes

Selections:

231080: OL 9 must prevent code from being executed on file systems that are used with removable media.

Description: None

Levels:

Automated: yes

Selections:

231085: OL 9 must prevent special devices on file systems that are used with removable media.

Description: None

Levels:

Automated: yes

Selections:

231090: OL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.

Description: None

Levels:

Automated: yes

Selections:

231095: OL 9 must mount /boot with the nodev option.

Description: None

Levels:

Automated: yes

Selections:

231100: OL 9 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.

Description: None

Levels:

Automated: yes

Selections:

231105: OL 9 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.

Description: None

Levels:

Automated: yes

Selections:

231110: OL 9 must mount /dev/shm with the nodev option.

Description: None

Levels:

Automated: yes

Selections:

231115: OL 9 must mount /dev/shm with the noexec option.

Description: None

Levels:

Automated: yes

Selections:

231120: OL 9 must mount /dev/shm with the nosuid option.

Description: None

Levels:

Automated: yes

Selections:

231125: OL 9 must mount /tmp with the nodev option.

Description: None

Levels:

Automated: yes

Selections:

231130: OL 9 must mount /tmp with the noexec option.

Description: None

Levels:

Automated: yes

Selections:

231135: OL 9 must mount /tmp with the nosuid option.

Description: None

Levels:

Automated: yes

Selections:

231140: OL 9 must mount /var with the nodev option.

Description: None

Levels:

Automated: yes

Selections:

231145: OL 9 must mount /var/log with the nodev option.

Description: None

Levels:

Automated: yes

Selections:

231150: OL 9 must mount /var/log with the noexec option.

Description: None

Levels:

Automated: yes

Selections:

231155: OL 9 must mount /var/log with the nosuid option.

Description: None

Levels:

Automated: yes

Selections:

231160: OL 9 must mount /var/log/audit with the nodev option.

Description: None

Levels:

Automated: yes

Selections:

231165: OL 9 must mount /var/log/audit with the noexec option.

Description: None

Levels:

Automated: yes

Selections:

231170: OL 9 must mount /var/log/audit with the nosuid option.

Description: None

Levels:

Automated: yes

Selections:

231175: OL 9 must mount /var/tmp with the nodev option.

Description: None

Levels:

Automated: yes

Selections:

231180: OL 9 must mount /var/tmp with the noexec option.

Description: None

Levels:

Automated: yes

Selections:

231185: OL 9 must mount /var/tmp with the nosuid option.

Description: None

Levels:

Automated: yes

Selections:

231190: OL 9 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.

Description: None

Levels:

Automated: yes

Selections:

231195: OL 9 must disable mounting of cramfs.

Description: None

Levels:

Automated: yes

Selections:

231200: OL 9 must prevent special devices on non-root local partitions.

Description: None

Levels:

Automated: yes

Selections:

232010: OL 9 system commands must have mode 755 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

232015: OL 9 library directories must have mode 755 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

232020: OL 9 library files must have mode 755 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

232025: OL 9 /var/log directory must have mode 0755 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

232030: OL 9 /var/log/messages file must have mode 0640 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

232035: OL 9 audit tools must have a mode of 0755 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

232040: OL 9 cron configuration directories must have a mode of 0700 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

232045: All OL 9 local initialization files must have mode 0740 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

232050: All OL 9 local interactive user home directories must have mode 0750 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

232055: OL 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access.

Description: None

Levels:

Automated: yes

Selections:

232060: OL 9 /etc/group- file must have mode 0644 or less permissive to prevent unauthorized access.

Description: None

Levels:

Automated: yes

Selections:

232065: OL 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access.

Description: None

Levels:

Automated: yes

Selections:

232070: OL 9 /etc/gshadow- file must have mode 0000 or less permissive to prevent unauthorized access.

Description: None

Levels:

Automated: yes

Selections:

232075: OL 9 /etc/passwd file must have mode 0644 or less permissive to prevent unauthorized access.

Description: None

Levels:

Automated: yes

Selections:

232080: OL 9 /etc/passwd- file must have mode 0644 or less permissive to prevent unauthorized access.

Description: None

Levels:

Automated: yes

Selections:

232085: OL 9 /etc/shadow- file must have mode 0000 or less permissive to prevent unauthorized access.

Description: None

Levels:

Automated: yes

Selections:

232090: OL 9 /etc/group file must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232095: OL 9 /etc/group file must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

232100: OL 9 /etc/group- file must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232105: OL 9 /etc/group- file must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

232110: OL 9 /etc/gshadow file must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232115: OL 9 /etc/gshadow file must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

232120: OL 9 /etc/gshadow- file must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232125: OL 9 /etc/gshadow- file must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

232130: OL 9 /etc/passwd file must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232135: OL 9 /etc/passwd file must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

232140: OL 9 /etc/passwd- file must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232145: OL 9 /etc/passwd- file must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

232150: OL 9 /etc/shadow file must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232155: OL 9 /etc/shadow file must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

232160: OL 9 /etc/shadow- file must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232165: OL 9 /etc/shadow- file must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

232170: OL 9 /var/log directory must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232175: OL 9 /var/log directory must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

232180: OL 9 /var/log/messages file must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232185: OL 9 /var/log/messages file must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

232190: OL 9 system commands must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232195: OL 9 system commands must be group-owned by root or a system account.

Description: None

Levels:

Automated: yes

Selections:

232200: OL 9 library files must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232205: OL 9 library files must be group-owned by root or a system account.

Description: None

Levels:

Automated: yes

Selections:

232210: OL 9 library directories must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232215: OL 9 library directories must be group-owned by root or a system account.

Description: None

Levels:

Automated: yes

Selections:

232220: OL 9 audit tools must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232225: OL 9 audit tools must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

232230: OL 9 cron configuration files directory must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

232235: OL 9 cron configuration files directory must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

232240: All OL 9 world-writable directories must be owned by root, sys, bin, or an application user.

Description: None

Levels:

Automated: yes

Selections:

232245: A sticky bit must be set on all OL 9 public directories.

Description: None

Levels:

Automated: yes

Selections:

232250: All OL 9 local files and directories must have a valid group owner.

Description: None

Levels:

Automated: yes

Selections:

232255: All OL 9 local files and directories must have a valid owner.

Description: None

Levels:

Automated: yes

Selections:

232260: OL 9 must be configured so that all system device files are correctly labeled to prevent unauthorized modification.

Description: None

Levels:

Automated: yes

Selections:

232265: OL 9 /etc/crontab file must have mode 0600.

Description: None

Levels:

Automated: yes

Selections:

232270: OL 9 /etc/shadow file must have mode 0000 to prevent unauthorized access.

Description: None

Levels:

Automated: yes

Selections:

251010: OL 9 must have the firewalld package installed.

Description: None

Levels:

Automated: yes

Selections:

251015: The firewalld service on OL 9 must be active.

Description: None

Levels:

Automated: yes

Selections:

251020: A OL 9 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.

Description: None

Levels:

Automated: yes

Selections:

251025: OL 9 must control remote access methods.

Description: None

Levels:

Automated: yes

Selections:

251030: OL 9 must protect against or limit the effects of denial-of-service (DoS) attacks by ensuring rate-limiting measures on impacted network interfaces are implemented.

Description: None

Levels:

Automated: yes

Selections:

251035: OL 9 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.

Description: None

Levels:

Automated: yes

Selections:

251040: OL 9 network interfaces must not be in promiscuous mode.

Description: None

Levels:

Automated: yes

Selections:

251045: OL 9 must enable hardening for the Berkeley Packet Filter just-in-time compiler.

Description: None

Levels:

Automated: yes

Selections:

252010: OL 9 must have the chrony package installed.

Description: None

Levels:

Automated: yes

Selections:

252015: OL 9 chronyd service must be enabled.

Description: None

Levels:

Automated: yes

Selections:

252020: OL 9 must securely compare internal information system clocks at least every 24 hours.

Description: None

Levels:

Automated: yes

Selections:

252025: OL 9 must disable the chrony daemon from acting as a server.

Description: None

Levels:

Automated: yes

Selections:

252030: OL 9 must disable network management of the chrony daemon.

Description: None

Levels:

Automated: yes

Selections:

252035: OL 9 systems using Domain Name Servers (DNS) resolution must have at least two name servers configured.

Description: None

Levels:

Automated: yes

Selections:

252040: OL 9 must configure a DNS processing mode set be Network Manager.

Description: None

Levels:

Automated: yes

Selections:

252045: OL 9 must not have unauthorized IP tunnels configured.

Description: None

Levels:

Automated: yes

Selections:

252050: OL 9 must be configured to prevent unrestricted mail relaying.

Description: None

Levels:

Automated: yes

Selections:

252055: If the Trivial File Transfer Protocol (TFTP) server is required, OL 9 TFTP daemon must be configured to operate in secure mode.

Description: None

Levels:

Automated: yes

Selections:

252060: OL 9 must forward mail from postmaster to the root account using a postfix alias.

Description: None

Levels:

Automated: yes

Selections:

252065: OL 9 libreswan package must be installed.

Description: None

Levels:

Automated: yes

Selections:

252070: There must be no shosts.equiv files on OL 9.

Description: None

Levels:

Automated: yes

Selections:

252075: There must be no .shosts files on OL 9.

Description: None

Levels:

Automated: yes

Selections:

253010: OL 9 must be configured to use TCP syncookies.

Description: None

Levels:

Automated: yes

Selections:

253015: OL 9 must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.

Description: None

Levels:

Automated: yes

Selections:

253020: OL 9 must not forward Internet Protocol version 4 (IPv4) source-routed packets.

Description: None

Levels:

Automated: yes

Selections:

253025: OL 9 must log IPv4 packets with impossible addresses.

Description: None

Levels:

Automated: yes

Selections:

253030: OL 9 must log IPv4 packets with impossible addresses by default.

Description: None

Levels:

Automated: yes

Selections:

253035: OL 9 must use reverse path filtering on all IPv4 interfaces.

Description: None

Levels:

Automated: yes

Selections:

253040: OL 9 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.

Description: None

Levels:

Automated: yes

Selections:

253045: OL 9 must not forward IPv4 source-routed packets by default.

Description: None

Levels:

Automated: yes

Selections:

253050: OL 9 must use a reverse-path filter for IPv4 network traffic when possible by default.

Description: None

Levels:

Automated: yes

Selections:

253055: OL 9 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.

Description: None

Levels:

Automated: yes

Selections:

253060: OL 9 must limit the number of bogus Internet Control Message Protocol (ICMP) response errors logs.

Description: None

Levels:

Automated: yes

Selections:

253065: OL 9 must not send Internet Control Message Protocol (ICMP) redirects.

Description: None

Levels:

Automated: yes

Selections:

253070: OL 9 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.

Description: None

Levels:

Automated: yes

Selections:

253075: OL 9 must not enable IPv4 packet forwarding unless the system is a router.

Description: None

Levels:

Automated: yes

Selections:

254010: OL 9 must not accept router advertisements on all IPv6 interfaces.

Description: None

Levels:

Automated: yes

Selections:

254015: OL 9 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.

Description: None

Levels:

Automated: yes

Selections:

254020: OL 9 must not forward IPv6 source-routed packets.

Description: None

Levels:

Automated: yes

Selections:

254025: OL 9 must not enable IPv6 packet forwarding unless the system is a router.

Description: None

Levels:

Automated: yes

Selections:

254030: OL 9 must not accept router advertisements on all IPv6 interfaces by default.

Description: None

Levels:

Automated: yes

Selections:

254035: OL 9 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.

Description: None

Levels:

Automated: yes

Selections:

254040: OL 9 must not forward IPv6 source-routed packets by default.

Description: None

Levels:

Automated: yes

Selections:

255010: All OL 9 networked systems must have SSH installed.

Description: None

Levels:

Automated: yes

Selections:

255015: All OL 9 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.

Description: None

Levels:

Automated: yes

Selections:

255020: OL 9 must have the openssh-clients package installed.

Description: None

Levels:

Automated: yes

Selections:

255025: OL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a SSH logon.

Description: None

Levels:

Automated: yes

Selections:

255030: OL 9 must log SSH connection attempts and failures to the server.

Description: None

Levels:

Automated: yes

Selections:

255035: OL 9 SSHD must accept public key authentication.

Description: None

Levels:

Automated: yes

Selections:

255040: OL 9 SSHD must not allow blank passwords.

Description: None

Levels:

Automated: yes

Selections:

255045: OL 9 must not permit direct logons to the root account using remote access via SSH.

Description: None

Levels:

Automated: yes

Selections:

255050: OL 9 must enable the Pluggable Authentication Module (PAM) interface for SSHD.

Description: None

Levels:

Automated: yes

Selections:

255060: OL 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH client connections.

Description: None

Levels:

Automated: yes

Selections:

255070: OL 9 SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.

Description: None

Levels:

Automated: no

No rules selected

255075: OL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.

Description: None

Levels:

Automated: no

No rules selected

255080: OL 9 must not allow a noncertificate trusted host SSH logon to the system.

Description: None

Levels:

Automated: yes

Selections:

255085: OL 9 must not allow users to override SSH environment variables.

Description: None

Levels:

Automated: yes

Selections:

255090: OL 9 must force a frequent session key renegotiation for SSH connections to the server.

Description: None

Levels:

Automated: yes

Selections:

255095: OL 9 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.

Description: None

Levels:

Automated: yes

Selections:

255100: OL 9 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive.

Description: None

Levels:

Automated: yes

Selections:

255105: OL 9 SSH server configuration file must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

255110: OL 9 SSH server configuration file must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

255115: OL 9 SSH server configuration file must have mode 0600 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

255120: OL 9 SSH private host key files must have mode 0640 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

255125: OL 9 SSH public host key files must have mode 0644 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

255135: OL 9 SSH daemon must not allow GSSAPI authentication.

Description: None

Levels:

Automated: yes

Selections:

255140: OL 9 SSH daemon must not allow Kerberos authentication.

Description: None

Levels:

Automated: yes

Selections:

255145: OL 9 SSH daemon must not allow rhosts authentication.

Description: None

Levels:

Automated: yes

Selections:

255150: OL 9 SSH daemon must not allow known hosts authentication.

Description: None

Levels:

Automated: yes

Selections:

255155: OL 9 SSH daemon must disable remote X connections for interactive users.

Description: None

Levels:

Automated: yes

Selections:

255160: OL 9 SSH daemon must perform strict mode checking of home directory configuration files.

Description: None

Levels:

Automated: yes

Selections:

255165: OL 9 SSH daemon must display the date and time of the last successful account logon upon an SSH logon.

Description: None

Levels:

Automated: yes

Selections:

255175: OL 9 SSH daemon must prevent remote hosts from connecting to the proxy display.

Description: None

Levels:

Automated: yes

Selections:

271010: OL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon.

Description: None

Levels:

Automated: yes

Selections:

271015: OL 9 must prevent a user from overriding the banner-message-enable setting for the graphical user interface.

Description: None

Levels:

Automated: yes

Selections:

271020: OL 9 must disable the graphical user interface automount function unless required.

Description: None

Levels:

Automated: yes

Selections:

271025: OL 9 must prevent a user from overriding the disabling of the graphical user interface automount function.

Description: None

Levels:

Automated: yes

Selections:

271030: OL 9 must disable the graphical user interface autorun function unless required.

Description: None

Levels:

Automated: yes

Selections:

271035: OL 9 must prevent a user from overriding the disabling of the graphical user interface autorun function.

Description: None

Levels:

Automated: yes

Selections:

271040: OL 9 must not allow unattended or automatic logon via the graphical user interface.

Description: None

Levels:

Automated: yes

Selections:

271045: OL 9 must be able to initiate directly a session lock for all connection types using smart card when the smart card is removed.

Description: None

Levels:

Automated: yes

Selections:

271050: OL 9 must prevent a user from overriding the disabling of the graphical user smart card removal action.

Description: None

Levels:

Automated: yes

Selections:

271055: OL 9 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for graphical user sessions.

Description: None

Levels:

Automated: yes

Selections:

271060: OL 9 must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface.

Description: None

Levels:

Automated: yes

Selections:

271065: OL 9 must automatically lock graphical user sessions after 15 minutes of inactivity.

Description: None

Levels:

Automated: yes

Selections:

271070: OL 9 must prevent a user from overriding the session idle-delay setting for the graphical user interface.

Description: None

Levels:

Automated: yes

Selections:

271075: OL 9 must initiate a session lock for graphical user interfaces when the screensaver is activated.

Description: None

Levels:

Automated: yes

Selections:

271080: OL 9 must prevent a user from overriding the session lock-delay setting for the graphical user interface.

Description: None

Levels:

Automated: yes

Selections:

271085: OL 9 must conceal, via the session lock, information previously visible on the display with a publicly viewable image.

Description: None

Levels:

Automated: yes

Selections:

271090: OL 9 effective dconf policy must match the policy keyfiles.

Description: None

Levels:

Automated: yes

Selections:

271095: OL 9 must disable the ability of a user to restart the system from the login screen.

Description: None

Levels:

Automated: yes

Selections:

271100: OL 9 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface.

Description: None

Levels:

Automated: yes

Selections:

271105: OL 9 must disable the ability of a user to accidentally press Ctrl-Alt-Del and cause a system to shut down or reboot.

Description: None

Levels:

Automated: yes

Selections:

271110: OL 9 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface.

Description: None

Levels:

Automated: yes

Selections:

271115: OL 9 must disable the user list at logon for graphical user interfaces.

Description: None

Levels:

Automated: yes

Selections:

291010: OL 9 must be configured to disable USB mass storage.

Description: None

Levels:

Automated: yes

Selections:

291015: OL 9 must have the USBGuard package installed.

Description: None

Levels:

Automated: yes

Selections:

291020: OL 9 must have the USBGuard package enabled.

Description: None

Levels:

Automated: yes

Selections:

291025: OL 9 must enable Linux audit logging for the USBGuard daemon.

Description: None

Levels:

Automated: yes

Selections:

291030: OL 9 must block unauthorized peripherals before establishing a connection.

Description: None

Levels:

Automated: yes

Selections:

291035: OL 9 Bluetooth must be disabled.

Description: None

Levels:

Automated: yes

Selections:

291040: OL 9 wireless network adapters must be disabled.

Description: None

Levels:

Automated: yes

Selections:

411010: OL 9 user account passwords for new users or password changes must have a 60-day maximum password lifetime restriction in /etc/login.defs.

Description: None

Levels:

Automated: yes

Selections:

411015: OL 9 user account passwords must have a 60-day maximum password lifetime restriction.

Description: None

Levels:

Automated: yes

Selections:

411020: All OL 9 local interactive user accounts must be assigned a home directory upon creation.

Description: None

Levels:

Automated: yes

Selections:

411025: OL 9 must set the umask value to 077 for all local interactive user accounts.

Description: None

Levels:

Automated: yes

Selections:

411030: OL 9 duplicate User IDs (UIDs) must not exist for interactive users.

Description: None

Levels:

Automated: yes

Selections:

411035: OL 9 system accounts must not have an interactive login shell.

Description: None

Levels:

Automated: yes

Selections:

411040: OL 9 must automatically expire temporary accounts within 72 hours.

Description: None

Levels:

Automated: yes

Selections:

411045: All OL 9 interactive users must have a primary group that exists.

Description: None

Levels:

Automated: yes

Selections:

411050: OL 9 must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.

Description: None

Levels:

Automated: yes

Selections:

411055: Executable search paths within the initialization files of all local interactive OL 9 users must only contain paths that resolve to the system default or the users home directory.

Description: None

Levels:

Automated: yes

Selections:

411060: All OL 9 local interactive users must have a home directory assigned in the /etc/passwd file.

Description: None

Levels:

Automated: yes

Selections:

411065: All OL 9 local interactive user home directories defined in the /etc/passwd file must exist.

Description: None

Levels:

Automated: yes

Selections:

411070: All OL 9 local interactive user home directories must be group-owned by the home directory owner's primary group.

Description: None

Levels:

Automated: yes

Selections:

411075: OL 9 must automatically lock an account when three unsuccessful logon attempts occur.

Description: None

Levels:

Automated: yes

Selections:

411080: OL 9 must automatically lock the root account until the root account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.

Description: None

Levels:

Automated: yes

Selections:

411085: OL 9 must automatically lock an account when three unsuccessful logon attempts occur during a 15-minute time period.

Description: None

Levels:

Automated: yes

Selections:

411090: OL 9 must maintain an account lock until the locked account is released by an administrator.

Description: None

Levels:

Automated: yes

Selections:

411095: OL 9 must not have unauthorized accounts.

Description: None

Levels:

Automated: yes

Selections:

411100: The root account must be the only account having unrestricted access to OL 9 system.

Description: None

Levels:

Automated: yes

Selections:

411105: OL 9 must ensure account lockouts persist.

Description: None

Levels:

Automated: yes

Selections:

411110: OL 9 groups must have unique Group ID (GID).

Description: None

Levels:

Automated: yes

Selections:

411115: Local OL 9 initialization files must not execute world-writable programs.

Description: None

Levels:

Automated: yes

Selections:

412010: OL 9 must have the tmux package installed.

Description: None

Levels:

Automated: yes

Selections:

412015: OL 9 must ensure session control is automatically started at shell initialization.

Description: None

Levels:

Automated: yes

Selections:

412020: OL 9 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions.

Description: None

Levels:

Automated: yes

Selections:

412025: OL 9 must automatically lock command line user sessions after 15 minutes of inactivity.

Description: None

Levels:

Automated: yes

Selections:

412030: OL 9 must prevent users from disabling session control mechanisms.

Description: None

Levels:

Automated: yes

Selections:

412035: OL 9 must automatically exit interactive command shell user sessions after 15 minutes of inactivity.

Description: None

Levels:

Automated: yes

Selections:

412040: OL 9 must limit the number of concurrent sessions to ten for all accounts and/or account types.

Description: None

Levels:

Automated: yes

Selections:

412045: OL 9 must log username information when unsuccessful logon attempts occur.

Description: None

Levels:

Automated: yes

Selections:

412050: OL 9 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.

Description: None

Levels:

Automated: yes

Selections:

412055: OL 9 must define default permissions for the bash shell.

Description: None

Levels:

Automated: yes

Selections:

412060: OL 9 must define default permissions for the c shell.

Description: None

Levels:

Automated: yes

Selections:

412065: OL 9 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.

Description: None

Levels:

Automated: yes

Selections:

412070: OL 9 must define default permissions for the system default profile.

Description: None

Levels:

Automated: yes

Selections:

412075: OL 9 must display the date and time of the last successful account logon upon logon.

Description: None

Levels:

Automated: yes

Selections:

412080: OL 9 must terminate idle user sessions.

Description: None

Levels:

Automated: yes

Selections:

431010: OL 9 must use a Linux Security Module configured to enforce limits on system services.

Description: None

Levels:

Automated: yes

Selections:

431015: OL 9 must enable the SELinux targeted policy.

Description: None

Levels:

Automated: yes

Selections:

431020: OL 9 must configure SELinux context type to allow the use of a nondefault faillock tally directory.

Description: None

Levels:

Automated: yes

Selections:

431025: OL 9 must have policycoreutils package installed.

Description: None

Levels:

Automated: yes

Selections:

431030: OL 9 policycoreutils-python-utils package must be installed.

Description: None

Levels:

Automated: yes

Selections:

432010: OL 9 must have the sudo package installed.

Description: None

Levels:

Automated: yes

Selections:

432015: OL 9 must require reauthentication when using the "sudo" command.

Description: None

Levels:

Automated: yes

Selections:

432020: OL 9 must use the invoking user's password for privilege escalation when using "sudo".

Description: None

Levels:

Automated: yes

Selections:

432025: OL 9 must require users to reauthenticate for privilege escalation.

Description: None

Levels:

Automated: yes

Selections:

432030: OL 9 must restrict privilege elevation to authorized personnel.

Description: None

Levels:

Automated: yes

Selections:

432035: OL 9 must restrict the use of the "su" command.

Description: None

Levels:

Automated: yes

Selections:

433010: OL 9 fapolicy module must be installed.

Description: None

Levels:

Automated: yes

Selections:

433015: OL 9 fapolicy module must be enabled.

Description: None

Levels:

Automated: yes

Selections:

611010: OL 9 must ensure the password complexity module in the system-auth file is configured for three retries or less.

Description: None

Levels:

Automated: yes

Selections:

611015: OL 9 must be configured in the password-auth file to prohibit password reuse for a minimum of five generations.

Description: None

Levels:

Automated: yes

Selections:

611020: OL 9 must be configured in the system-auth file to prohibit password reuse for a minimum of five generations.

Description: None

Levels:

Automated: yes

Selections:

611025: OL 9 must not allow blank or null passwords.

Description: None

Levels:

Automated: yes

Selections:

611030: OL 9 must configure the use of the pam_faillock.so module in the /etc/pam.d/system-auth file.

Description: None

Levels:

Automated: yes

Selections:

611035: OL 9 must configure the use of the pam_faillock.so module in the /etc/pam.d/password-auth file.

Description: None

Levels:

Automated: yes

Selections:

611040: OL 9 must ensure the password complexity module is enabled in the password-auth file.

Description: None

Levels:

Automated: yes

Selections:

611045: OL 9 must ensure the password complexity module is enabled in the system-auth file.

Description: None

Levels:

Automated: yes

Selections:

611050: OL 9 password-auth must be configured to use a sufficient number of hashing rounds.

Description: None

Levels:

Automated: yes

Selections:

611055: OL 9 system-auth must be configured to use a sufficient number of hashing rounds.

Description: None

Levels:

Automated: yes

Selections:

611060: OL 9 must enforce password complexity rules for the root account.

Description: None

Levels:

Automated: yes

Selections:

611065: OL 9 must enforce password complexity by requiring that at least one lowercase character be used.

Description: None

Levels:

Automated: yes

Selections:

611070: OL 9 must enforce password complexity by requiring that at least one numeric character be used.

Description: None

Levels:

Automated: yes

Selections:

611075: OL 9 passwords for new users or password changes must have a 24 hours minimum password lifetime restriction in /etc/login.defs.

Description: None

Levels:

Automated: yes

Selections:

611080: OL 9 passwords must have a 24 hours minimum password lifetime restriction in /etc/shadow.

Description: None

Levels:

Automated: yes

Selections:

611085: OL 9 must require users to provide a password for privilege escalation.

Description: None

Levels:

Automated: yes

Selections:

611090: OL 9 passwords must be created with a minimum of 15 characters.

Description: None

Levels:

Automated: yes

Selections:

611095: OL 9 passwords for new users must have a minimum of 15 characters.

