Definition of SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide for slmicro5

based on https://public.cyber.mil/stigs/downloads/

SLEM-05-211010: SLEM 5 must be a vendor-supported release.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-211015: SLEM 5 must implement an endpoint security tool.

Description: None

Levels:

Automated: no

No rules selected

SLEM-05-211020: SLEM 5 must display the Standard Mandatory DOD Notice and Consent Banner before granting any local or remote connection to the system.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-211025: SLEM 5 must disable the x86 Ctrl-Alt-Delete key sequence.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-212010: SLEM 5 with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-212015: SLEM 5 with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-213010: SLEM 5 must restrict access to the kernel message buffer.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-213015: SLEM 5 kernel core dumps must be disabled unless needed.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-213020: Address space layout randomization (ASLR) must be implemented by SLEM 5 to protect memory from unauthorized code execution.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-213025: SLEM 5 must implement kptr-restrict to prevent the leaking of internal kernel addresses.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-214010: Vendor-packaged SLEM 5 security patches and updates must be installed and up to date.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-214015: The SLEM 5 tool zypper must have gpgcheck enabled.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-214020: SLEM 5 must remove all outdated software components after updated versions have been installed.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-215010: SLEM 5 must use vlock to allow for session locking.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-215015: SLEM 5 must not have the telnet-server package installed.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-231010: A separate file system must be used for SLEM 5 user home directories (such as /home or an equivalent).

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-231015: SLEM 5 must use a separate file system for /var.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-231020: SLEM 5 must use a separate file system for the system audit data path.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-231025: SLEM 5 file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-231030: SLEM 5 file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-231035: SLEM 5 file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-231040: All SLEM 5 persistent disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-231045: SLEM 5 file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-231050: SLEM 5 must disable the file system automounter unless required.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232010: SLEM 5 must have directories that contain system commands set to a mode of 755 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232015: SLEM 5 must have system commands set to a mode of 755 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232020: SLEM 5 library directories must have mode 755 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232025: SLEM 5 library files must have mode 755 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232030: All SLEM 5 local interactive user home directories must have mode 750 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232035: All SLEM 5 local initialization files must have mode 740 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232040: SLEM 5 SSH daemon public host key files must have mode 644 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232045: SLEM 5 SSH daemon private host key files must have mode 640 or less permissive.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232050: SLEM 5 library files must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232055: SLEM 5 library files must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232060: SLEM 5 library directories must be owned by root.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232065: SLEM 5 library directories must be group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232070: SLEM 5 must have system commands owned by root.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232075: SLEM 5 must have system commands group-owned by root or a system account.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232080: SLEM 5 must have directories that contain system commands owned by root.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232085: SLEM 5 must have directories that contain system commands group-owned by root.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232090: All SLEM 5 files and directories must have a valid owner.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232095: All SLEM 5 files and directories must have a valid group owner.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232100: All SLEM 5 local interactive user home directories must be group-owned by the home directory owner's primary group.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232105: All SLEM 5 world-writable directories must be group-owned by root, sys, bin, or an application group.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232110: The sticky bit must be set on all SLEM 5 world-writable directories.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232115: SLEM 5 must prevent unauthorized users from accessing system error messages.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-232120: SLEM 5 must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-251010: SLEM 5 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-252010: SLEM 5 clock must, for networked systems, be synchronized to an authoritative DOD time source at least every 24 hours.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-252015: SLEM 5 must not have network interfaces in promiscuous mode unless approved and documented.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-253010: SLEM 5 must not forward Internet Protocol version 4 (IPv4) source-routed packets.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-253015: SLEM 5 must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-253020: SLEM 5 must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-253025: SLEM 5 must not allow interfaces to accept Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-253030: SLEM 5 must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-253035: SLEM 5 must not allow interfaces to send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-253040: SLEM 5 must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-253045: SLEM 5 must be configured to use TCP syncookies.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-254010: SLEM 5 must not forward Internet Protocol version 6 (IPv6) source-routed packets.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-254015: SLEM 5 must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-254020: SLEM 5 must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-254025: SLEM 5 must not allow interfaces to accept Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages by default.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-254030: SLEM 5 must not be performing Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-254035: SLEM 5 must not be performing Internet Protocol version 6 (IPv6) packet forwarding by default unless the system is a router.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255010: SLEM 5 must have SSH installed to protect the confidentiality and integrity of transmitted information.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255015: SLEM 5 must use SSH to protect the confidentiality and integrity of transmitted information.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255020: SLEM 5 must display the Standard Mandatory DOD Notice and Consent Banner before granting access via SSH.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255025: SLEM 5 must not allow unattended or automatic logon via SSH.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255030: SLEM 5 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255035: SLEM 5 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255040: SLEM 5 SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255045: SLEM 5 must implement DOD-approved encryption to protect the confidentiality of SSH remote connections.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255050: SLEM 5 SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2/140-3 approved cryptographic hash algorithms.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255055: SLEM 5 SSH server must be configured to use only FIPS 140-2/140-3 validated key exchange algorithms.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255060: SLEM 5 must deny direct logons to the root account using remote access via SSH.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255065: SLEM 5 must log SSH connection attempts and failures to the server.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255070: SLEM 5 must display the date and time of the last successful account logon upon an SSH logon.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255075: SLEM 5 SSH daemon must be configured to not allow authentication using known hosts authentication.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255080: SLEM 5 SSH daemon must perform strict mode checking of home directory configuration files.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255085: SLEM 5, for PKI-based authentication, must enforce authorized access to the corresponding private key.

Description: None

Levels:

Automated: no

Selections:

SLEM-05-255090: There must be no .shosts files on SLEM 5.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-255095: There must be no shosts.equiv files on SLEM 5.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-272010: SLEM 5 must not allow unattended or automatic logon via the graphical user interface (GUI).

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-291010: SLEM 5 wireless network adapters must be disabled unless approved and documented.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-291015: SLEM 5 must disable the USB mass storage kernel module.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411010: All SLEM 5 local interactive user accounts, upon creation, must be assigned a home directory.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411015: SLEM 5 default permissions must be defined in such a way that all authenticated users can only read and modify their own files.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411020: SLEM 5 shadow password suite must be configured to enforce a delay of at least five seconds between logon prompts following a failed logon attempt.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411025: All SLEM 5 local interactive users must have a home directory assigned in the /etc/passwd file.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411030: All SLEM 5 local interactive user home directories defined in the /etc/passwd file must exist.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411035: All SLEM 5 local interactive user initialization files executable search paths must contain only paths that resolve to the users' home directory.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411040: All SLEM 5 local initialization files must not execute world-writable programs.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411045: SLEM 5 must automatically expire temporary accounts within 72 hours.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411050: SLEM 5 must never automatically remove or disable emergency administrator accounts.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411055: SLEM 5 must not have unnecessary accounts.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411060: SLEM 5 must not have unnecessary account capabilities.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411065: SLEM 5 root account must be the only account with unrestricted access to the system.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411070: SLEM 5 must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity after password expiration.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-411075: SLEM 5 must not have duplicate User IDs (UIDs) for interactive users.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-412010: SLEM 5 must display the date and time of the last successful account logon upon logon.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-412015: SLEM 5 must initiate a session lock after a 15-minute period of inactivity.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-412020: SLEM 5 must lock an account after three consecutive invalid access attempts.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-412025: SLEM 5 must enforce a delay of at least five seconds between logon prompts following a failed logon attempt via pluggable authentication modules (PAM).

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-412030: SLEM 5 must use the default pam_tally2 tally directory.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-412035: SLEM 5 must limit the number of concurrent sessions to 10 for all accounts and/or account types.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-431010: SLEM 5 must have policycoreutils package installed.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-431015: SLEM 5 must use a Linux Security Module configured to enforce limits on system services.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-431020: SLEM 5 must enable the SELinux targeted policy.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-431025: SLEM 5 must prevent nonprivileged users from executing privileged functions, including disabling, circumventing, or altering implemented security safeguards/countermeasures.

Description: None

Levels:

Automated: no

Selections:

SLEM-05-432010: SLEM 5 must use the invoking user's password for privilege escalation when using "sudo".

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-432015: SLEM 5 must reauthenticate users when changing authenticators, roles, or escalating privileges.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-432020: SLEM 5 must require reauthentication when using the "sudo" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-432025: SLEM 5 must restrict privilege elevation to authorized personnel.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-432030: SLEM 5 must specify the default "include" directory for the /etc/sudoers file.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611010: SLEM 5 must enforce passwords that contain at least one uppercase character.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611015: SLEM 5 must enforce passwords that contain at least one lowercase character.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611020: SLEM 5 must enforce passwords that contain at least one numeric character.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611025: SLEM 5 must enforce passwords that contain at least one special character.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611030: SLEM 5 must prevent the use of dictionary words for passwords.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611035: SLEM 5 must employ passwords with a minimum of 15 characters.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611040: SLEM 5 must require the change of at least eight of the total number of characters when passwords are changed.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611045: SLEM 5 must not allow passwords to be reused for a minimum of five generations.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611050: SLEM 5 must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611055: SLEM 5 must not be configured to allow blank or null passwords.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611060: SLEM 5 must not have accounts configured with blank or null passwords.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611065: SLEM 5 must employ user passwords with a minimum lifetime of 24 hours (one day).

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611070: SLEM 5 must employ user passwords with a maximum lifetime of 60 days.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611075: SLEM 5 must employ a password history file.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611080: SLEM 5 must employ FIPS 140-2/140-3-approved cryptographic hashing algorithms for system authentication.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611085: SLEM 5 shadow password suite must be configured to use a sufficient number of hashing rounds.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611090: SLEM 5 must employ FIPS 140-2/140-3 approved cryptographic hashing algorithm for system authentication (login.defs).

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611095: SLEM 5 must be configured to create or update passwords with a minimum lifetime of 24 hours (one day).

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-611100: SLEM 5 must be configured to create or update passwords with a maximum lifetime of 60 days.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-612010: SLEM 5 must have the packages required for multifactor authentication to be installed.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-612015: SLEM 5 must implement multifactor authentication for access to privileged accounts via pluggable authentication modules (PAM).

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-612020: SLEM 5 must implement certificate status checking for multifactor authentication.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-631010: If Network Security Services (NSS) is being used by SLEM 5 it must prohibit the use of cached authentications after one day.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-631015: SLEM 5 must configure the Linux Pluggable Authentication Modules (PAM) to prohibit the use of cached offline authentications after one day.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-631020: SLEM 5, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-631025: SLEM 5 must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-651010: SLEM 5 must use a file integrity tool to verify correct operation of all security functions.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-651015: SLEM 5 file integrity tool must be configured to verify Access Control Lists (ACLs).

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-651020: SLEM 5 file integrity tool must be configured to verify extended attributes.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-651025: SLEM 5 file integrity tool must be configured to protect the integrity of the audit tools.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-651030: Advanced Intrusion Detection Environment (AIDE) must verify the baseline SLEM 5 configuration at least weekly.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-651035: SLEM 5 must notify the system administrator (SA) when Advanced Intrusion Detection Environment (AIDE) discovers anomalies in the operation of any security functions.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-652010: SLEM 5 must offload rsyslog messages for networked systems in real time and offload standalone systems at least weekly.

Description: None

Levels:

Automated: no

Selections:

SLEM-05-653010: SLEM 5 must have the auditing package installed.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-653015: SLEM 5 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-653020: The audit-audispd-plugins package must be installed on SLEM 5.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-653025: SLEM 5 must allocate audit record storage capacity to store at least one week of audit records when audit records are not immediately sent to a central audit record storage facility.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-653030: SLEM 5 auditd service must notify the system administrator (SA) and information system security officer (ISSO) immediately when audit storage capacity is 75 percent full.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-653035: SLEM 5 audit system must take appropriate action when the audit storage volume is full.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-653040: SLEM 5 must offload audit records onto a different system or media from the system being audited.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-653045: Audispd must take appropriate action when SLEM 5 audit storage is full.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-653050: SLEM 5 must protect audit rules from unauthorized modification.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-653055: SLEM 5 audit tools must have the proper permissions configured to protect against unauthorized access.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-653060: SLEM 5 audit tools must have the proper permissions applied to protect against unauthorized access.

Description: None

Levels:

Automated: no

No rules selected

SLEM-05-653065: SLEM 5 audit event multiplexor must be configured to use Kerberos.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-653070: Audispd must offload audit records onto a different system or media from SLEM 5 being audited.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-653075: The information system security officer (ISSO) and system administrator (SA), at a minimum, must have mail aliases to be notified of a SLEM 5 audit processing failure.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-653080: The information system security officer (ISSO) and system administrator (SA), at a minimum, must be alerted of a SLEM 5 audit processing failure event.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654010: SLEM 5 must generate audit records for all uses of the "chacl" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654015: SLEM 5 must generate audit records for all uses of the "chage" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654020: SLEM 5 must generate audit records for all uses of the "chcon" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654025: SLEM 5 must generate audit records for all uses of the "chfn" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654030: SLEM 5 must generate audit records for all uses of the "chmod" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654035: SLEM 5 must generate audit records for a uses of the "chsh" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654040: SLEM 5 must generate audit records for all uses of the "crontab" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654045: SLEM 5 must generate audit records for all uses of the "gpasswd" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654050: SLEM 5 must generate audit records for all uses of the "insmod" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654055: SLEM 5 must generate audit records for all uses of the "kmod" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654060: SLEM 5 must generate audit records for all uses of the "modprobe" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654065: SLEM 5 must generate audit records for all uses of the "newgrp" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654070: SLEM 5 must generate audit records for all uses of the "pam_timestamp_check" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654075: SLEM 5 must generate audit records for all uses of the "passwd" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654080: SLEM 5 must generate audit records for all uses of the "rm" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654085: SLEM 5 must generate audit records for all uses of the "rmmod" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654090: SLEM 5 must generate audit records for all uses of the "setfacl" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654095: SLEM 5 must generate audit records for all uses of the "ssh-agent" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654100: SLEM 5 must generate audit records for all uses of the "ssh-keysign" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654105: SLEM 5 must generate audit records for all uses of the "su" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654110: SLEM 5 must generate audit records for all uses of the "sudo" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654115: SLEM 5 must generate audit records for all uses of the "sudoedit" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654120: SLEM 5 must generate audit records for all uses of the "unix_chkpwd" or "unix2_chkpwd" commands.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654125: SLEM 5 must generate audit records for all uses of the "usermod" command.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654130: SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654135: SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654140: SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654145: SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654150: SLEM 5 must generate audit records for all uses of the "chmod", "fchmod" and "fchmodat" system calls.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654155: SLEM 5 must generate audit records for all uses of the "chown", "fchown", "fchownat", and "lchown" system calls.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654160: SLEM 5 must generate audit records for all uses of the "creat", "open", "openat", "open_by_handle_at", "truncate", and "ftruncate" system calls.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654165: SLEM 5 must generate audit records for all uses of the "delete_module" system call.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654170: SLEM 5 must generate audit records for all uses of the "init_module" and "finit_module" system calls.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654175: SLEM 5 must generate audit records for all uses of the "mount" system call.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654180: SLEM 5 must generate audit records for all uses of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654185: SLEM 5 must generate audit records for all uses of the "umount" system call.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654190: SLEM 5 must generate audit records for all uses of the "unlink", "unlinkat", "rename", "renameat", and "rmdir" system calls.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654195: SLEM 5 must generate audit records for all uses of privileged functions.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654200: SLEM 5 must generate audit records for all modifications to the "lastlog" file.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654205: SLEM 5 must generate audit records for all modifications to the "tallylog" file must generate an audit record.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654210: SLEM 5 must audit all uses of the sudoers file and all files in the "/etc/sudoers.d/" directory.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654215: Successful/unsuccessful uses of "setfiles" in SLEM 5 must generate an audit record.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654220: Successful/unsuccessful uses of "semanage" in SLEM 5 must generate an audit record.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654225: Successful/unsuccessful uses of "setsebool" in SLEM 5 must generate an audit record.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654230: SLEM 5 must generate audit records for the "/run/utmp file".

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654235: SLEM 5 must generate audit records for the "/var/log/btmp" file.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654240: SLEM 5 must generate audit records for the "/var/log/wtmp" file.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-654245: SLEM 5 must not disable syscall auditing.

Description: None

Levels:

Automated: yes

Selections:

SLEM-05-671010: FIPS 140-2/140-3 mode must be enabled on SLEM 5.

Description: None

Levels:

Automated: yes

Selections: