Rules in DISA STIG for AlmaLinux OS 9


Total Missing Implemented Coverage STIG ids missing rule
452 452 0 0.00% RHEL-09-171011 RHEL-09-211010 RHEL-09-211015 RHEL-09-211020 RHEL-09-211030 RHEL-09-211035 RHEL-09-211040 RHEL-09-211045 RHEL-09-211050 RHEL-09-211055 RHEL-09-212010 RHEL-09-212015 RHEL-09-212020 RHEL-09-212025 RHEL-09-212030 RHEL-09-212035 RHEL-09-212040 RHEL-09-212045 RHEL-09-212050 RHEL-09-212055 RHEL-09-213010 RHEL-09-213015 RHEL-09-213020 RHEL-09-213025 RHEL-09-213030 RHEL-09-213035 RHEL-09-213040 RHEL-09-213045 RHEL-09-213050 RHEL-09-213055 RHEL-09-213060 RHEL-09-213065 RHEL-09-213070 RHEL-09-213075 RHEL-09-213080 RHEL-09-213085 RHEL-09-213090 RHEL-09-213095 RHEL-09-213100 RHEL-09-213105 RHEL-09-213110 RHEL-09-213115 RHEL-09-214010 RHEL-09-214015 RHEL-09-214020 RHEL-09-214025 RHEL-09-214030 RHEL-09-214035 RHEL-09-215010 RHEL-09-215015 RHEL-09-215020 RHEL-09-215025 RHEL-09-215030 RHEL-09-215035 RHEL-09-215040 RHEL-09-215045 RHEL-09-215050 RHEL-09-215055 RHEL-09-215060 RHEL-09-215065 RHEL-09-215070 RHEL-09-215075 RHEL-09-215080 RHEL-09-215085 RHEL-09-215090 RHEL-09-215095 RHEL-09-215100 RHEL-09-215101 RHEL-09-215105 RHEL-09-231010 RHEL-09-231015 RHEL-09-231020 RHEL-09-231025 RHEL-09-231030 RHEL-09-231035 RHEL-09-231040 RHEL-09-231045 RHEL-09-231050 RHEL-09-231055 RHEL-09-231065 RHEL-09-231070 RHEL-09-231075 RHEL-09-231080 RHEL-09-231085 RHEL-09-231090 RHEL-09-231095 RHEL-09-231100 RHEL-09-231105 RHEL-09-231110 RHEL-09-231115 RHEL-09-231120 RHEL-09-231125 RHEL-09-231130 RHEL-09-231135 RHEL-09-231140 RHEL-09-231145 RHEL-09-231150 RHEL-09-231155 RHEL-09-231160 RHEL-09-231165 RHEL-09-231170 RHEL-09-231175 RHEL-09-231180 RHEL-09-231185 RHEL-09-231190 RHEL-09-231195 RHEL-09-231200 RHEL-09-232010 RHEL-09-232015 RHEL-09-232020 RHEL-09-232025 RHEL-09-232030 RHEL-09-232035 RHEL-09-232040 RHEL-09-232045 RHEL-09-232050 RHEL-09-232055 RHEL-09-232060 RHEL-09-232065 RHEL-09-232070 RHEL-09-232075 RHEL-09-232080 RHEL-09-232085 RHEL-09-232090 RHEL-09-232095 RHEL-09-232100 RHEL-09-232103 RHEL-09-232104 RHEL-09-232105 RHEL-09-232110 RHEL-09-232115 RHEL-09-232120 RHEL-09-232125 RHEL-09-232130 RHEL-09-232135 RHEL-09-232140 RHEL-09-232145 RHEL-09-232150 RHEL-09-232155 RHEL-09-232160 RHEL-09-232165 RHEL-09-232170 RHEL-09-232175 RHEL-09-232180 RHEL-09-232185 RHEL-09-232190 RHEL-09-232195 RHEL-09-232200 RHEL-09-232205 RHEL-09-232210 RHEL-09-232215 RHEL-09-232220 RHEL-09-232225 RHEL-09-232230 RHEL-09-232235 RHEL-09-232240 RHEL-09-232245 RHEL-09-232250 RHEL-09-232255 RHEL-09-232260 RHEL-09-232270 RHEL-09-251010 RHEL-09-251015 RHEL-09-251020 RHEL-09-251030 RHEL-09-251035 RHEL-09-251040 RHEL-09-251045 RHEL-09-252010 RHEL-09-252015 RHEL-09-252020 RHEL-09-252025 RHEL-09-252030 RHEL-09-252035 RHEL-09-252040 RHEL-09-252045 RHEL-09-252050 RHEL-09-252060 RHEL-09-252065 RHEL-09-252070 RHEL-09-252075 RHEL-09-253010 RHEL-09-253015 RHEL-09-253020 RHEL-09-253025 RHEL-09-253030 RHEL-09-253035 RHEL-09-253040 RHEL-09-253045 RHEL-09-253050 RHEL-09-253055 RHEL-09-253060 RHEL-09-253065 RHEL-09-253070 RHEL-09-253075 RHEL-09-254010 RHEL-09-254015 RHEL-09-254020 RHEL-09-254025 RHEL-09-254030 RHEL-09-254035 RHEL-09-254040 RHEL-09-255010 RHEL-09-255015 RHEL-09-255020 RHEL-09-255025 RHEL-09-255030 RHEL-09-255035 RHEL-09-255040 RHEL-09-255045 RHEL-09-255050 RHEL-09-255055 RHEL-09-255060 RHEL-09-255064 RHEL-09-255065 RHEL-09-255070 RHEL-09-255075 RHEL-09-255080 RHEL-09-255085 RHEL-09-255090 RHEL-09-255095 RHEL-09-255100 RHEL-09-255105 RHEL-09-255110 RHEL-09-255115 RHEL-09-255120 RHEL-09-255125 RHEL-09-255130 RHEL-09-255135 RHEL-09-255140 RHEL-09-255145 RHEL-09-255150 RHEL-09-255155 RHEL-09-255160 RHEL-09-255165 RHEL-09-255175 RHEL-09-271010 RHEL-09-271015 RHEL-09-271020 RHEL-09-271025 RHEL-09-271030 RHEL-09-271035 RHEL-09-271040 RHEL-09-271045 RHEL-09-271050 RHEL-09-271055 RHEL-09-271060 RHEL-09-271065 RHEL-09-271070 RHEL-09-271075 RHEL-09-271080 RHEL-09-271085 RHEL-09-271090 RHEL-09-271095 RHEL-09-271100 RHEL-09-271105 RHEL-09-271110 RHEL-09-271115 RHEL-09-291010 RHEL-09-291015 RHEL-09-291020 RHEL-09-291025 RHEL-09-291030 RHEL-09-291035 RHEL-09-291040 RHEL-09-411010 RHEL-09-411015 RHEL-09-411020 RHEL-09-411025 RHEL-09-411030 RHEL-09-411035 RHEL-09-411040 RHEL-09-411045 RHEL-09-411050 RHEL-09-411055 RHEL-09-411060 RHEL-09-411065 RHEL-09-411070 RHEL-09-411075 RHEL-09-411080 RHEL-09-411085 RHEL-09-411090 RHEL-09-411095 RHEL-09-411100 RHEL-09-411105 RHEL-09-411110 RHEL-09-411115 RHEL-09-412035 RHEL-09-412040 RHEL-09-412045 RHEL-09-412050 RHEL-09-412055 RHEL-09-412060 RHEL-09-412065 RHEL-09-412070 RHEL-09-412075 RHEL-09-412080 RHEL-09-431010 RHEL-09-431015 RHEL-09-431016 RHEL-09-431020 RHEL-09-431025 RHEL-09-431030 RHEL-09-432010 RHEL-09-432015 RHEL-09-432020 RHEL-09-432025 RHEL-09-432030 RHEL-09-432035 RHEL-09-433010 RHEL-09-433015 RHEL-09-433016 RHEL-09-611010 RHEL-09-611025 RHEL-09-611030 RHEL-09-611035 RHEL-09-611040 RHEL-09-611045 RHEL-09-611050 RHEL-09-611055 RHEL-09-611060 RHEL-09-611065 RHEL-09-611070 RHEL-09-611075 RHEL-09-611080 RHEL-09-611085 RHEL-09-611090 RHEL-09-611100 RHEL-09-611105 RHEL-09-611110 RHEL-09-611115 RHEL-09-611120 RHEL-09-611125 RHEL-09-611130 RHEL-09-611135 RHEL-09-611140 RHEL-09-611145 RHEL-09-611155 RHEL-09-611160 RHEL-09-611165 RHEL-09-611170 RHEL-09-611175 RHEL-09-611180 RHEL-09-611185 RHEL-09-611190 RHEL-09-611195 RHEL-09-611200 RHEL-09-631010 RHEL-09-631015 RHEL-09-631020 RHEL-09-651010 RHEL-09-651015 RHEL-09-651020 RHEL-09-651025 RHEL-09-651030 RHEL-09-651035 RHEL-09-652010 RHEL-09-652015 RHEL-09-652020 RHEL-09-652025 RHEL-09-652030 RHEL-09-652040 RHEL-09-652045 RHEL-09-652050 RHEL-09-652055 RHEL-09-652060 RHEL-09-653010 RHEL-09-653015 RHEL-09-653020 RHEL-09-653025 RHEL-09-653030 RHEL-09-653035 RHEL-09-653040 RHEL-09-653045 RHEL-09-653050 RHEL-09-653055 RHEL-09-653060 RHEL-09-653065 RHEL-09-653070 RHEL-09-653075 RHEL-09-653080 RHEL-09-653085 RHEL-09-653090 RHEL-09-653095 RHEL-09-653100 RHEL-09-653105 RHEL-09-653110 RHEL-09-653115 RHEL-09-653120 RHEL-09-653125 RHEL-09-653130 RHEL-09-654010 RHEL-09-654015 RHEL-09-654020 RHEL-09-654025 RHEL-09-654030 RHEL-09-654035 RHEL-09-654040 RHEL-09-654045 RHEL-09-654050 RHEL-09-654055 RHEL-09-654060 RHEL-09-654065 RHEL-09-654070 RHEL-09-654075 RHEL-09-654080 RHEL-09-654085 RHEL-09-654090 RHEL-09-654095 RHEL-09-654100 RHEL-09-654105 RHEL-09-654110 RHEL-09-654115 RHEL-09-654120 RHEL-09-654125 RHEL-09-654130 RHEL-09-654135 RHEL-09-654140 RHEL-09-654145 RHEL-09-654150 RHEL-09-654155 RHEL-09-654160 RHEL-09-654165 RHEL-09-654170 RHEL-09-654175 RHEL-09-654180 RHEL-09-654185 RHEL-09-654190 RHEL-09-654195 RHEL-09-654200 RHEL-09-654205 RHEL-09-654210 RHEL-09-654215 RHEL-09-654220 RHEL-09-654225 RHEL-09-654230 RHEL-09-654235 RHEL-09-654240 RHEL-09-654245 RHEL-09-654250 RHEL-09-654255 RHEL-09-654260 RHEL-09-654265 RHEL-09-654270 RHEL-09-654275 RHEL-09-671010 RHEL-09-671015 RHEL-09-671020 RHEL-09-671025 RHEL-09-672020 RHEL-09-672025 RHEL-09-672050
V-ID CCI CAT Title SRG Description Check Procedures Fixtext Version Mapped Rule
V-270174 medium RHEL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon. SRG-OS-ID
RHEL-09-171011 Missing Rule
V-257777 high RHEL 9 must be a vendor-supported release. SRG-OS-ID
RHEL-09-211010 Missing Rule
V-257778 medium RHEL 9 vendor packaged system security patches and updates must be installed and up to date. SRG-OS-ID
RHEL-09-211015 Missing Rule
V-257779 medium RHEL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a command line user logon. SRG-OS-ID
RHEL-09-211020 Missing Rule
V-257781 medium The graphical display manager must not be the default target on RHEL 9 unless approved. SRG-OS-ID
RHEL-09-211030 Missing Rule
V-257782 low RHEL 9 must enable the hardware random number generator entropy gatherer service. SRG-OS-ID
RHEL-09-211035 Missing Rule
V-257783 medium RHEL 9 systemd-journald service must be enabled. SRG-OS-ID
RHEL-09-211040 Missing Rule
V-257784 high The systemd Ctrl-Alt-Delete burst key sequence in RHEL 9 must be disabled. SRG-OS-ID
RHEL-09-211045 Missing Rule
V-257785 high The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 9. SRG-OS-ID
RHEL-09-211050 Missing Rule
V-257786 medium RHEL 9 debug-shell systemd service must be disabled. SRG-OS-ID
RHEL-09-211055 Missing Rule
V-257787 medium RHEL 9 must require a boot loader superuser password. SRG-OS-ID
RHEL-09-212010 Missing Rule
V-257788 medium RHEL 9 must disable the ability of systemd to spawn an interactive boot process. SRG-OS-ID
RHEL-09-212015 Missing Rule
V-257789 high RHEL 9 must require a unique superusers name upon booting into single-user and maintenance modes. SRG-OS-ID
RHEL-09-212020 Missing Rule
V-257790 medium RHEL 9 /boot/grub2/grub.cfg file must be group-owned by root. SRG-OS-ID
RHEL-09-212025 Missing Rule
V-257791 medium RHEL 9 /boot/grub2/grub.cfg file must be owned by root. SRG-OS-ID
RHEL-09-212030 Missing Rule
V-257792 medium RHEL 9 must disable virtual system calls. SRG-OS-ID
RHEL-09-212035 Missing Rule
V-257793 medium RHEL 9 must clear the page allocator to prevent use-after-free attacks. SRG-OS-ID
RHEL-09-212040 Missing Rule
V-257794 medium RHEL 9 must clear memory when it is freed to prevent use-after-free attacks. SRG-OS-ID
RHEL-09-212045 Missing Rule
V-257795 low RHEL 9 must enable mitigations against processor-based vulnerabilities. SRG-OS-ID
RHEL-09-212050 Missing Rule
V-257796 low RHEL 9 must enable auditing of processes that start prior to the audit daemon. SRG-OS-ID
RHEL-09-212055 Missing Rule
V-257797 medium RHEL 9 must restrict access to the kernel message buffer. SRG-OS-ID
RHEL-09-213010 Missing Rule
V-257798 medium RHEL 9 must prevent kernel profiling by nonprivileged users. SRG-OS-ID
RHEL-09-213015 Missing Rule
V-257799 medium RHEL 9 must prevent the loading of a new kernel for later execution. SRG-OS-ID
RHEL-09-213020 Missing Rule
V-257800 medium RHEL 9 must restrict exposed kernel pointer addresses access. SRG-OS-ID
RHEL-09-213025 Missing Rule
V-257801 medium RHEL 9 must enable kernel parameters to enforce discretionary access control on hardlinks. SRG-OS-ID
RHEL-09-213030 Missing Rule
V-257802 medium RHEL 9 must enable kernel parameters to enforce discretionary access control on symlinks. SRG-OS-ID
RHEL-09-213035 Missing Rule
V-257803 medium RHEL 9 must disable the kernel.core_pattern. SRG-OS-ID
RHEL-09-213040 Missing Rule
V-257804 medium RHEL 9 must be configured to disable the Asynchronous Transfer Mode kernel module. SRG-OS-ID
RHEL-09-213045 Missing Rule
V-257805 medium RHEL 9 must be configured to disable the Controller Area Network kernel module. SRG-OS-ID
RHEL-09-213050 Missing Rule
V-257806 medium RHEL 9 must be configured to disable the FireWire kernel module. SRG-OS-ID
RHEL-09-213055 Missing Rule
V-257807 medium RHEL 9 must disable the Stream Control Transmission Protocol (SCTP) kernel module. SRG-OS-ID
RHEL-09-213060 Missing Rule
V-257808 medium RHEL 9 must disable the Transparent Inter Process Communication (TIPC) kernel module. SRG-OS-ID
RHEL-09-213065 Missing Rule
V-257809 medium RHEL 9 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution. SRG-OS-ID
RHEL-09-213070 Missing Rule
V-257810 medium RHEL 9 must disable access to network bpf system call from nonprivileged processes. SRG-OS-ID
RHEL-09-213075 Missing Rule
V-257811 medium RHEL 9 must restrict usage of ptrace to descendant processes. SRG-OS-ID
RHEL-09-213080 Missing Rule
V-257812 medium RHEL 9 must disable core dump backtraces. SRG-OS-ID
RHEL-09-213085 Missing Rule
V-257813 medium RHEL 9 must disable storing core dumps. SRG-OS-ID
RHEL-09-213090 Missing Rule
V-257814 medium RHEL 9 must disable core dumps for all users. SRG-OS-ID
RHEL-09-213095 Missing Rule
V-257815 medium RHEL 9 must disable acquiring, saving, and processing core dumps. SRG-OS-ID
RHEL-09-213100 Missing Rule
V-257816 medium RHEL 9 must disable the use of user namespaces. SRG-OS-ID
RHEL-09-213105 Missing Rule
V-257817 medium RHEL 9 must implement nonexecutable data to protect its memory from unauthorized code execution. SRG-OS-ID
RHEL-09-213110 Missing Rule
V-257818 medium The kdump service on RHEL 9 must be disabled. SRG-OS-ID
RHEL-09-213115 Missing Rule
V-257819 medium RHEL 9 must ensure cryptographic verification of vendor software packages. SRG-OS-ID
RHEL-09-214010 Missing Rule
V-257820 high RHEL 9 must check the GPG signature of software packages originating from external software repositories before installation. SRG-OS-ID
RHEL-09-214015 Missing Rule
V-257821 high RHEL 9 must check the GPG signature of locally installed software packages before installation. SRG-OS-ID
RHEL-09-214020 Missing Rule
V-257822 high RHEL 9 must have GPG signature verification enabled for all software repositories. SRG-OS-ID
RHEL-09-214025 Missing Rule
V-257823 medium RHEL 9 must be configured so that the cryptographic hashes of system files match vendor values. SRG-OS-ID
RHEL-09-214030 Missing Rule
V-257824 low RHEL 9 must remove all software components after updated versions have been installed. SRG-OS-ID
RHEL-09-214035 Missing Rule
V-257825 medium RHEL 9 subscription-manager package must be installed. SRG-OS-ID
RHEL-09-215010 Missing Rule
V-257826 high RHEL 9 must not have a File Transfer Protocol (FTP) server package installed. SRG-OS-ID
RHEL-09-215015 Missing Rule
V-257827 medium RHEL 9 must not have the sendmail package installed. SRG-OS-ID
RHEL-09-215020 Missing Rule
V-257828 medium RHEL 9 must not have the nfs-utils package installed. SRG-OS-ID
RHEL-09-215025 Missing Rule
V-257829 medium RHEL 9 must not have the ypserv package installed. SRG-OS-ID
RHEL-09-215030 Missing Rule
V-257830 medium RHEL 9 must not have the rsh-server package installed. SRG-OS-ID
RHEL-09-215035 Missing Rule
V-257831 medium RHEL 9 must not have the telnet-server package installed. SRG-OS-ID
RHEL-09-215040 Missing Rule
V-257832 medium RHEL 9 must not have the gssproxy package installed. SRG-OS-ID
RHEL-09-215045 Missing Rule
V-257833 medium RHEL 9 must not have the iprutils package installed. SRG-OS-ID
RHEL-09-215050 Missing Rule
V-257834 medium RHEL 9 must not have the tuned package installed. SRG-OS-ID
RHEL-09-215055 Missing Rule
V-257835 high RHEL 9 must not have a Trivial File Transfer Protocol (TFTP) server package installed. SRG-OS-ID
RHEL-09-215060 Missing Rule
V-257836 medium RHEL 9 must not have the quagga package installed. SRG-OS-ID
RHEL-09-215065 Missing Rule
V-257837 medium A graphical display manager must not be installed on RHEL 9 unless approved. SRG-OS-ID
RHEL-09-215070 Missing Rule
V-257838 medium RHEL 9 must have the openssl-pkcs11 package installed. SRG-OS-ID
RHEL-09-215075 Missing Rule
V-257839 medium RHEL 9 must have the gnutls-utils package installed. SRG-OS-ID
RHEL-09-215080 Missing Rule
V-257840 medium RHEL 9 must have the nss-tools package installed. SRG-OS-ID
RHEL-09-215085 Missing Rule
V-257841 medium RHEL 9 must have the rng-tools package installed. SRG-OS-ID
RHEL-09-215090 Missing Rule
V-257842 medium RHEL 9 must have the s-nail package installed. SRG-OS-ID
RHEL-09-215095 Missing Rule
V-258234 medium RHEL 9 must have the crypto-policies package installed. SRG-OS-ID
RHEL-09-215100 Missing Rule
V-272488 medium RHEL 9 must have the Postfix package installed. SRG-OS-ID
RHEL-09-215101 Missing Rule
V-258241 medium RHEL 9 must implement a FIPS 140-3 compliant systemwide cryptographic policy. SRG-OS-ID
RHEL-09-215105 Missing Rule
V-257843 medium A separate RHEL 9 file system must be used for user home directories (such as /home or an equivalent). SRG-OS-ID
RHEL-09-231010 Missing Rule
V-257844 medium RHEL 9 must use a separate file system for /tmp. SRG-OS-ID
RHEL-09-231015 Missing Rule
V-257845 low RHEL 9 must use a separate file system for /var. SRG-OS-ID
RHEL-09-231020 Missing Rule
V-257846 low RHEL 9 must use a separate file system for /var/log. SRG-OS-ID
RHEL-09-231025 Missing Rule
V-257847 low RHEL 9 must use a separate file system for the system audit data path. SRG-OS-ID
RHEL-09-231030 Missing Rule
V-257848 medium RHEL 9 must use a separate file system for /var/tmp. SRG-OS-ID
RHEL-09-231035 Missing Rule
V-257849 medium RHEL 9 file system automount function must be disabled unless required. SRG-OS-ID
RHEL-09-231040 Missing Rule
V-257850 medium RHEL 9 must prevent device files from being interpreted on file systems that contain user home directories. SRG-OS-ID
RHEL-09-231045 Missing Rule
V-257851 medium RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories. SRG-OS-ID
RHEL-09-231050 Missing Rule
V-257852 medium RHEL 9 must prevent code from being executed on file systems that contain user home directories. SRG-OS-ID
RHEL-09-231055 Missing Rule
V-257854 medium RHEL 9 must prevent special devices on file systems that are imported via Network File System (NFS). SRG-OS-ID
RHEL-09-231065 Missing Rule
V-257855 medium RHEL 9 must prevent code from being executed on file systems that are imported via Network File System (NFS). SRG-OS-ID
RHEL-09-231070 Missing Rule
V-257856 medium RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS). SRG-OS-ID
RHEL-09-231075 Missing Rule
V-257857 medium RHEL 9 must prevent code from being executed on file systems that are used with removable media. SRG-OS-ID
RHEL-09-231080 Missing Rule
V-257858 medium RHEL 9 must prevent special devices on file systems that are used with removable media. SRG-OS-ID
RHEL-09-231085 Missing Rule
V-257859 medium RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media. SRG-OS-ID
RHEL-09-231090 Missing Rule
V-257860 medium RHEL 9 must mount /boot with the nodev option. SRG-OS-ID
RHEL-09-231095 Missing Rule
V-257861 medium RHEL 9 must prevent files with the setuid and setgid bit set from being executed on the /boot directory. SRG-OS-ID
RHEL-09-231100 Missing Rule
V-257862 medium RHEL 9 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory. SRG-OS-ID
RHEL-09-231105 Missing Rule
V-257863 medium RHEL 9 must mount /dev/shm with the nodev option. SRG-OS-ID
RHEL-09-231110 Missing Rule
V-257864 medium RHEL 9 must mount /dev/shm with the noexec option. SRG-OS-ID
RHEL-09-231115 Missing Rule
V-257865 medium RHEL 9 must mount /dev/shm with the nosuid option. SRG-OS-ID
RHEL-09-231120 Missing Rule
V-257866 medium RHEL 9 must mount /tmp with the nodev option. SRG-OS-ID
RHEL-09-231125 Missing Rule
V-257867 medium RHEL 9 must mount /tmp with the noexec option. SRG-OS-ID
RHEL-09-231130 Missing Rule
V-257868 medium RHEL 9 must mount /tmp with the nosuid option. SRG-OS-ID
RHEL-09-231135 Missing Rule
V-257869 medium RHEL 9 must mount /var with the nodev option. SRG-OS-ID
RHEL-09-231140 Missing Rule
V-257870 medium RHEL 9 must mount /var/log with the nodev option. SRG-OS-ID
RHEL-09-231145 Missing Rule
V-257871 medium RHEL 9 must mount /var/log with the noexec option. SRG-OS-ID
RHEL-09-231150 Missing Rule
V-257872 medium RHEL 9 must mount /var/log with the nosuid option. SRG-OS-ID
RHEL-09-231155 Missing Rule
V-257873 medium RHEL 9 must mount /var/log/audit with the nodev option. SRG-OS-ID
RHEL-09-231160 Missing Rule
V-257874 medium RHEL 9 must mount /var/log/audit with the noexec option. SRG-OS-ID
RHEL-09-231165 Missing Rule
V-257875 medium RHEL 9 must mount /var/log/audit with the nosuid option. SRG-OS-ID
RHEL-09-231170 Missing Rule
V-257876 medium RHEL 9 must mount /var/tmp with the nodev option. SRG-OS-ID
RHEL-09-231175 Missing Rule
V-257877 medium RHEL 9 must mount /var/tmp with the noexec option. SRG-OS-ID
RHEL-09-231180 Missing Rule
V-257878 medium RHEL 9 must mount /var/tmp with the nosuid option. SRG-OS-ID
RHEL-09-231185 Missing Rule
V-257879 high RHEL 9 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection. SRG-OS-ID
RHEL-09-231190 Missing Rule
V-257880 low RHEL 9 must disable mounting of cramfs. SRG-OS-ID
RHEL-09-231195 Missing Rule
V-257881 medium RHEL 9 must prevent special devices on non-root local partitions. SRG-OS-ID
RHEL-09-231200 Missing Rule
V-257882 medium RHEL 9 system commands must have mode 755 or less permissive. SRG-OS-ID
RHEL-09-232010 Missing Rule
V-257883 medium RHEL 9 library directories must have mode 755 or less permissive. SRG-OS-ID
RHEL-09-232015 Missing Rule
V-257884 medium RHEL 9 library files must have mode 755 or less permissive. SRG-OS-ID
RHEL-09-232020 Missing Rule
V-257885 medium RHEL 9 /var/log directory must have mode 0755 or less permissive. SRG-OS-ID
RHEL-09-232025 Missing Rule
V-257886 medium RHEL 9 /var/log/messages file must have mode 0640 or less permissive. SRG-OS-ID
RHEL-09-232030 Missing Rule
V-257887 medium RHEL 9 audit tools must have a mode of 0755 or less permissive. SRG-OS-ID
RHEL-09-232035 Missing Rule
V-257888 medium RHEL 9 permissions of cron configuration files and directories must not be modified from the operating system defaults. SRG-OS-ID
RHEL-09-232040 Missing Rule
V-257889 medium All RHEL 9 local initialization files must have mode 0740 or less permissive. SRG-OS-ID
RHEL-09-232045 Missing Rule
V-257890 medium All RHEL 9 local interactive user home directories must have mode 0750 or less permissive. SRG-OS-ID
RHEL-09-232050 Missing Rule
V-257891 medium RHEL 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access. SRG-OS-ID
RHEL-09-232055 Missing Rule
V-257892 medium RHEL 9 /etc/group- file must have mode 0644 or less permissive to prevent unauthorized access. SRG-OS-ID
RHEL-09-232060 Missing Rule
V-257893 medium RHEL 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access. SRG-OS-ID
RHEL-09-232065 Missing Rule
V-257894 medium RHEL 9 /etc/gshadow- file must have mode 0000 or less permissive to prevent unauthorized access. SRG-OS-ID
RHEL-09-232070 Missing Rule
V-257895 medium RHEL 9 /etc/passwd file must have mode 0644 or less permissive to prevent unauthorized access. SRG-OS-ID
RHEL-09-232075 Missing Rule
V-257896 medium RHEL 9 /etc/passwd- file must have mode 0644 or less permissive to prevent unauthorized access. SRG-OS-ID
RHEL-09-232080 Missing Rule
V-257897 medium RHEL 9 /etc/shadow- file must have mode 0000 or less permissive to prevent unauthorized access. SRG-OS-ID
RHEL-09-232085 Missing Rule
V-257898 medium RHEL 9 /etc/group file must be owned by root. SRG-OS-ID
RHEL-09-232090 Missing Rule
V-257899 medium RHEL 9 /etc/group file must be group-owned by root. SRG-OS-ID
RHEL-09-232095 Missing Rule
V-257900 medium RHEL 9 /etc/group- file must be owned by root. SRG-OS-ID
RHEL-09-232100 Missing Rule
V-270175 medium RHEL 9 "/etc/audit/" must be owned by root. SRG-OS-ID
RHEL-09-232103 Missing Rule
V-270176 medium RHEL 9 "/etc/audit/" must be group-owned by root. SRG-OS-ID
RHEL-09-232104 Missing Rule
V-257901 medium RHEL 9 /etc/group- file must be group-owned by root. SRG-OS-ID
RHEL-09-232105 Missing Rule
V-257902 medium RHEL 9 /etc/gshadow file must be owned by root. SRG-OS-ID
RHEL-09-232110 Missing Rule
V-257903 medium RHEL 9 /etc/gshadow file must be group-owned by root. SRG-OS-ID
RHEL-09-232115 Missing Rule
V-257904 medium RHEL 9 /etc/gshadow- file must be owned by root. SRG-OS-ID
RHEL-09-232120 Missing Rule
V-257905 medium RHEL 9 /etc/gshadow- file must be group-owned by root. SRG-OS-ID
RHEL-09-232125 Missing Rule
V-257906 medium RHEL 9 /etc/passwd file must be owned by root. SRG-OS-ID
RHEL-09-232130 Missing Rule
V-257907 medium RHEL 9 /etc/passwd file must be group-owned by root. SRG-OS-ID
RHEL-09-232135 Missing Rule
V-257908 medium RHEL 9 /etc/passwd- file must be owned by root. SRG-OS-ID
RHEL-09-232140 Missing Rule
V-257909 medium RHEL 9 /etc/passwd- file must be group-owned by root. SRG-OS-ID
RHEL-09-232145 Missing Rule
V-257910 medium RHEL 9 /etc/shadow file must be owned by root. SRG-OS-ID
RHEL-09-232150 Missing Rule
V-257911 medium RHEL 9 /etc/shadow file must be group-owned by root. SRG-OS-ID
RHEL-09-232155 Missing Rule
V-257912 medium RHEL 9 /etc/shadow- file must be owned by root. SRG-OS-ID
RHEL-09-232160 Missing Rule
V-257913 medium RHEL 9 /etc/shadow- file must be group-owned by root. SRG-OS-ID
RHEL-09-232165 Missing Rule
V-257914 medium RHEL 9 /var/log directory must be owned by root. SRG-OS-ID
RHEL-09-232170 Missing Rule
V-257915 medium RHEL 9 /var/log directory must be group-owned by root. SRG-OS-ID
RHEL-09-232175 Missing Rule
V-257916 medium RHEL 9 /var/log/messages file must be owned by root. SRG-OS-ID
RHEL-09-232180 Missing Rule
V-257917 medium RHEL 9 /var/log/messages file must be group-owned by root. SRG-OS-ID
RHEL-09-232185 Missing Rule
V-257918 medium RHEL 9 system commands must be owned by root. SRG-OS-ID
RHEL-09-232190 Missing Rule
V-257919 medium RHEL 9 system commands must be group-owned by root or a system account. SRG-OS-ID
RHEL-09-232195 Missing Rule
V-257920 medium RHEL 9 library files must be owned by root. SRG-OS-ID
RHEL-09-232200 Missing Rule
V-257921 medium RHEL 9 library files must be group-owned by root or a system account. SRG-OS-ID
RHEL-09-232205 Missing Rule
V-257922 medium RHEL 9 library directories must be owned by root. SRG-OS-ID
RHEL-09-232210 Missing Rule
V-257923 medium RHEL 9 library directories must be group-owned by root or a system account. SRG-OS-ID
RHEL-09-232215 Missing Rule
V-257924 medium RHEL 9 audit tools must be owned by root. SRG-OS-ID
RHEL-09-232220 Missing Rule
V-257925 medium RHEL 9 audit tools must be group-owned by root. SRG-OS-ID
RHEL-09-232225 Missing Rule
V-257926 medium RHEL 9 cron configuration files directory must be owned by root. SRG-OS-ID
RHEL-09-232230 Missing Rule
V-257927 medium RHEL 9 cron configuration files directory must be group-owned by root. SRG-OS-ID
RHEL-09-232235 Missing Rule
V-257928 medium All RHEL 9 world-writable directories must be owned by root, sys, bin, or an application user. SRG-OS-ID
RHEL-09-232240 Missing Rule
V-257929 medium A sticky bit must be set on all RHEL 9 public directories. SRG-OS-ID
RHEL-09-232245 Missing Rule
V-257930 medium All RHEL 9 local files and directories must have a valid group owner. SRG-OS-ID
RHEL-09-232250 Missing Rule
V-257931 medium All RHEL 9 local files and directories must have a valid owner. SRG-OS-ID
RHEL-09-232255 Missing Rule
V-257932 medium RHEL 9 must be configured so that all system device files are correctly labeled to prevent unauthorized modification. SRG-OS-ID
RHEL-09-232260 Missing Rule
V-257934 medium RHEL 9 /etc/shadow file must have mode 0000 to prevent unauthorized access. SRG-OS-ID
RHEL-09-232270 Missing Rule
V-257935 medium RHEL 9 must have the firewalld package installed. SRG-OS-ID
RHEL-09-251010 Missing Rule
V-257936 medium The firewalld service on RHEL 9 must be active. SRG-OS-ID
RHEL-09-251015 Missing Rule
V-257937 medium A RHEL 9 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems. SRG-OS-ID
RHEL-09-251020 Missing Rule
V-257939 medium RHEL 9 must protect against or limit the effects of denial-of-service (DoS) attacks by ensuring rate-limiting measures on impacted network interfaces are implemented. SRG-OS-ID
RHEL-09-251030 Missing Rule
V-257940 medium RHEL 9 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments. SRG-OS-ID
RHEL-09-251035 Missing Rule
V-257941 medium RHEL 9 network interfaces must not be in promiscuous mode. SRG-OS-ID
RHEL-09-251040 Missing Rule
V-257942 medium RHEL 9 must enable hardening for the Berkeley Packet Filter just-in-time compiler. SRG-OS-ID
RHEL-09-251045 Missing Rule
V-257943 medium RHEL 9 must have the chrony package installed. SRG-OS-ID
RHEL-09-252010 Missing Rule
V-257944 medium RHEL 9 chronyd service must be enabled. SRG-OS-ID
RHEL-09-252015 Missing Rule
V-257945 medium RHEL 9 must securely compare internal information system clocks at least every 24 hours. SRG-OS-ID
RHEL-09-252020 Missing Rule
V-257946 low RHEL 9 must disable the chrony daemon from acting as a server. SRG-OS-ID
RHEL-09-252025 Missing Rule
V-257947 low RHEL 9 must disable network management of the chrony daemon. SRG-OS-ID
RHEL-09-252030 Missing Rule
V-257948 medium RHEL 9 systems using Domain Name Servers (DNS) resolution must have at least two name servers configured. SRG-OS-ID
RHEL-09-252035 Missing Rule
V-257949 medium RHEL 9 must configure a DNS processing mode in Network Manager. SRG-OS-ID
RHEL-09-252040 Missing Rule
V-257950 medium RHEL 9 must not have unauthorized IP tunnels configured. SRG-OS-ID
RHEL-09-252045 Missing Rule
V-257951 medium RHEL 9 must be configured to prevent unrestricted mail relaying. SRG-OS-ID
RHEL-09-252050 Missing Rule
V-257953 medium RHEL 9 must forward mail from postmaster to the root account using a postfix alias. SRG-OS-ID
RHEL-09-252060 Missing Rule
V-257954 medium RHEL 9 libreswan package must be installed. SRG-OS-ID
RHEL-09-252065 Missing Rule
V-257955 high There must be no shosts.equiv files on RHEL 9. SRG-OS-ID
RHEL-09-252070 Missing Rule
V-257956 high There must be no .shosts files on RHEL 9. SRG-OS-ID
RHEL-09-252075 Missing Rule
V-257957 medium RHEL 9 must be configured to use TCP syncookies. SRG-OS-ID
RHEL-09-253010 Missing Rule
V-257958 medium RHEL 9 must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages. SRG-OS-ID
RHEL-09-253015 Missing Rule
V-257959 medium RHEL 9 must not forward Internet Protocol version 4 (IPv4) source-routed packets. SRG-OS-ID
RHEL-09-253020 Missing Rule
V-257960 medium RHEL 9 must log IPv4 packets with impossible addresses. SRG-OS-ID
RHEL-09-253025 Missing Rule
V-257961 medium RHEL 9 must log IPv4 packets with impossible addresses by default. SRG-OS-ID
RHEL-09-253030 Missing Rule
V-257962 medium RHEL 9 must use reverse path filtering on all IPv4 interfaces. SRG-OS-ID
RHEL-09-253035 Missing Rule
V-257963 medium RHEL 9 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted. SRG-OS-ID
RHEL-09-253040 Missing Rule
V-257964 medium RHEL 9 must not forward IPv4 source-routed packets by default. SRG-OS-ID
RHEL-09-253045 Missing Rule
V-257965 medium RHEL 9 must use a reverse-path filter for IPv4 network traffic when possible by default. SRG-OS-ID
RHEL-09-253050 Missing Rule
V-257966 medium RHEL 9 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address. SRG-OS-ID
RHEL-09-253055 Missing Rule
V-257967 medium RHEL 9 must limit the number of bogus Internet Control Message Protocol (ICMP) response errors logs. SRG-OS-ID
RHEL-09-253060 Missing Rule
V-257968 medium RHEL 9 must not send Internet Control Message Protocol (ICMP) redirects. SRG-OS-ID
RHEL-09-253065 Missing Rule
V-257969 medium RHEL 9 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default. SRG-OS-ID
RHEL-09-253070 Missing Rule
V-257970 medium RHEL 9 must not enable IPv4 packet forwarding unless the system is a router. SRG-OS-ID
RHEL-09-253075 Missing Rule
V-257971 medium RHEL 9 must not accept router advertisements on all IPv6 interfaces. SRG-OS-ID
RHEL-09-254010 Missing Rule
V-257972 medium RHEL 9 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages. SRG-OS-ID
RHEL-09-254015 Missing Rule
V-257973 medium RHEL 9 must not forward IPv6 source-routed packets. SRG-OS-ID
RHEL-09-254020 Missing Rule
V-257974 medium RHEL 9 must not enable IPv6 packet forwarding unless the system is a router. SRG-OS-ID
RHEL-09-254025 Missing Rule
V-257975 medium RHEL 9 must not accept router advertisements on all IPv6 interfaces by default. SRG-OS-ID
RHEL-09-254030 Missing Rule
V-257976 medium RHEL 9 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted. SRG-OS-ID
RHEL-09-254035 Missing Rule
V-257977 medium RHEL 9 must not forward IPv6 source-routed packets by default. SRG-OS-ID
RHEL-09-254040 Missing Rule
V-257978 medium All RHEL 9 networked systems must have SSH installed. SRG-OS-ID
RHEL-09-255010 Missing Rule
V-257979 medium All RHEL 9 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission. SRG-OS-ID
RHEL-09-255015 Missing Rule
V-257980 medium RHEL 9 must have the openssh-clients package installed. SRG-OS-ID
RHEL-09-255020 Missing Rule
V-257981 medium RHEL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a SSH logon. SRG-OS-ID
RHEL-09-255025 Missing Rule
V-257982 medium RHEL 9 must log SSH connection attempts and failures to the server. SRG-OS-ID
RHEL-09-255030 Missing Rule
V-257983 medium RHEL 9 SSHD must accept public key authentication. SRG-OS-ID
RHEL-09-255035 Missing Rule
V-257984 high RHEL 9 SSHD must not allow blank passwords. SRG-OS-ID
RHEL-09-255040 Missing Rule
V-257985 medium RHEL 9 must not permit direct logons to the root account using remote access via SSH. SRG-OS-ID
RHEL-09-255045 Missing Rule
V-257986 high RHEL 9 must enable the Pluggable Authentication Module (PAM) interface for SSHD. SRG-OS-ID
RHEL-09-255050 Missing Rule
V-257987 medium RHEL 9 SSH daemon must be configured to use system-wide crypto policies. SRG-OS-ID
RHEL-09-255055 Missing Rule
V-257988 medium RHEL 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH connections. SRG-OS-ID
RHEL-09-255060 Missing Rule
V-270177 medium The RHEL 9 SSH client must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections. SRG-OS-ID
RHEL-09-255064 Missing Rule
V-257989 medium The RHEL 9 SSH server must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections. SRG-OS-ID
RHEL-09-255065 Missing Rule
V-270178 medium The RHEL 9 SSH client must be configured to use only DOD-approved Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections. SRG-OS-ID
RHEL-09-255070 Missing Rule
V-257991 medium The RHEL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections. SRG-OS-ID
RHEL-09-255075 Missing Rule
V-257992 medium RHEL 9 must not allow a noncertificate trusted host SSH logon to the system. SRG-OS-ID
RHEL-09-255080 Missing Rule
V-257993 medium RHEL 9 must not allow users to override SSH environment variables. SRG-OS-ID
RHEL-09-255085 Missing Rule
V-257994 medium RHEL 9 must force a frequent session key renegotiation for SSH connections to the server. SRG-OS-ID
RHEL-09-255090 Missing Rule
V-257995 medium RHEL 9 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive. SRG-OS-ID
RHEL-09-255095 Missing Rule
V-257996 medium RHEL 9 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive. SRG-OS-ID
RHEL-09-255100 Missing Rule
V-257997 medium RHEL 9 SSH server configuration file must be group-owned by root. SRG-OS-ID
RHEL-09-255105 Missing Rule
V-257998 medium The RHEL 9 SSH server configuration file must be owned by root. SRG-OS-ID
RHEL-09-255110 Missing Rule
V-257999 medium RHEL 9 SSH server configuration files' permissions must not be modified. SRG-OS-ID
RHEL-09-255115 Missing Rule
V-258000 medium RHEL 9 SSH private host key files must have mode 0640 or less permissive. SRG-OS-ID
RHEL-09-255120 Missing Rule
V-258001 medium RHEL 9 SSH public host key files must have mode 0644 or less permissive. SRG-OS-ID
RHEL-09-255125 Missing Rule
V-258002 medium RHEL 9 SSH daemon must not allow compression or must only allow compression after successful authentication. SRG-OS-ID
RHEL-09-255130 Missing Rule
V-258003 medium RHEL 9 SSH daemon must not allow GSSAPI authentication. SRG-OS-ID
RHEL-09-255135 Missing Rule
V-258004 medium RHEL 9 SSH daemon must not allow Kerberos authentication. SRG-OS-ID
RHEL-09-255140 Missing Rule
V-258005 medium RHEL 9 SSH daemon must not allow rhosts authentication. SRG-OS-ID
RHEL-09-255145 Missing Rule
V-258006 medium RHEL 9 SSH daemon must not allow known hosts authentication. SRG-OS-ID
RHEL-09-255150 Missing Rule
V-258007 medium RHEL 9 SSH daemon must disable remote X connections for interactive users. SRG-OS-ID
RHEL-09-255155 Missing Rule
V-258008 medium RHEL 9 SSH daemon must perform strict mode checking of home directory configuration files. SRG-OS-ID
RHEL-09-255160 Missing Rule
V-258009 medium RHEL 9 SSH daemon must display the date and time of the last successful account logon upon an SSH logon. SRG-OS-ID
RHEL-09-255165 Missing Rule
V-258011 medium RHEL 9 SSH daemon must prevent remote hosts from connecting to the proxy display. SRG-OS-ID
RHEL-09-255175 Missing Rule
V-258012 medium RHEL 9 must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon. SRG-OS-ID
RHEL-09-271010 Missing Rule
V-258013 medium RHEL 9 must prevent a user from overriding the banner-message-enable setting for the graphical user interface. SRG-OS-ID
RHEL-09-271015 Missing Rule
V-258014 medium RHEL 9 must disable the graphical user interface automount function unless required. SRG-OS-ID
RHEL-09-271020 Missing Rule
V-258015 medium RHEL 9 must prevent a user from overriding the disabling of the graphical user interface automount function. SRG-OS-ID
RHEL-09-271025 Missing Rule
V-258016 medium RHEL 9 must disable the graphical user interface autorun function unless required. SRG-OS-ID
RHEL-09-271030 Missing Rule
V-258017 medium RHEL 9 must prevent a user from overriding the disabling of the graphical user interface autorun function. SRG-OS-ID
RHEL-09-271035 Missing Rule
V-258018 high RHEL 9 must not allow unattended or automatic logon via the graphical user interface. SRG-OS-ID
RHEL-09-271040 Missing Rule
V-258019 medium RHEL 9 must be able to initiate directly a session lock for all connection types using smart card when the smart card is removed. SRG-OS-ID
RHEL-09-271045 Missing Rule
V-258020 medium RHEL 9 must prevent a user from overriding the disabling of the graphical user smart card removal action. SRG-OS-ID
RHEL-09-271050 Missing Rule
V-258021 medium RHEL 9 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for graphical user sessions. SRG-OS-ID
RHEL-09-271055 Missing Rule
V-258022 medium RHEL 9 must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface. SRG-OS-ID
RHEL-09-271060 Missing Rule
V-258023 medium RHEL 9 must automatically lock graphical user sessions after 15 minutes of inactivity. SRG-OS-ID
RHEL-09-271065 Missing Rule
V-258024 medium RHEL 9 must prevent a user from overriding the session idle-delay setting for the graphical user interface. SRG-OS-ID
RHEL-09-271070 Missing Rule
V-258025 medium RHEL 9 must initiate a session lock for graphical user interfaces when the screensaver is activated. SRG-OS-ID
RHEL-09-271075 Missing Rule
V-258026 medium RHEL 9 must prevent a user from overriding the session lock-delay setting for the graphical user interface. SRG-OS-ID
RHEL-09-271080 Missing Rule
V-258027 medium RHEL 9 must conceal, via the session lock, information previously visible on the display with a publicly viewable image. SRG-OS-ID
RHEL-09-271085 Missing Rule
V-258028 medium RHEL 9 effective dconf policy must match the policy keyfiles. SRG-OS-ID
RHEL-09-271090 Missing Rule
V-258029 medium RHEL 9 must disable the ability of a user to restart the system from the login screen. SRG-OS-ID
RHEL-09-271095 Missing Rule
V-258030 medium RHEL 9 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface. SRG-OS-ID
RHEL-09-271100 Missing Rule
V-258031 medium RHEL 9 must disable the ability of a user to accidentally press Ctrl-Alt-Del and cause a system to shut down or reboot. SRG-OS-ID
RHEL-09-271105 Missing Rule
V-258032 medium RHEL 9 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface. SRG-OS-ID
RHEL-09-271110 Missing Rule
V-258033 medium RHEL 9 must disable the user list at logon for graphical user interfaces. SRG-OS-ID
RHEL-09-271115 Missing Rule
V-258034 medium RHEL 9 must be configured to disable USB mass storage. SRG-OS-ID
RHEL-09-291010 Missing Rule
V-258035 medium RHEL 9 must have the USBGuard package installed. SRG-OS-ID
RHEL-09-291015 Missing Rule
V-258036 medium RHEL 9 must have the USBGuard package enabled. SRG-OS-ID
RHEL-09-291020 Missing Rule
V-258037 low RHEL 9 must enable Linux audit logging for the USBGuard daemon. SRG-OS-ID
RHEL-09-291025 Missing Rule
V-258038 medium RHEL 9 must block unauthorized peripherals before establishing a connection. SRG-OS-ID
RHEL-09-291030 Missing Rule
V-258039 medium RHEL 9 Bluetooth must be disabled. SRG-OS-ID
RHEL-09-291035 Missing Rule
V-258040 medium RHEL 9 wireless network adapters must be disabled. SRG-OS-ID
RHEL-09-291040 Missing Rule
V-258041 medium RHEL 9 user account passwords for new users or password changes must have a 60-day maximum password lifetime restriction in /etc/login.defs. SRG-OS-ID
RHEL-09-411010 Missing Rule
V-258042 medium RHEL 9 user account passwords must have a 60-day maximum password lifetime restriction. SRG-OS-ID
RHEL-09-411015 Missing Rule
V-258043 medium All RHEL 9 local interactive user accounts must be assigned a home directory upon creation. SRG-OS-ID
RHEL-09-411020 Missing Rule
V-258044 medium RHEL 9 must set the umask value to 077 for all local interactive user accounts. SRG-OS-ID
RHEL-09-411025 Missing Rule
V-258045 medium RHEL 9 duplicate User IDs (UIDs) must not exist for interactive users. SRG-OS-ID
RHEL-09-411030 Missing Rule
V-258046 medium RHEL 9 system accounts must not have an interactive login shell. SRG-OS-ID
RHEL-09-411035 Missing Rule
V-258047 medium RHEL 9 must automatically expire temporary accounts within 72 hours. SRG-OS-ID
RHEL-09-411040 Missing Rule
V-258048 medium All RHEL 9 interactive users must have a primary group that exists. SRG-OS-ID
RHEL-09-411045 Missing Rule
V-258049 medium RHEL 9 must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. SRG-OS-ID
RHEL-09-411050 Missing Rule
V-258050 medium Executable search paths within the initialization files of all local interactive RHEL 9 users must only contain paths that resolve to the system default or the users home directory. SRG-OS-ID
RHEL-09-411055 Missing Rule
V-258051 medium All RHEL 9 local interactive users must have a home directory assigned in the /etc/passwd file. SRG-OS-ID
RHEL-09-411060 Missing Rule
V-258052 medium All RHEL 9 local interactive user home directories defined in the /etc/passwd file must exist. SRG-OS-ID
RHEL-09-411065 Missing Rule
V-258053 medium All RHEL 9 local interactive user home directories must be group-owned by the home directory owner's primary group. SRG-OS-ID
RHEL-09-411070 Missing Rule
V-258054 medium RHEL 9 must automatically lock an account when three unsuccessful logon attempts occur. SRG-OS-ID
RHEL-09-411075 Missing Rule
V-258055 medium RHEL 9 must automatically lock the root account until the root account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period. SRG-OS-ID
RHEL-09-411080 Missing Rule
V-258056 medium RHEL 9 must automatically lock an account when three unsuccessful logon attempts occur during a 15-minute time period. SRG-OS-ID
RHEL-09-411085 Missing Rule
V-258057 medium RHEL 9 must maintain an account lock until the locked account is released by an administrator. SRG-OS-ID
RHEL-09-411090 Missing Rule
V-258058 medium RHEL 9 must not have unauthorized accounts. SRG-OS-ID
RHEL-09-411095 Missing Rule
V-258059 high The root account must be the only account having unrestricted access to RHEL 9 system. SRG-OS-ID
RHEL-09-411100 Missing Rule
V-258060 medium RHEL 9 must ensure account lockouts persist. SRG-OS-ID
RHEL-09-411105 Missing Rule
V-258061 medium RHEL 9 groups must have unique Group ID (GID). SRG-OS-ID
RHEL-09-411110 Missing Rule
V-258062 medium Local RHEL 9 initialization files must not execute world-writable programs. SRG-OS-ID
RHEL-09-411115 Missing Rule
V-258068 medium RHEL 9 must automatically exit interactive command shell user sessions after 10 minutes of inactivity. SRG-OS-ID
RHEL-09-412035 Missing Rule
V-258069 low RHEL 9 must limit the number of concurrent sessions to ten for all accounts and/or account types. SRG-OS-ID
RHEL-09-412040 Missing Rule
V-258070 medium RHEL 9 must log username information when unsuccessful logon attempts occur. SRG-OS-ID
RHEL-09-412045 Missing Rule
V-258071 medium RHEL 9 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt. SRG-OS-ID
RHEL-09-412050 Missing Rule
V-258072 medium RHEL 9 must define default permissions for the bash shell. SRG-OS-ID
RHEL-09-412055 Missing Rule
V-258073 medium RHEL 9 must define default permissions for the c shell. SRG-OS-ID
RHEL-09-412060 Missing Rule
V-258074 medium RHEL 9 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files. SRG-OS-ID
RHEL-09-412065 Missing Rule
V-258075 medium RHEL 9 must define default permissions for the system default profile. SRG-OS-ID
RHEL-09-412070 Missing Rule
V-258076 low RHEL 9 must display the date and time of the last successful account logon upon logon. SRG-OS-ID
RHEL-09-412075 Missing Rule
V-258077 medium RHEL 9 must terminate idle user sessions. SRG-OS-ID
RHEL-09-412080 Missing Rule
V-258078 high RHEL 9 must use a Linux Security Module configured to enforce limits on system services. SRG-OS-ID
RHEL-09-431010 Missing Rule
V-258079 medium RHEL 9 must enable the SELinux targeted policy. SRG-OS-ID
RHEL-09-431015 Missing Rule
V-272496 medium RHEL 9 must elevate the SELinux context when an administrator calls the sudo command. SRG-OS-ID
RHEL-09-431016 Missing Rule
V-258080 medium RHEL 9 must configure SELinux context type to allow the use of a nondefault faillock tally directory. SRG-OS-ID
RHEL-09-431020 Missing Rule
V-258081 medium RHEL 9 must have policycoreutils package installed. SRG-OS-ID
RHEL-09-431025 Missing Rule
V-258082 medium RHEL 9 policycoreutils-python-utils package must be installed. SRG-OS-ID
RHEL-09-431030 Missing Rule
V-258083 medium RHEL 9 must have the sudo package installed. SRG-OS-ID
RHEL-09-432010 Missing Rule
V-258084 medium RHEL 9 must require reauthentication when using the "sudo" command. SRG-OS-ID
RHEL-09-432015 Missing Rule
V-258085 medium RHEL 9 must use the invoking user's password for privilege escalation when using "sudo". SRG-OS-ID
RHEL-09-432020 Missing Rule
V-258086 medium RHEL 9 must require users to reauthenticate for privilege escalation. SRG-OS-ID
RHEL-09-432025 Missing Rule
V-258087 medium RHEL 9 must restrict privilege elevation to authorized personnel. SRG-OS-ID
RHEL-09-432030 Missing Rule
V-258088 medium RHEL 9 must restrict the use of the "su" command. SRG-OS-ID
RHEL-09-432035 Missing Rule
V-258089 medium RHEL 9 fapolicy module must be installed. SRG-OS-ID
RHEL-09-433010 Missing Rule
V-258090 medium RHEL 9 fapolicy module must be enabled. SRG-OS-ID
RHEL-09-433015 Missing Rule
V-270180 medium The RHEL 9 fapolicy module must be configured to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs. SRG-OS-ID
RHEL-09-433016 Missing Rule
V-258091 medium RHEL 9 must ensure the password complexity module in the system-auth file is configured for three retries or less. SRG-OS-ID
RHEL-09-611010 Missing Rule
V-258094 high RHEL 9 must not allow blank or null passwords. SRG-OS-ID
RHEL-09-611025 Missing Rule
V-258095 medium RHEL 9 must configure the use of the pam_faillock.so module in the /etc/pam.d/system-auth file. SRG-OS-ID
RHEL-09-611030 Missing Rule
V-258096 medium RHEL 9 must configure the use of the pam_faillock.so module in the /etc/pam.d/password-auth file. SRG-OS-ID
RHEL-09-611035 Missing Rule
V-258097 medium RHEL 9 must ensure the password complexity module is enabled in the password-auth file. SRG-OS-ID
RHEL-09-611040 Missing Rule
V-258098 medium RHEL 9 must ensure the password complexity module is enabled in the system-auth file. SRG-OS-ID
RHEL-09-611045 Missing Rule
V-258099 medium RHEL 9 password-auth must be configured to use a sufficient number of hashing rounds. SRG-OS-ID
RHEL-09-611050 Missing Rule
V-258100 medium RHEL 9 system-auth must be configured to use a sufficient number of hashing rounds. SRG-OS-ID
RHEL-09-611055 Missing Rule
V-258101 medium RHEL 9 must enforce password complexity rules for the root account. SRG-OS-ID
RHEL-09-611060 Missing Rule
V-258102 medium RHEL 9 must enforce password complexity by requiring that at least one lowercase character be used. SRG-OS-ID
RHEL-09-611065 Missing Rule
V-258103 medium RHEL 9 must enforce password complexity by requiring that at least one numeric character be used. SRG-OS-ID
RHEL-09-611070 Missing Rule
V-258104 medium RHEL 9 passwords for new users or password changes must have a 24 hours minimum password lifetime restriction in /etc/login.defs. SRG-OS-ID
RHEL-09-611075 Missing Rule
V-258105 medium RHEL 9 passwords must have a 24 hours minimum password lifetime restriction in /etc/shadow. SRG-OS-ID
RHEL-09-611080 Missing Rule
V-258106 medium RHEL 9 must require users to provide a password for privilege escalation. SRG-OS-ID
RHEL-09-611085 Missing Rule
V-258107 medium RHEL 9 passwords must be created with a minimum of 15 characters. SRG-OS-ID
RHEL-09-611090 Missing Rule
V-258109 medium RHEL 9 must enforce password complexity by requiring that at least one special character be used. SRG-OS-ID
RHEL-09-611100 Missing Rule
V-258110 medium RHEL 9 must prevent the use of dictionary words for passwords. SRG-OS-ID
RHEL-09-611105 Missing Rule
V-258111 medium RHEL 9 must enforce password complexity by requiring that at least one uppercase character be used. SRG-OS-ID
RHEL-09-611110 Missing Rule
V-258112 medium RHEL 9 must require the change of at least eight characters when passwords are changed. SRG-OS-ID
RHEL-09-611115 Missing Rule
V-258113 medium RHEL 9 must require the maximum number of repeating characters of the same character class be limited to four when passwords are changed. SRG-OS-ID
RHEL-09-611120 Missing Rule
V-258114 medium RHEL 9 must require the maximum number of repeating characters be limited to three when passwords are changed. SRG-OS-ID
RHEL-09-611125 Missing Rule
V-258115 medium RHEL 9 must require the change of at least four character classes when passwords are changed. SRG-OS-ID
RHEL-09-611130 Missing Rule
V-258116 medium RHEL 9 must be configured so that user and group account administration utilities are configured to store only encrypted representations of passwords. SRG-OS-ID
RHEL-09-611135 Missing Rule
V-258117 medium RHEL 9 must be configured to use the shadow file to store only encrypted representations of passwords. SRG-OS-ID
RHEL-09-611140 Missing Rule
V-258118 medium RHEL 9 must not be configured to bypass password requirements for privilege escalation. SRG-OS-ID
RHEL-09-611145 Missing Rule
V-258120 medium RHEL 9 must not have accounts configured with blank or null passwords. SRG-OS-ID
RHEL-09-611155 Missing Rule
V-258121 medium RHEL 9 must use the common access card (CAC) smart card driver. SRG-OS-ID
RHEL-09-611160 Missing Rule
V-258122 medium RHEL 9 must enable certificate based smart card authentication. SRG-OS-ID
RHEL-09-611165 Missing Rule
V-258123 medium RHEL 9 must implement certificate status checking for multifactor authentication. SRG-OS-ID
RHEL-09-611170 Missing Rule
V-258124 medium RHEL 9 must have the pcsc-lite package installed. SRG-OS-ID
RHEL-09-611175 Missing Rule
V-258125 medium The pcscd service on RHEL 9 must be active. SRG-OS-ID
RHEL-09-611180 Missing Rule
V-258126 medium RHEL 9 must have the opensc package installed. SRG-OS-ID
RHEL-09-611185 Missing Rule
V-258127 medium RHEL 9, for PKI-based authentication, must enforce authorized access to the corresponding private key. SRG-OS-ID
RHEL-09-611190 Missing Rule
V-258128 medium RHEL 9 must require authentication to access emergency mode. SRG-OS-ID
RHEL-09-611195 Missing Rule
V-258129 medium RHEL 9 must require authentication to access single-user mode. SRG-OS-ID
RHEL-09-611200 Missing Rule
V-258131 medium RHEL 9, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. SRG-OS-ID
RHEL-09-631010 Missing Rule
V-258132 medium RHEL 9 must map the authenticated identity to the user or group account for PKI-based authentication. SRG-OS-ID
RHEL-09-631015 Missing Rule
V-258133 medium RHEL 9 must prohibit the use of cached authenticators after one day. SRG-OS-ID
RHEL-09-631020 Missing Rule
V-258134 medium RHEL 9 must have the AIDE package installed. SRG-OS-ID
RHEL-09-651010 Missing Rule
V-258135 medium RHEL 9 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered. SRG-OS-ID
RHEL-09-651015 Missing Rule
V-258136 medium RHEL 9 must use a file integrity tool that is configured to use FIPS 140-3-approved cryptographic hashes for validating file contents and directories. SRG-OS-ID
RHEL-09-651020 Missing Rule
V-258137 medium RHEL 9 must use cryptographic mechanisms to protect the integrity of audit tools. SRG-OS-ID
RHEL-09-651025 Missing Rule
V-258138 low RHEL 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs). SRG-OS-ID
RHEL-09-651030 Missing Rule
V-258139 low RHEL 9 must be configured so that the file integrity tool verifies extended attributes. SRG-OS-ID
RHEL-09-651035 Missing Rule
V-258140 medium RHEL 9 must have the rsyslog package installed. SRG-OS-ID
RHEL-09-652010 Missing Rule
V-258141 medium RHEL 9 must have the packages required for encrypting offloaded audit logs installed. SRG-OS-ID
RHEL-09-652015 Missing Rule
V-258142 medium The rsyslog service on RHEL 9 must be active. SRG-OS-ID
RHEL-09-652020 Missing Rule
V-258143 medium RHEL 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation. SRG-OS-ID
RHEL-09-652025 Missing Rule
V-258144 medium All RHEL 9 remote access methods must be monitored. SRG-OS-ID
RHEL-09-652030 Missing Rule
V-258146 medium RHEL 9 must authenticate the remote logging server for offloading audit logs via rsyslog. SRG-OS-ID
RHEL-09-652040 Missing Rule
V-258147 medium RHEL 9 must encrypt the transfer of audit records offloaded onto a different system or media from the system being audited via rsyslog. SRG-OS-ID
RHEL-09-652045 Missing Rule
V-258148 medium RHEL 9 must encrypt via the gtls driver the transfer of audit records offloaded onto a different system or media from the system being audited via rsyslog. SRG-OS-ID
RHEL-09-652050 Missing Rule
V-258149 medium RHEL 9 must be configured to forward audit records via TCP to a different system or media from the system being audited via rsyslog. SRG-OS-ID
RHEL-09-652055 Missing Rule
V-258150 medium RHEL 9 must use cron logging. SRG-OS-ID
RHEL-09-652060 Missing Rule
V-258151 medium RHEL 9 audit package must be installed. SRG-OS-ID
RHEL-09-653010 Missing Rule
V-258152 medium RHEL 9 audit service must be enabled. SRG-OS-ID
RHEL-09-653015 Missing Rule
V-258153 medium RHEL 9 audit system must take appropriate action when an error writing to the audit storage volume occurs. SRG-OS-ID
RHEL-09-653020 Missing Rule
V-258154 medium RHEL 9 audit system must take appropriate action when the audit storage volume is full. SRG-OS-ID
RHEL-09-653025 Missing Rule
V-258155 medium RHEL 9 must allocate audit record storage capacity to store at least one week's worth of audit records. SRG-OS-ID
RHEL-09-653030 Missing Rule
V-258156 medium RHEL 9 must take action when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity. SRG-OS-ID
RHEL-09-653035 Missing Rule
V-258157 medium RHEL 9 must notify the system administrator (SA) and information system security officer (ISSO) (at a minimum) when allocated audit record storage volume 75 percent utilization. SRG-OS-ID
RHEL-09-653040 Missing Rule
V-258158 medium RHEL 9 must take action when allocated audit record storage volume reaches 95 percent of the audit record storage capacity. SRG-OS-ID
RHEL-09-653045 Missing Rule
V-258159 medium RHEL 9 must take action when allocated audit record storage volume reaches 95 percent of the repository maximum audit record storage capacity. SRG-OS-ID
RHEL-09-653050 Missing Rule
V-258160 medium RHEL 9 audit system must take appropriate action when the audit files have reached maximum size. SRG-OS-ID
RHEL-09-653055 Missing Rule
V-258161 medium RHEL 9 must label all offloaded audit logs before sending them to the central log server. SRG-OS-ID
RHEL-09-653060 Missing Rule
V-258162 medium RHEL 9 must take appropriate action when the internal event queue is full. SRG-OS-ID
RHEL-09-653065 Missing Rule
V-258163 medium RHEL 9 System Administrator (SA) and/or information system security officer (ISSO) (at a minimum) must be alerted of an audit processing failure event. SRG-OS-ID
RHEL-09-653070 Missing Rule
V-258164 medium RHEL 9 audit system must audit local events. SRG-OS-ID
RHEL-09-653075 Missing Rule
V-258165 medium RHEL 9 audit logs must be group-owned by root or by a restricted logging group to prevent unauthorized read access. SRG-OS-ID
RHEL-09-653080 Missing Rule
V-258166 medium RHEL 9 audit log directory must be owned by root to prevent unauthorized read access. SRG-OS-ID
RHEL-09-653085 Missing Rule
V-258167 medium RHEL 9 audit logs file must have mode 0600 or less permissive to prevent unauthorized access to the audit log. SRG-OS-ID
RHEL-09-653090 Missing Rule
V-258168 medium RHEL 9 must periodically flush audit records to disk to prevent the loss of audit records. SRG-OS-ID
RHEL-09-653095 Missing Rule
V-258169 medium RHEL 9 must produce audit records containing information to establish the identity of any individual or process associated with the event. SRG-OS-ID
RHEL-09-653100 Missing Rule
V-258170 medium RHEL 9 must write audit records to disk. SRG-OS-ID
RHEL-09-653105 Missing Rule
V-258171 medium RHEL 9 must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. SRG-OS-ID
RHEL-09-653110 Missing Rule
V-258172 medium RHEL 9 /etc/audit/auditd.conf file must have 0640 or less permissive to prevent unauthorized access. SRG-OS-ID
RHEL-09-653115 Missing Rule
V-258173 low RHEL 9 must allocate an audit_backlog_limit of sufficient size to capture processes that start prior to the audit daemon. SRG-OS-ID
RHEL-09-653120 Missing Rule
V-258174 medium RHEL 9 must have mail aliases to notify the information system security officer (ISSO) and system administrator (SA) (at a minimum) in the event of an audit processing failure. SRG-OS-ID
RHEL-09-653125 Missing Rule
V-258175 medium RHEL 9 audispd-plugins package must be installed. SRG-OS-ID
RHEL-09-653130 Missing Rule
V-258176 medium RHEL 9 must audit uses of the "execve" system call. SRG-OS-ID
RHEL-09-654010 Missing Rule
V-258177 medium RHEL 9 must audit all uses of the chmod, fchmod, and fchmodat system calls. SRG-OS-ID
RHEL-09-654015 Missing Rule
V-258178 medium RHEL 9 must audit all uses of the chown, fchown, fchownat, and lchown system calls. SRG-OS-ID
RHEL-09-654020 Missing Rule
V-258179 medium RHEL 9 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls. SRG-OS-ID
RHEL-09-654025 Missing Rule
V-258180 medium RHEL 9 must audit all uses of umount system calls. SRG-OS-ID
RHEL-09-654030 Missing Rule
V-258181 medium RHEL 9 must audit all uses of the chacl command. SRG-OS-ID
RHEL-09-654035 Missing Rule
V-258182 medium RHEL 9 must audit all uses of the setfacl command. SRG-OS-ID
RHEL-09-654040 Missing Rule
V-258183 medium RHEL 9 must audit all uses of the chcon command. SRG-OS-ID
RHEL-09-654045 Missing Rule
V-258184 medium RHEL 9 must audit all uses of the semanage command. SRG-OS-ID
RHEL-09-654050 Missing Rule
V-258185 medium RHEL 9 must audit all uses of the setfiles command. SRG-OS-ID
RHEL-09-654055 Missing Rule
V-258186 medium RHEL 9 must audit all uses of the setsebool command. SRG-OS-ID
RHEL-09-654060 Missing Rule
V-258187 medium RHEL 9 must audit all uses of the rename, unlink, rmdir, renameat, and unlinkat system calls. SRG-OS-ID
RHEL-09-654065 Missing Rule
V-258188 medium RHEL 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls. SRG-OS-ID
RHEL-09-654070 Missing Rule
V-258189 medium RHEL 9 must audit all uses of the delete_module system call. SRG-OS-ID
RHEL-09-654075 Missing Rule
V-258190 medium RHEL 9 must audit all uses of the init_module and finit_module system calls. SRG-OS-ID
RHEL-09-654080 Missing Rule
V-258191 medium RHEL 9 must audit all uses of the chage command. SRG-OS-ID
RHEL-09-654085 Missing Rule
V-258192 medium RHEL 9 must audit all uses of the chsh command. SRG-OS-ID
RHEL-09-654090 Missing Rule
V-258193 medium RHEL 9 must audit all uses of the crontab command. SRG-OS-ID
RHEL-09-654095 Missing Rule
V-258194 medium RHEL 9 must audit all uses of the gpasswd command. SRG-OS-ID
RHEL-09-654100 Missing Rule
V-258195 medium RHEL 9 must audit all uses of the kmod command. SRG-OS-ID
RHEL-09-654105 Missing Rule
V-258196 medium RHEL 9 must audit all uses of the newgrp command. SRG-OS-ID
RHEL-09-654110 Missing Rule
V-258197 medium RHEL 9 must audit all uses of the pam_timestamp_check command. SRG-OS-ID
RHEL-09-654115 Missing Rule
V-258198 medium RHEL 9 must audit all uses of the passwd command. SRG-OS-ID
RHEL-09-654120 Missing Rule
V-258199 medium RHEL 9 must audit all uses of the postdrop command. SRG-OS-ID
RHEL-09-654125 Missing Rule
V-258200 medium RHEL 9 must audit all uses of the postqueue command. SRG-OS-ID
RHEL-09-654130 Missing Rule
V-258201 medium RHEL 9 must audit all uses of the ssh-agent command. SRG-OS-ID
RHEL-09-654135 Missing Rule
V-258202 medium RHEL 9 must audit all uses of the ssh-keysign command. SRG-OS-ID
RHEL-09-654140 Missing Rule
V-258203 medium RHEL 9 must audit all uses of the su command. SRG-OS-ID
RHEL-09-654145 Missing Rule
V-258204 medium RHEL 9 must audit all uses of the sudo command. SRG-OS-ID
RHEL-09-654150 Missing Rule
V-258205 medium RHEL 9 must audit all uses of the sudoedit command. SRG-OS-ID
RHEL-09-654155 Missing Rule
V-258206 medium RHEL 9 must audit all uses of the unix_chkpwd command. SRG-OS-ID
RHEL-09-654160 Missing Rule
V-258207 medium RHEL 9 must audit all uses of the unix_update command. SRG-OS-ID
RHEL-09-654165 Missing Rule
V-258208 medium RHEL 9 must audit all uses of the userhelper command. SRG-OS-ID
RHEL-09-654170 Missing Rule
V-258209 medium RHEL 9 must audit all uses of the usermod command. SRG-OS-ID
RHEL-09-654175 Missing Rule
V-258210 medium RHEL 9 must audit all uses of the mount command. SRG-OS-ID
RHEL-09-654180 Missing Rule
V-258211 medium Successful/unsuccessful uses of the init command in RHEL 9 must generate an audit record. SRG-OS-ID
RHEL-09-654185 Missing Rule
V-258212 medium Successful/unsuccessful uses of the poweroff command in RHEL 9 must generate an audit record. SRG-OS-ID
RHEL-09-654190 Missing Rule
V-258213 medium Successful/unsuccessful uses of the reboot command in RHEL 9 must generate an audit record. SRG-OS-ID
RHEL-09-654195 Missing Rule
V-258214 medium Successful/unsuccessful uses of the shutdown command in RHEL 9 must generate an audit record. SRG-OS-ID
RHEL-09-654200 Missing Rule
V-258215 medium Successful/unsuccessful uses of the umount system call in RHEL 9 must generate an audit record. SRG-OS-ID
RHEL-09-654205 Missing Rule
V-258216 medium Successful/unsuccessful uses of the umount2 system call in RHEL 9 must generate an audit record. SRG-OS-ID
RHEL-09-654210 Missing Rule
V-258217 medium RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers. SRG-OS-ID
RHEL-09-654215 Missing Rule
V-258218 medium RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory. SRG-OS-ID
RHEL-09-654220 Missing Rule
V-258219 medium RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group. SRG-OS-ID
RHEL-09-654225 Missing Rule
V-258220 medium RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow. SRG-OS-ID
RHEL-09-654230 Missing Rule
V-258221 medium RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd. SRG-OS-ID
RHEL-09-654235 Missing Rule
V-258222 medium RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd. SRG-OS-ID
RHEL-09-654240 Missing Rule
V-258223 medium RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow. SRG-OS-ID
RHEL-09-654245 Missing Rule
V-258224 medium RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/faillock. SRG-OS-ID
RHEL-09-654250 Missing Rule
V-258225 medium RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog. SRG-OS-ID
RHEL-09-654255 Missing Rule
V-258226 medium RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/tallylog. SRG-OS-ID
RHEL-09-654260 Missing Rule
V-258227 medium RHEL 9 must take appropriate action when a critical audit processing failure occurs. SRG-OS-ID
RHEL-09-654265 Missing Rule
V-258228 medium RHEL 9 audit system must protect logon UIDs from unauthorized change. SRG-OS-ID
RHEL-09-654270 Missing Rule
V-258229 medium RHEL 9 audit system must protect auditing rules from unauthorized change. SRG-OS-ID
RHEL-09-654275 Missing Rule
V-258230 high RHEL 9 must enable FIPS mode. SRG-OS-ID
RHEL-09-671010 Missing Rule
V-258231 medium RHEL 9 must employ FIPS 140-3 approved cryptographic hashing algorithms for all stored passwords. SRG-OS-ID
RHEL-09-671015 Missing Rule
V-258232 medium RHEL 9 IP tunnels must use FIPS 140-3 approved cryptographic algorithms. SRG-OS-ID
RHEL-09-671020 Missing Rule
V-258233 medium RHEL 9 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-3 approved cryptographic hashing algorithm for system authentication. SRG-OS-ID
RHEL-09-671025 Missing Rule
V-258236 high RHEL 9 cryptographic policy must not be overridden. SRG-OS-ID
RHEL-09-672020 Missing Rule
V-258237 medium RHEL 9 must use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module. SRG-OS-ID
RHEL-09-672025 Missing Rule
V-258242 medium RHEL 9 must implement DOD-approved encryption in the bind package. SRG-OS-ID
RHEL-09-672050 Missing Rule