Description: None

Levels:

Automated: yes

Selections:

611100: OL 9 must enforce password complexity by requiring that at least one special character be used.

Description: None

Levels:

Automated: yes

Selections:

611105: OL 9 must prevent the use of dictionary words for passwords.

Description: None

Levels:

Automated: yes

Selections:

611110: OL 9 must enforce password complexity by requiring that at least one uppercase character be used.

Description: None

Levels:

Automated: yes

Selections:

611115: OL 9 must require the change of at least eight characters when passwords are changed.

Description: None

Levels:

Automated: yes

Selections:

611120: OL 9 must require the maximum number of repeating characters of the same character class be limited to four when passwords are changed.

Description: None

Levels:

Automated: yes

Selections:

611125: OL 9 must require the maximum number of repeating characters be limited to three when passwords are changed.

Description: None

Levels:

Automated: yes

Selections:

611130: OL 9 must require the change of at least four character classes when passwords are changed.

Description: None

Levels:

Automated: yes

Selections:

611135: OL 9 must be configured so that user and group account administration utilities are configured to store only encrypted representations of passwords.

Description: None

Levels:

Automated: yes

Selections:

611140: OL 9 must be configured to use the shadow file to store only encrypted representations of passwords.

Description: None

Levels:

Automated: yes

Selections:

611145: OL 9 must not be configured to bypass password requirements for privilege escalation.

Description: None

Levels:

Automated: yes

Selections:

611150: OL 9 shadow password suite must be configured to use a sufficient number of hashing rounds.

Description: None

Levels:

Automated: yes

Selections:

611155: OL 9 must not have accounts configured with blank or null passwords.

Description: None

Levels:

Automated: yes

Selections:

611160: OL 9 must use the CAC smart card driver.

Description: None

Levels:

Automated: yes

Selections:

611165: OL 9 must enable certificate based smart card authentication.

Description: None

Levels:

Automated: yes

Selections:

611170: OL 9 must implement certificate status checking for multifactor authentication.

Description: None

Levels:

Automated: yes

Selections:

611175: OL 9 must have the pcsc-lite package installed.

Description: None

Levels:

Automated: yes

Selections:

611180: The pcscd service on OL 9 must be active.

Description: None

Levels:

Automated: yes

Selections:

611185: OL 9 must have the opensc package installed.

Description: None

Levels:

Automated: yes

Selections:

611190: OL 9, for PKI-based authentication, must enforce authorized access to the corresponding private key.

Description: None

Levels:

Automated: yes

Selections:

611195: OL 9 must require authentication to access emergency mode.

Description: None

Levels:

Automated: yes

Selections:

611200: OL 9 must require authentication to access single-user mode.

Description: None

Levels:

Automated: yes

Selections:

631010: OL 9, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

Description: None

Levels:

Automated: yes

Selections:

631015: OL 9 must map the authenticated identity to the user or group account for PKI-based authentication.

Description: None

Levels:

Automated: yes

Selections:

631020: OL 9 must prohibit the use of cached authenticators after one day.

Description: None

Levels:

Automated: yes

Selections:

651010: OL 9 must have the AIDE package installed.

Description: None

Levels:

Automated: yes

Selections:

651015: OL 9 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered.

Description: None

Levels:

Automated: yes

Selections:

651020: OL 9 must use a file integrity tool that is configured to use FIPS 140-3-approved cryptographic hashes for validating file contents and directories.

Description: None

Levels:

Automated: yes

Selections:

651025: OL 9 must use cryptographic mechanisms to protect the integrity of audit tools.

Description: None

Levels:

Automated: yes

Selections:

651030: OL 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).

Description: None

Levels:

Automated: yes

Selections:

651035: OL 9 must be configured so that the file integrity tool verifies extended attributes.

Description: None

Levels:

Automated: yes

Selections:

652010: OL 9 must have the rsyslog package installed.

Description: None

Levels:

Automated: yes

Selections:

652015: OL 9 must have the packages required for encrypting offloaded audit logs installed.

Description: None

Levels:

Automated: yes

Selections:

652020: The rsyslog service on OL 9 must be active.

Description: None

Levels:

Automated: yes

Selections:

652025: OL 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.

Description: None

Levels:

Automated: yes

Selections:

652030: All OL 9 remote access methods must be monitored.

Description: None

Levels:

Automated: yes

Selections:

652035: OL 9 must be configured to offload audit records onto a different system from the system being audited via syslog.

Description: None

Levels:

Automated: yes

Selections:

652040: OL 9 must authenticate the remote logging server for offloading audit logs via rsyslog.

Description: None

Levels:

Automated: yes

Selections:

652045: OL 9 must encrypt the transfer of audit records offloaded onto a different system or media from the system being audited via rsyslog.

Description: None

Levels:

Automated: yes

Selections:

652050: OL 9 must encrypt via the gtls driver the transfer of audit records offloaded onto a different system or media from the system being audited via rsyslog.

Description: None

Levels:

Automated: yes

Selections:

652055: OL 9 must be configured to forward audit records via TCP to a different system or media from the system being audited via rsyslog.

Description: None

Levels:

Automated: yes

Selections:

652060: OL 9 must use cron logging.

Description: None

Levels:

Automated: yes

Selections:

653010: OL 9 audit package must be installed.

Description: None

Levels:

Automated: yes

Selections:

653015: OL 9 audit service must be enabled.

Description: None

Levels:

Automated: yes

Selections:

653020: OL 9 audit system must take appropriate action when an error writing to the audit storage volume occurs.

Description: None

Levels:

Automated: yes

Selections:

653025: OL 9 audit system must take appropriate action when the audit storage volume is full.

Description: None

Levels:

Automated: yes

Selections:

653030: OL 9 must allocate audit record storage capacity to store at least one week's worth of audit records.

Description: None

Levels:

Automated: yes

Selections:

653035: OL 9 must take action when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity.

Description: None

Levels:

Automated: yes

Selections:

653040: OL 9 must notify the system administrator (SA) and information system security officer (ISSO) (at a minimum) when allocated audit record storage volume 75 percent utilization.

Description: None

Levels:

Automated: yes

Selections:

653045: OL 9 must take action when allocated audit record storage volume reaches 95 percent of the audit record storage capacity.

Description: None

Levels:

Automated: yes

Selections:

653050: OL 9 must take action when allocated audit record storage volume reaches 95 percent of the repository maximum audit record storage capacity.

Description: None

Levels:

Automated: yes

Selections:

653055: OL 9 audit system must take appropriate action when the audit files have reached maximum size.

Description: None

Levels:

Automated: yes

Selections:

653060: OL 9 must label all offloaded audit logs before sending them to the central log server.

Description: None

Levels:

Automated: yes

Selections:

653065: OL 9 must take appropriate action when the internal event queue is full.

Description: None

Levels:

Automated: yes

Selections:

653070: OL 9 System Administrator (SA) and/or information system security officer (ISSO) (at a minimum) must be alerted of an audit processing failure event.

Description: None

Levels:

Automated: yes

Selections:

653075: OL 9 audit system must audit local events.

Description: None

Levels:

Automated: yes

Selections:

653080: OL 9 audit logs must be group-owned by root or by a restricted logging group to prevent unauthorized read access.

Description: None

Levels:

Automated: yes

Selections:

653085: OL 9 audit log directory must be owned by root to prevent unauthorized read access.

Description: None

Levels:

Automated: yes

Selections:

653090: OL 9 audit logs file must have mode 0600 or less permissive to prevent unauthorized access to the audit log.

Description: None

Levels:

Automated: yes

Selections:

653095: OL 9 must periodically flush audit records to disk to prevent the loss of audit records.

Description: None

Levels:

Automated: yes

Selections:

653100: OL 9 must produce audit records containing information to establish the identity of any individual or process associated with the event.

Description: None

Levels:

Automated: yes

Selections:

653105: OL 9 must write audit records to disk.

Description: None

Levels:

Automated: yes

Selections:

653110: OL 9 must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.

Description: None

Levels:

Automated: yes

Selections:

653115: OL 9 /etc/audit/auditd.conf file must have 0640 or less permissive to prevent unauthorized access.

Description: None

Levels:

Automated: yes

Selections:

653120: OL 9 must allocate an audit_backlog_limit of sufficient size to capture processes that start prior to the audit daemon.

Description: None

Levels:

Automated: yes

Selections:

653125: OL 9 must have mail aliases to notify the information system security officer (ISSO) and system administrator (SA) (at a minimum) in the event of an audit processing failure.

Description: None

Levels:

Automated: yes

Selections:

653130: OL 9 audispd-plugins package must be installed.

Description: None

Levels:

Automated: yes

Selections:

654010: OL 9 must audit uses of the "execve" system call.

Description: None

Levels:

Automated: yes

Selections:

654015: OL 9 must audit all uses of the chmod, fchmod, and fchmodat system calls.

Description: None

Levels:

Automated: yes

Selections:

654020: OL 9 must audit all uses of the chown, fchown, fchownat, and lchown system calls.

Description: None

Levels:

Automated: yes

Selections:

654025: OL 9 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.

Description: None

Levels:

Automated: yes

Selections:

654030: OL 9 must audit all uses of umount system calls.

Description: None

Levels:

Automated: yes

Selections:

654035: OL 9 must audit all uses of the chacl command.

Description: None

Levels:

Automated: yes

Selections:

654040: OL 9 must audit all uses of the setfacl command.

Description: None

Levels:

Automated: yes

Selections:

654045: OL 9 must audit all uses of the chcon command.

Description: None

Levels:

Automated: yes

Selections:

654050: OL 9 must audit all uses of the semanage command.

Description: None

Levels:

Automated: yes

Selections:

654055: OL 9 must audit all uses of the setfiles command.

Description: None

Levels:

Automated: yes

Selections:

654060: OL 9 must audit all uses of the setsebool command.

Description: None

Levels:

Automated: yes

Selections:

654065: OL 9 must audit all uses of the rename, unlink, rmdir, renameat, and unlinkat system calls.

Description: None

Levels:

Automated: yes

Selections:

654070: OL 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.

Description: None

Levels:

Automated: yes

Selections:

654075: OL 9 must audit all uses of the delete_module system call.

Description: None

Levels:

Automated: yes

Selections:

654080: OL 9 must audit all uses of the init_module and finit_module system calls.

Description: None

Levels:

Automated: yes

Selections:

654085: OL 9 must audit all uses of the chage command.

Description: None

Levels:

Automated: yes

Selections:

654090: OL 9 must audit all uses of the chsh command.

Description: None

Levels:

Automated: yes

Selections:

654095: OL 9 must audit all uses of the crontab command.

Description: None

Levels:

Automated: yes

Selections:

654100: OL 9 must audit all uses of the gpasswd command.

Description: None

Levels:

Automated: yes

Selections:

654105: OL 9 must audit all uses of the kmod command.

Description: None

Levels:

Automated: yes

Selections:

654110: OL 9 must audit all uses of the newgrp command.

Description: None

Levels:

Automated: yes

Selections:

654115: OL 9 must audit all uses of the pam_timestamp_check command.

Description: None

Levels:

Automated: yes

Selections:

654120: OL 9 must audit all uses of the passwd command.

Description: None

Levels:

Automated: yes

Selections:

654125: OL 9 must audit all uses of the postdrop command.

Description: None

Levels:

Automated: yes

Selections:

654130: OL 9 must audit all uses of the postqueue command.

Description: None

Levels:

Automated: yes

Selections:

654135: OL 9 must audit all uses of the ssh-agent command.

Description: None

Levels:

Automated: yes

Selections:

654140: OL 9 must audit all uses of the ssh-keysign command.

Description: None

Levels:

Automated: yes

Selections:

654145: OL 9 must audit all uses of the su command.

Description: None

Levels:

Automated: yes

Selections:

654150: OL 9 must audit all uses of the sudo command.

Description: None

Levels:

Automated: yes

Selections:

654155: OL 9 must audit all uses of the sudoedit command.

Description: None

Levels:

Automated: yes

Selections:

654160: OL 9 must audit all uses of the unix_chkpwd command.

Description: None

Levels:

Automated: yes

Selections:

654165: OL 9 must audit all uses of the unix_update command.

Description: None

Levels:

Automated: yes

Selections:

654170: OL 9 must audit all uses of the userhelper command.

Description: None

Levels:

Automated: yes

Selections:

654175: OL 9 must audit all uses of the usermod command.

Description: None

Levels:

Automated: yes

Selections:

654180: OL 9 must audit all uses of the mount command.

Description: None

Levels:

Automated: yes

Selections:

654185: Successful/unsuccessful uses of the init command in OL 9 must generate an audit record.

Description: None

Levels:

Automated: yes

Selections:

654190: Successful/unsuccessful uses of the poweroff command in OL 9 must generate an audit record.

Description: None

Levels:

Automated: yes

Selections:

654195: Successful/unsuccessful uses of the reboot command in OL 9 must generate an audit record.

Description: None

Levels:

Automated: yes

Selections:

654200: Successful/unsuccessful uses of the shutdown command in OL 9 must generate an audit record.

Description: None

Levels:

Automated: yes

Selections:

654205: Successful/unsuccessful uses of the umount system call in OL 9 must generate an audit record.

Description: None

Levels:

Automated: yes

Selections:

654210: Successful/unsuccessful uses of the umount2 system call in OL 9 must generate an audit record.

Description: None

Levels:

Automated: yes

Selections:

654215: OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.

Description: None

Levels:

Automated: yes

Selections:

654220: OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.

Description: None

Levels:

Automated: yes

Selections:

654225: OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.

Description: None

Levels:

Automated: yes

Selections:

654230: OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.

Description: None

Levels:

Automated: yes

Selections:

654235: OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.

Description: None

Levels:

Automated: yes

Selections:

654240: OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.

Description: None

Levels:

Automated: yes

Selections:

654245: OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.

Description: None

Levels:

Automated: yes

Selections:

654250: OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/faillock.

Description: None

Levels:

Automated: yes

Selections:

654255: OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.

Description: None

Levels:

Automated: yes

Selections:

654260: OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/tallylog.

Description: None

Levels:

Automated: yes

Selections:

654265: OL 9 must take appropriate action when a critical audit processing failure occurs.

Description: None

Levels:

Automated: yes

Selections:

654270: OL 9 audit system must protect logon UIDs from unauthorized change.

Description: None

Levels:

Automated: yes

Selections:

654275: OL 9 audit system must protect auditing rules from unauthorized change.

Description: None

Levels:

Automated: yes

Selections:

671010: OL 9 must enable FIPS mode.

Description: None

Levels:

Automated: yes

Selections:

671015: OL 9 must employ FIPS 140-3 approved cryptographic hashing algorithms for all stored passwords.

Description: None

Levels:

Automated: yes

Selections:

671020: OL 9 IP tunnels must use FIPS 140-2/140-3 approved cryptographic algorithms.

Description: None

Levels:

Automated: yes

Selections:

671025: OL 9 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-3 approved cryptographic hashing algorithm for system authentication.

Description: None

Levels:

Automated: yes

Selections:

672010: OL 9 must have the crypto-policies package installed.

Description: None

Levels:

Automated: yes

Selections:

672015: OL 9 crypto policy files must match files shipped with the operating system.

Description: None

Levels:

Automated: no

No rules selected

672020: OL 9 crypto policy must not be overridden.

Description: None

Levels:

Automated: no

No rules selected

672025: OL 9 must use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.

Description: None

Levels:

Automated: yes

Selections:

672030: OL 9 must implement DOD-approved TLS encryption in the GnuTLS package.

Description: None

Levels:

Automated: yes

Selections:

672035: OL 9 must implement DOD-approved encryption in the OpenSSL package.

Description: None

Levels:

Automated: yes

Selections:

672040: OL 9 must implement DOD-approved TLS encryption in the OpenSSL package.

Description: None

Levels:

Automated: yes

Selections:

672045: OL 9 must implement a system-wide encryption policy.

Description: None

Levels:

Automated: yes

Selections:

672050: OL 9 must implement DOD-approved encryption in the bind package.

Description: None

Levels:

Automated: yes

Selections: