DISA STIG
The NetWitness Platform version 12.5.0.0 supports all Audit Rules in the DISA STIG Control Group. The supported version for DISA STIG is Red Hat Enterprise Linux 8 V1R11. NetWitness will expand its support of STIG rules in future NetWitness Platform versions.
This section includes the following topics.
How STIG Limits Account Access
Manage STIG Controls Script (manage-stig-controls)
IMPORTANT: All rules are enabled by default except for control goup 1-ssh-prevent-root an control group 3-fips-kernel. You can enable or disable rules by control group using the manage-stig-controls script.
How STIG Limits Account AccessHow STIG Limits Account Access
The STIG hardening RPM helps to lock down information, systems, and software, which might otherwise be vulnerable to a malicious computer attack by limiting account access to a system. For example, the STIG script:
- Ensures that the account password has a length, complexity, expiration period, and lockout period that are in accordance with DISA best practices.
- Applies auditing and logging of user actions on the host.
NetWitness PasswordsNetWitness Passwords
NetWitness Platform requires passwords that are STIG compliant.
Generate the OpenSCAP ReportGenerate the OpenSCAP Report
Security Content Automation Protocol (SCAP) is a line of standards or rules managed by the National Institute of Standards and Technology (NIST). It was created to provide a standardized approach to maintaining the security of enterprise systems, such as automatically verifying the presence of patches, checking system security configuration settings, and examining systems for signs of compromise.
The OpenSCAP report evaluates your environment against the SCAP rules. The results are sent to the HOSTNAME-ssg-results. (XML|HTML) depending on the output format you select.
Install OpenSCAP
You must
- SSH to the host
- Execute the following command:
yum install scap-security-guide
Sample Report
The following report is a sample section from an OpenSCAP report.
Report Fields
Section | Field | Description |
---|---|---|
Introduction - Test Result | Result ID | The Extensible Configuration Checklist Description Format (XCCDF) identifier of the report results. |
Profile | XCCDF profile under which the report results are categorized. | |
Start time | When the report started. | |
End time | When the report ended. | |
Benchmark | XCCDF benchmark | |
Benchmark version | Version number of the benchmark. | |
Introduction - Score | system | XCCDF scoring method. |
score | Score attained after running the report. | |
max | Highest score attainable. | |
% | Score attained after running the report as a percentage. | |
bar | Not Applicable. | |
Results overview - Rule Results Summary | pass | Passed rule check. |
fixed | Rule check that failed previously is now fixed. | |
fail | Failed rule check. | |
error | Could not perform rule check. | |
not selected | This check was not applicable to your NetWitness Platform deployment. | |
not checked | Rule could not be checked. There are several reasons why a rule cannot be checked. For example, the rule check requires a check engine not supported by the OpenSCAP report. | |
not applicable | Rule check does not apply to your NetWitness Platform deployment. | |
informational | Rule checks for informational purposes only (no action required for fail). | |
unknown | Report was able to check the rule. Run steps manually as described in the report to check the rule. | |
total | Total number of rules checked. | |
Exceptions | Title | Name of rule being checked. |
Result | Valid values are pass, fixed, fail, error, not selected, not checked, not applicable, informational, or unknown.
Note: Results values are defined the Results overview - Rule Results Summary. |
Create the OpenSCAP Report
The following tasks show you how to create the OpenSCAP Report :
- SSH to the host.
- Submit the following commands to make a directory:
a. mkdir -p /opt/rsa/openscap
b. cd /opt/rsa/openscap - Install the SCAP-security-guide packages:
yum install scap-security-guide - Generate reports using the “profile stig”:
- For 12.4 and later versions, do the following:
oscap xccdf eval --profile stig --results /opt/rsa/openscap/`hostname`-ssg-results.xml --report /opt/rsa/openscap/`hostname`-ssg-results.html --cpe
/usr/share/xml/scap/ssg/content/ssg-almalinux8-cpe-dictionary.xml
/usr/share/xml/scap/ssg/content/ssg-almalinux8-xccdf.xml - For NetWitness Platform 12.3.1 and previous versions, do the following:
oscap xccdf eval --profile "xccdf_org.ssgproject.content_profile_stig" --results /opt/rsa/openscap/`hostname`-ssg-results.xml --report /opt/rsa/openscap/`hostname`-ssg-results.html --cpe /usr/share/xml/scap/ssg/content/ssg-rhel7-cpe-dictionary.xml /usr/share/xml/scap/ssg/content/ssg-centos7-xccdf.xml - Note: This will create reports in both xml and html format.
- For 12.4 and later versions, do the following:
- The reports will be available in the following location:
/opt/rsa/openscap/
Note : For NetWitness Platform 12.3.1 and previous versions, detailed information regarding STIG will be available in the respective system maintenance guide.
Manage STIG Controls Script (manage-stig-controls)Manage STIG Controls Script (manage-stig-controls)
You can use the manage-stig-controls script and its arguments to enable or disable STIG Control groups for which you want to apply STIG configuration. You can specify all hosts or individual hosts as arguments and you can enable or disable all control groups or individual control groups. This script is available in /usr/bin/ directory.
To manage STIG controls for a host:
- SSH to the NW Server host or use the Console from the NetWitness Platform User Interface.
- Submit the manage-stig-controls script with the commands, control groups, and other arguments you want to apply.
- Reboot the host.
CommandsCommands
Command | Description |
---|---|
--enable-all-controls |
Enables all STIG controls. For example: manage-stig-controls --enable-all-controls |
--disable-all-controls | Disables all STIG controls. For example:
manage-stig-controls --disable-all-controls |
--enable-default-controls | Enables all STIG Controls except ssh-prevent-root and fips-kernel. For example: manage-stig-controls --enable-default-controls |
--enable-control-groups <IDs> | Enables (comma delimited) list of STIG Control GroupIDs. For example: manage-stig-controls --enable-control-groups '1, 2, 3' |
--disable-control-groups <IDs> |
Disables (comma delimited) list of STIG Control Group IDs For example: manage-stig-controls --disable-control-groups '1, 2, 3' |
Control GroupsControl Groups
You use the ID as an argument for the control group or groups.
ID | Group | Description | Specified by Default |
---|---|---|---|
1 |
ssh-prevent-root | Prevent root login through SSH. |
no |
2 | ssh | SSH STIG configuration. | yes |
3 |
fips-kernel | FIPS Kernel configuration |
no |
4 | auth | Authentication STIG configuration | yes |
5 |
audit |
Audit STIG configuration |
yes |
6 | packages | RPM Package STIG configuration | yes |
7 |
services |
Services STIG configuration |
yes |
8 |
mount |
Mount STIG configuration |
yes |
Other ArgumentsOther Arguments
Argument | Description |
---|---|
--host-all |
Apply STIG configuration to all hosts. For example: manage-stig-controls --host-all |
--skip-health-checks | Disable health checks for all hosts (not recommended). For example: manage-stig-controls --skip-health-checks |
--host-id <id> | Apply STIG configuration for the host identified by <id> (host identification code). For example: manage-stig-controls --host-id <id> |
--host-name <display-name> |
Apply STIG configuration for host identified by <display-name>. display-name is the value shown under Name in the (Admin) > Hosts View in the NetWitness Platform Interface. For example: manage-stig-controls --host-name <display-name> |
--host-addr <Hostname-in UI> |
Apply STIG configuration for the host identified by the value shown under Hostname in the (Admin) > Hosts > Edit dialog in the NetWitness Platform Interface. This value can be an ip-addres (default) or a user-specified name. For example: manage-stig-controls --host-addr <hostname> |
-v, --verbose |
Enable verbose output. For example: manage-stig-controls -v |
Rules ListRules List
The following table lists all the STIG rules with their:
- Control Group - you can use the Control Group ID as an argument in the manage-stig-controls script to expand on reduce the scope of rules checked. (1= ssh-prevent-root, 2 = ssh, 3 = fips-kernel, 4 = auth, 5 = audit, 6 = packages, 7 = services)
- Default Status - tells you if the rule is enabled or disabled by default.
- Passed or Exception status - tells you if the rule passed (that is, complies with STIG) or is an exception.
CCE Number |
Rule Name |
Control Group |
Default Status |
Passed/ Exception |
---|---|---|---|---|
CCE-82155-3 |
Enable Dracut FIPS Module |
fips-kernel |
disabled |
Exception |
CCE-80942-6 |
Enable FIPS Mode |
fips-kernel |
disabled |
Exception |
CCE-84027-2 |
Set kernel parameter 'crypto.fips_enabled' to 1 |
fips-kernel |
disabled |
Exception |
CCE-80934-3 |
Configure BIND to use System Crypto Policy |
N/A |
N/A |
Passed |
CCE-80935-0 |
Configure System Cryptography Policy |
fips-kernel |
disabled |
Exception |
CCE-80936-8 |
Configure Kerberos to use System Crypto Policy |
N/A |
N/A |
Exception |
CCE-80937-6 |
Configure Libreswan to use System Crypto Policy |
N/A |
N/A |
Passed |
CCE-85902-5 |
Configure SSH Client to Use FIPS 140-2 Validated Ciphers: openssh.config |
N/A |
enabled |
Passed |
CCE-80947-5 |
The Installed Operating System Is Vendor Supported |
N/A |
enabled |
Passed |
CCE-80789-1 |
Encrypt Partitions |
N/A |
N/A |
Exception |
CCE-80823-8 |
Disable GDM Automatic Login |
N/A |
N/A |
N/A |
CCE-84028-0 |
Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME3 |
N/A |
N/A |
N/A |
CCE-80795-8 |
Ensure AlmaLinux GPG Key Installed |
N/A |
enabled |
Passed |
CCE-80790-9 |
Ensure gpgcheck Enabled In Main yum Configuration |
N/A |
enabled |
Passed |
CCE-80791-7 |
Ensure gpgcheck Enabled for Local Packages |
packages |
enabled |
Passed |
CCE-80792-5 |
Ensure gpgcheck Enabled for All yum Package Repositories |
N/A |
enabled |
Passed |
CCE-80784-2 |
Disable Ctrl-Alt-Del Burst Action |
services |
enabled |
Passed |
CCE-80785-9 |
Disable Ctrl-Alt-Del Reboot Activation |
services |
enabled |
Passed |
CCE-80841-0 |
Prevent Login to Accounts With Empty Password |
ssh |
enabled |
Passed |
CCE-80649-7 |
Verify Only Root Has UID 0 |
N/A |
enabled |
Passed |
CCE-83561-1 |
Set the Boot Loader Admin Username to a Non-Default Value |
fips-kernel |
disabled |
Exception |
CCE-80828-7 |
Set Boot Loader Password in grub2 |
fips-kernel |
disabled |
Exception |
CCE-80829-5 |
Set the UEFI Boot Loader Password |
N/A |
N/A |
N/A |
CCE-80869-1 |
Ensure SELinux State is Enforcing |
N/A |
enabled |
Exception |
CCE-82414-4 |
Uninstall vsftpd Package |
N/A |
enabled |
Passed |
CCE-82184-3 |
Uninstall rsh-server Package |
N/A |
enabled |
Passed |
CCE-84055-3 |
Remove Host-Based Authentication Files |
N/A |
enabled |
Passed |
CCE-84056-1 |
Remove User Host-Based Authentication Files |
N/A |
enabled |
Passed |
CCE-82182-7 |
Uninstall telnet-server Package |
N/A |
enabled |
Passed |
CCE-82436-7 |
Uninstall tftp-server Package |
N/A |
enabled |
Passed |
CCE-80896-4 |
Disable SSH Access via Empty Passwords |
ssh |
enabled |
Passed |
CCE-80844-4 |
Install AIDE |
N/A |
N/A |
Exception |
CCE-80675-2 |
Build and Test AIDE Database |
N/A |
N/A |
Exception |
CCE-85964-5 |
Configure AIDE to Verify the Audit Tools |
N/A |
N/A |
Exception |
CCE-82891-3 |
Configure Notification of Post-AIDE Scan Details |
N/A |
N/A |
Exception |
CCE-86239-1 |
Audit Tools Must Be Group-owned by Root |
N/A |
enabled |
Passed |
CCE-86259-9 |
Audit Tools Must Be Owned by Root |
N/A |
enabled |
Passed |
CCE-86227-6 |
Audit Tools Must Have a Mode of 0755 or Less Permissive |
N/A |
enabled |
Passed |
CCE-84254-2 |
Configure GnuTLS library to use DoD-approved TLS Encryption |
ssh |
enabled |
Passed |
CCE-80938-4 |
Configure OpenSSL library to use System Crypto Policy |
N/A |
enabled |
Passed |
CCE-84255-9 |
Configure OpenSSL library to use TLS Encryption |
N/A |
enabled |
Passed |
CCE-80939-2 |
Configure SSH to use System Crypto Policy |
N/A |
enabled |
Passed |
CCE-85897-7 |
Configure SSH Server to Use FIPS 140-2 Validated Ciphers: opensshserver.config |
N/A |
enabled |
Passed |
CCE-85870-4 |
Configure SSH Client to Use FIPS 140-2 Validated MACs: openssh.config |
N/A |
enabled |
Passed |
CCE-85899-3 |
Configure SSH Server to Use FIPS 140-2 Validated MACs: opensshserver.config |
N/A |
enabled |
Passed |
CCE-86260-7 |
Install McAfee Endpoint Security for Linux (ENSL) |
N/A |
N/A |
Exception |
CCE-86261-5 |
Ensure McAfee Endpoint Security for Linux (ENSL) is running |
N/A |
N/A |
Exception |
CCE-82730-3 |
Ensure /var/tmp Located On Separate Partition |
N/A |
N/A |
Exception |
CCE-86195-5 |
Disable the GNOME3 Login User List |
N/A |
N/A |
N/A |
CCE-83910-0 |
Enable the GNOME3 Screen Locking On Smartcard Removal |
N/A |
N/A |
N/A |
CCE-80775-0 |
Set GNOME3 Screensaver Inactivity Timeout |
N/A |
N/A |
N/A |
CCE-80776-8 |
Set GNOME3 Screensaver Lock Delay After Activation Period |
N/A |
N/A |
N/A |
CCE-80777-6 |
Enable GNOME3 Screensaver Lock After Idle Period |
N/A |
N/A |
N/A |
CCE-80780-0 |
Ensure Users Cannot Change GNOME3 Screensaver Settings |
N/A |
N/A |
N/A |
CCE-80781-8 |
Ensure Users Cannot Change GNOME3 Session Idle Settings |
N/A |
N/A |
N/A |
CCE-82202-3 |
Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate |
N/A |
enabled |
Passed |
CCE-82197-5 |
Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD |
N/A |
disabled |
Exception |
N/A |
The operating system must require Re-Authentication when using the sudo command. Ensure sudo timestamp_timeout is appropriate - sudo timestamp_timeout |
N/A |
disabled |
Exception |
CCE-83425-9 |
The operating system must restrict privilege elevation to authorized personnel |
N/A |
enabled |
Passed |
CCE-86377-9 |
Ensure sudo only includes the default configuration directory |
N/A |
enabled |
Passed |
CCE-83422-6 |
Ensure invoking users password for privilege escalation when using sudo |
N/A |
N/A |
Exception |
CCE-82943-2 |
Uninstall gssproxy Package |
N/A |
N/A |
Exception |
CCE-82946-5 |
Uninstall iprutils Package |
N/A |
N/A |
Exception |
CCE-82931-7 |
Uninstall krb5-workstation Package |
N/A |
N/A |
N/A |
CCE-82904-4 |
Uninstall tuned Package |
N/A |
N/A |
Exception |
CCE-80865-9 |
Ensure Software Patches Installed |
N/A |
enabled |
Passed |
CCE-80768-5 |
Enable GNOME3 Login Warning Banner |
N/A |
N/A |
N/A |
CCE-80770-1 |
Set the GNOME3 Login Warning Banner Text |
N/A |
N/A |
N/A |
CCE-80763-6 |
Modify the System Login Banner |
ssh |
enabled |
EXCEPTION |
CCE-86248-2 |
An SELinux Context must be configured for the pam_faillock.so records directory |
auth |
enabled |
Passed |
CCE-83478-8 |
Limit Password Reuse: password-auth |
N/A |
N/A |
Exception |
CCE-83480-4 |
Limit Password Reuse: system-auth |
N/A |
N/A |
Exception |
CCE-86099-9 |
Account Lockouts Must Be Logged |
N/A |
N/A |
Exception |
CCE-80667-9 |
Lock Accounts After Failed Password Attempts |
N/A |
N/A |
Exception |
CCE-80668-7 |
Configure the root Account for Failed Password Attempts |
N/A |
N/A |
Exception |
CCE-86067-6 |
Lock Accounts Must Persist |
N/A |
N/A |
Exception |
CCE-80669-5 |
Set Interval For Counting Failed Password Attempts |
N/A |
N/A |
Exception |
CCE-87096-4 |
Do Not Show System Messages When Unsuccessful Logon Attempts Occur |
N/A |
enabled |
Passed |
CCE-80670-3 |
Set Lockout Time for Failed Password Attempts |
N/A |
N/A |
Exception |
CCE-80653-9 |
Ensure PAM Enforces Password Requirements - Minimum Digit Characters |
auth |
enabled |
Passed |
CCE-86233-4 |
Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words |
N/A |
N/A |
fail |
CCE-80654-7 |
Ensure PAM Enforces Password Requirements - Minimum Different Characters |
auth |
enabled |
Passed |
CCE-80655-4 |
Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters |
auth |
enabled |
Passed |
CCE-81034-1 |
Ensure PAM Enforces Password Requirements - Maximum Consecutive Repeating Characters from Same Character Class |
auth |
enabled |
Passed |
CCE-82066-2 |
Set Password Maximum Consecutive Repeating Characters |
auth |
enabled |
Passed |
CCE-82046-4 |
Ensure PAM Enforces Password Requirements - Minimum Different Categories |
auth |
enabled |
Passed |
CCE-80656-2 |
Ensure PAM Enforces Password Requirements - Minimum Length |
auth |
enabled |
Passed |
CCE-80663-8 |
Ensure PAM Enforces Password Requirements - Minimum Special Characters |
auth |
enabled |
Passed |
CCE-85877-9 |
Ensure PAM password complexity module is enabled in password-auth |
auth |
enabled |
Passed |
CCE-85872-0 |
Ensure PAM password complexity module is enabled in system-auth |
auth |
enabled |
Passed |
CCE-80664-6 |
Ensure PAM Enforces Password Requirements - Authentication Retry Prompts Permitted Per-Session |
auth |
enabled |
Passed |
CCE-80665-3 |
Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters |
auth |
enabled |
Passed |
CCE-80892-3 |
Set Password Hashing Algorithm in /etc/login.defs |
N/A |
enabled |
Passed |
CCE-85945-4 |
Set PAM''s Password Hashing Algorithm - password-auth |
auth |
enabled |
Passed |
CCE-80893-1 |
Set PAM''s Password Hashing Algorithm |
auth |
enabled |
Passed |
CCE-89707-4 |
Set Password Hashing Rounds in /etc/login.defs |
N/A |
enabled |
Passed |
CCE-80644-8 |
Install the tmux Package |
N/A |
disabled |
Exception |
CCE-90782-4 |
Support session locking with tmux (not enforcing) |
N/A |
N/A |
N/A |
CCE-82199-1 |
Configure tmux to lock session after inactivity |
N/A |
disabled |
Exception |
CCE-80940-0 |
Configure the tmux Lock Command |
N/A |
disabled |
Exception |
CCE-80846-9 |
Install the opensc Package For Multifactor Authentication |
N/A |
disabled |
Exception |
CCE-84029-8 |
Install Smart Card Packages For Multifactor Authentication |
N/A |
disabled |
Exception |
CCE-80876-6 |
Disable debug-shell SystemD Service |
N/A |
enabled |
Passed |
CCE-82186-8 |
Require Authentication for Emergency Systemd Target |
N/A |
enabled |
Passed |
CCE-80855-0 |
Require Authentication for Single User Mode |
N/A |
enabled |
Passed |
CCE-80954-1 |
Set Account Expiration Following Inactivity |
N/A |
enabled |
Passed |
CCE-85910-8 |
Assign Expiration Date to Emergency Accounts |
N/A |
disabled |
Exception |
CCE-82474-8 |
Assign Expiration Date to Temporary Accounts |
N/A |
disabled |
Exception |
CCE-80647-1 |
Set Password Maximum Age |
auth |
enabled |
Passed |
CCE-80648-9 |
Set Password Minimum Age |
auth |
enabled |
Passed |
CCE-82473-0 |
Set Existing Passwords Maximum Age |
N/A |
disabled |
Exception |
CCE-82472-2 |
Set Existing Passwords Minimum Age |
N/A |
disabled |
Exception |
CCE-83484-6 |
Verify All Account Password Hashes are Shadowed with SHA512 |
N/A |
disabled |
Exception |
CCE-89903-9 |
Ensure All Accounts on the System Have Unique User IDs |
N/A |
enabled |
Passed |
CCE-85987-6 |
Only Authorized Local User Accounts Exist on Operating System |
N/A |
disabled |
Exception |
CCE-81036-6 |
Ensure the Default Bash Umask is Set Correctly |
N/A |
disabled |
Exception |
CCE-81037-4 |
Ensure the Default C Shell Umask is Set Correctly |
N/A |
disabled |
Exception |
CCE-82888-9 |
Ensure the Default Umask is Set Correctly in login.defs |
N/A |
enabled |
Passed |
CCE-81035-8 |
Ensure the Default Umask is Set Correctly in /etc/profile |
N/A |
disabled |
Exception |
CCE-84044-7 |
Ensure the Default Umask is Set Correctly For Interactive Users |
N/A |
enabled |
Passed |
CCE-83789-8 |
Ensure Home Directories are Created for New Users |
N/A |
enabled |
Passed |
CCE-84037-1 |
Ensure the Logon Failure Delay is Set Correctly in login.defs |
N/A |
enabled |
Passed |
CCE-84039-7 |
User Initialization Files Must Not Run World-Writable Programs |
N/A |
enabled |
Passed |
CCE-84040-5 |
Ensure that Users Path Contains Only Local Directories |
N/A |
N/A |
Exception |
CCE-84036-3 |
All Interactive Users Must Have A Home Directory Defined |
N/A |
enabled |
Passed |
CCE-83424-2 |
All Interactive Users Home Directories Must Exist |
N/A |
disabled |
Exception |
N/A |
All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary User |
N/A |
enabled |
Passed |
CCE-85888-6 |
All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive |
N/A |
disabled |
Exception |
N/A |
All Interactive User Home Directories Must Be Group-Owned By The Primary User |
N/A |
enabled |
Passed |
CCE-84043-9 |
Ensure All User Initialization Files Have Mode 0740 Or Less Permissive |
N/A |
N/A |
Exception |
CCE-84038-9 |
All Interactive User Home Directories Must Have mode 0750 Or Less Permissive |
N/A |
N/A |
Exception |
CCE-88248-0 |
Enable authselect |
N/A |
N/A |
Exception |
CCE-80685-1 |
Record Events that Modify the System's Discretionary Access Controls - chmod |
audit |
default |
Passed |
CCE-80686-9 |
Record Events that Modify the System's Discretionary Access Controls - chown |
audit |
default |
Passed |
CCE-80687-7 |
Record Events that Modify the System's Discretionary Access Controls - fchmod |
audit |
default |
Passed |
CCE-80688-5 |
Record Events that Modify the System's Discretionary Access Controls - fchmodat |
audit |
default |
Passed |
CCE-80689-3 |
Record Events that Modify the System's Discretionary Access Controls - fchown |
audit |
default |
Passed |
CCE-80690-1 |
Record Events that Modify the System's Discretionary Access Controls - fchownat |
audit |
default |
Passed |
CCE-80691-9 |
Record Events that Modify the System's Discretionary Access Controls - fremovexattr |
audit |
default |
Passed |
CCE-80692-7 |
Record Events that Modify the System's Discretionary Access Controls - fsetxattr |
audit |
default |
Passed |
CCE-80693-5 |
Record Events that Modify the System's Discretionary Access Controls - lchown |
audit |
default |
Passed |
CCE-80694-3 |
Record Events that Modify the System's Discretionary Access Controls - lremovexattr |
audit |
default |
Passed |
CCE-80695-0 |
Record Events that Modify the System's Discretionary Access Controls - lsetxattr |
audit |
default |
Passed |
CCE-80696-8 |
Record Events that Modify the System's Discretionary Access Controls - removexattr |
audit |
default |
Passed |
CCE-80697-6 |
Record Events that Modify the System's Discretionary Access Controls - setxattr |
audit |
default |
Passed |
CCE-89446-9 |
Record Any Attempts to Run chacl |
audit |
disabled |
Exception |
CCE-88437-9 |
Record Any Attempts to Run setfacl |
audit |
disabled |
Exception |
CCE-80698-4 |
Record Any Attempts to Run chcon |
audit |
default |
Passed |
CCE-80700-8 |
Record Any Attempts to Run semanage |
audit |
default |
Passed |
CCE-82280-9 |
Record Any Attempts to Run setfiles |
audit |
default |
Passed |
CCE-80701-6 |
Record Any Attempts to Run setsebool |
audit |
default |
Passed |
CCE-80703-2 |
Ensure auditd Collects File Deletion Events by User - rename |
audit |
default |
Passed |
CCE-80704-0 |
Ensure auditd Collects File Deletion Events by User - renameat |
audit |
default |
Passed |
CCE-80705-7 |
Ensure auditd Collects File Deletion Events by User - rmdir |
audit |
default |
Passed |
CCE-80706-5 |
Ensure auditd Collects File Deletion Events by User - unlink |
audit |
default |
Passed |
CCE-80707-3 |
Ensure auditd Collects File Deletion Events by User - unlinkat |
audit |
default |
Passed |
CCE-80751-1 |
Record Unsuccessful Access Attempts to Files - creat |
audit |
default |
Passed |
CCE-80752-9 |
Record Unsuccessful Access Attempts to Files - ftruncate |
audit |
default |
Passed |
CCE-80753-7 |
Record Unsuccessful Access Attempts to Files - open |
audit |
default |
Passed |
CCE-80755-2 |
Record Unsuccessful Access Attempts to Files - open_by_handle_at |
audit |
default |
Passed |
CCE-80754-5 |
Record Unsuccessful Access Attempts to Files - openat |
audit |
default |
Passed |
CCE-80756-0 |
Record Unsuccessful Access Attempts to Files - truncate |
audit |
default |
Passed |
CCE-80711-5 |
Ensure auditd Collects Information on Kernel Module Unloading - delete_module |
audit |
default |
Passed |
CCE-80712-3 |
Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module |
audit |
default |
Passed |
CCE-80713-1 |
Ensure auditd Collects Information on Kernel Module Loading - init_module |
audit |
default |
Passed |
CCE-80719-8 |
Record Attempts to Alter Logon and Logout Events - lastlog |
audit |
default |
Passed |
CCE-80725-5 |
Ensure auditd Collects Information on the Use of Privileged Commands - chage |
audit |
enabled |
Passed |
CCE-80726-3 |
Ensure auditd Collects Information on the Use of Privileged Commands - chsh |
audit |
enabled |
Passed |
CCE-80727-1 |
Ensure auditd Collects Information on the Use of Privileged Commands - crontab |
audit |
enabled |
Passed |
CCE-80728-9 |
Ensure auditd Collects Information on the Use of Privileged Commands - gpasswd |
audit |
enabled |
Passed |
CCE-89455-0 |
Ensure auditd Collects Information on the Use of Privileged Commands - kmod |
audit |
enabled |
Passed |
CCE-80989-7 |
Ensure auditd Collects Information on the Use of Privileged Commands - mount |
audit |
enabled |
Passed |
CCE-80729-7 |
Ensure auditd Collects Information on the Use of Privileged Commands - newgrp |
audit |
enabled |
Passed |
CCE-80730-5 |
Ensure auditd Collects Information on the Use of Privileged Commands - pam_timestamp_check |
audit |
enabled |
Passed |
CCE-80731-3 |
Ensure auditd Collects Information on the Use of Privileged Commands - passwd |
audit |
enabled |
Passed |
CCE-80732-1 |
Ensure auditd Collects Information on the Use of Privileged Commands - postdrop |
audit |
enabled |
Passed |
CCE-80733-9 |
Ensure auditd Collects Information on the Use of Privileged Commands - postqueue |
audit |
enabled |
Passed |
CCE-85944-7 |
Record Any Attempts to Run ssh-agent |
audit |
enabled |
Passed |
CCE-80735-4 |
Ensure auditd Collects Information on the Use of Privileged Commands - ssh-keysign |
audit |
enabled |
Passed |
CCE-80736-2 |
Ensure auditd Collects Information on the Use of Privileged Commands - su |
audit |
enabled |
Passed |
CCE-80737-0 |
Ensure auditd Collects Information on the Use of Privileged Commands - sudo |
audit |
enabled |
Passed |
CCE-80739-6 |
Ensure auditd Collects Information on the Use of Privileged Commands - umount |
audit |
enabled |
Passed |
CCE-80740-4 |
Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd |
audit |
enabled |
Passed |
CCE-89480-8 |
Ensure auditd Collects Information on the Use of Privileged Commands - unix_update |
audit |
enabled |
Passed |
CCE-80741-2 |
Ensure auditd Collects Information on the Use of Privileged Commands - userhelper |
audit |
enabled |
Passed |
CCE-86027-0 |
Ensure auditd Collects Information on the Use of Privileged Commands - usermod |
audit |
enabled |
Passed |
CCE-80708-1 |
Make the auditd Configuration Immutable |
audit |
disabled |
Exception |
CCE-90783-2 |
Configure immutable Audit login UIDs |
audit |
enabled |
Passed |
CCE-80722-2 |
Ensure auditd Collects Information on Exporting to Media (successful) |
audit |
enabled |
Passed |
CCE-90175-1 |
Ensure auditd Collects System Administrator Actions - /etc/sudoers |
audit |
enabled |
Passed |
CCE-89497-2 |
Ensure auditd Collects System Administrator Actions - /etc/sudoers.d/ |
audit |
enabled |
Passed |
CCE-83556-1 |
Record Events When Privileged Executables Are Run |
audit |
enabled |
Passed |
CCE-80758-6 |
Record Events that Modify User/Group Information - /etc/group |
audit |
enabled |
Passed |
CCE-80759-4 |
Record Events that Modify User/Group Information - /etc/gshadow |
audit |
enabled |
Passed |
CCE-80760-2 |
Record Events that Modify User/Group Information - /etc/security/opasswd |
audit |
enabled |
Passed |
CCE-80761-0 |
Record Events that Modify User/Group Information - /etc/passwd |
audit |
enabled |
Passed |
CCE-80762-8 |
Record Events that Modify User/Group Information - /etc/shadow |
audit |
enabled |
Passed |
CCE-88225-8 |
System Audit Directories Must Be Group Owned By Root |
N/A |
enabled |
Passed |
CCE-88226-6 |
System Audit Directories Must Be Owned By Root |
N/A |
enabled |
Passed |
CCE-84048-8 |
System Audit Logs Must Have Mode 0750 or Less Permissive |
N/A |
enabled |
Passed |
CCE-88227-4 |
System Audit Logs Must Be Group Owned By Root |
N/A |
enabled |
Passed |
CCE-88228-2 |
System Audit Logs Must Be Owned By Root |
N/A |
enabled |
Passed |
CCE-80819-6 |
System Audit Logs Must Have Mode 0640 or Less Permissive |
N/A |
enabled |
Passed |
CCE-84005-8 |
Configure a Sufficiently Large Partition for Audit Logs |
N/A |
N/A |
Exception |
CCE-84046-2 |
Configure auditd Disk Error Action on Disk Error |
audit |
enabled |
Passed |
CCE-84045-4 |
Configure auditd Disk Full Action when Disk Space Is Full |
audit |
enabled |
Passed |
CCE-80678-6 |
Configure auditd mail_acct Action on Low Disk Space |
audit |
enabled |
Passed |
CCE-80684-4 |
Configure auditd space_left Action on Low Disk Space |
audit |
enabled |
Passed |
CCE-86055-1 |
Configure auditd space_left on Low Disk Space |
audit |
enabled |
Passed |
CCE-82233-8 |
Include Local Events in Audit Logs |
N/A |
enabled |
Passed |
CCE-82897-0 |
Set hostname as computer node name in audit logs |
audit |
enabled |
Passed |
CCE-85889-4 |
Appropriate Action Must be Setup When the Internal Audit Event Queue is Full |
audit |
enabled |
Passed |
CCE-81043-2 |
Ensure the audit Subsystem is Installed |
N/A |
enabled |
Passed |
CCE-80872-5 |
Enable auditd Service |
N/A |
enabled |
Passed |
CCE-83542-1 |
Set the UEFI Boot Loader Admin Username to a Non-Default Value |
N/A |
N/A |
N/A |
CCE-80946-7 |
Disable vsyscalls |
N/A |
N/A |
Exception |
CCE-80859-2 |
Ensure cron Is Logging To Rsyslog |
N/A |
enabled |
Passed |
CCE-86339-9 |
Ensure Rsyslog Authenticates Off-Loaded Audit Records |
N/A |
disabled |
Exception |
CCE-85992-6 |
Ensure Rsyslog Encrypts Off-Loaded Audit Records |
N/A |
disabled |
Exception |
CCE-86098-1 |
Ensure Rsyslog Encrypts Off-Loaded Audit Records |
N/A |
disabled |
Exception |
CCE-83426-7 |
Ensure remote access methods are monitored in Rsyslog |
N/A |
disabled |
Exception |
CCE-80863-4 |
Ensure Logs Sent To Remote Host |
N/A |
disabled |
Exception |
CCE-82859-0 |
Ensure rsyslog-gnutls is installed |
N/A |
disabled |
Exception |
CCE-80847-7 |
Ensure rsyslog is Installed |
N/A |
enabled |
Passed |
CCE-80886-5 |
Enable rsyslog Service |
N/A |
enabled |
Passed |
CCE-82998-6 |
Install firewalld Package |
N/A |
enabled |
Passed |
CCE-80877-4 |
Verify firewalld Enabled |
N/A |
disabled |
Exception |
CCE-84300-3 |
Configure the Firewalld Ports |
N/A |
disabled |
Exception |
CCE-81006-9 |
Configure Accepting Router Advertisements on All IPv6 Interfaces |
N/A |
disabled |
Exception |
CCE-81009-3 |
Disable Accepting ICMP Redirects for All IPv6 Interfaces |
N/A |
disabled |
Exception |
CCE-81013-5 |
Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces |
N/A |
disabled |
Exception |
CCE-82863-2 |
Disable Kernel Parameter for IPv6 Forwarding |
N/A |
disabled |
Exception |
CCE-81007-7 |
Disable Accepting Router Advertisements on all IPv6 Interfaces by Default |
N/A |
disabled |
Exception |
CCE-81010-1 |
Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces |
N/A |
disabled |
Exception |
CCE-81015-0 |
Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default |
N/A |
disabled |
Exception |
CCE-80917-8 |
Disable Accepting ICMP Redirects for All IPv4 Interfaces |
N/A |
enabled |
Passed |
CCE-81011-9 |
Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces |
N/A |
enabled |
Passed |
CCE-86220-1 |
Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces |
N/A |
disabled |
Exception |
CCE-81021-8 |
Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces |
N/A |
enabled |
Passed |
CCE-80919-4 |
Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces |
N/A |
enabled |
Passed |
CCE-80920-2 |
Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default |
N/A |
disabled |
Exception |
CCE-80922-8 |
Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces |
N/A |
enabled |
Passed |
CCE-80918-6 |
Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces |
N/A |
enabled |
Passed |
CCE-80921-0 |
Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default |
N/A |
enabled |
Passed |
CCE-82028-2 |
Disable ATM Support |
services |
enabled |
Passed |
CCE-82059-7 |
Disable CAN Support |
services |
enabled |
Passed |
CCE-80834-5 |
Disable SCTP Support |
services |
enabled |
Passed |
CCE-80832-9 |
Disable Bluetooth Kernel Module |
services |
enabled |
Passed |
CCE-83501-7 |
Deactivate Wireless Network Interfaces |
N/A |
N/A |
N/A |
CCE-84049-6 |
Configure Multiple DNS Servers in /etc/resolv.conf |
N/A |
enabled |
Passed |
CCE-82283-3 |
Ensure System is Not Acting as a Network Sniffer |
N/A |
enabled |
Passed |
CCE-83659-3 |
Verify Group Who Owns /var/log Directory |
N/A |
enabled |
Passed |
CCE-83660-1 |
Verify Group Who Owns /var/log/messages File |
N/A |
enabled |
Passed |
CCE-83661-9 |
Verify User Who Owns /var/log Directory |
N/A |
enabled |
Passed |
CCE-83662-7 |
Verify User Who Owns /var/log/messages File |
N/A |
enabled |
Passed |
CCE-83663-5 |
Verify Permissions on /var/log Directory |
N/A |
enabled |
Passed |
CCE-83665-0 |
Verify Permissions on /var/log/messages File |
N/A |
disabled |
Exception |
CCE-85894-4 |
Verify that Shared Library Directories Have Root Group Ownership |
N/A |
enabled |
Passed |
CCE-89021-0 |
Verify that Shared Library Directories Have Root Ownership |
N/A |
enabled |
Passed |
CCE-88692-9 |
Verify that Shared Library Directories Have Restrictive Permissions |
N/A |
disabled |
fail |
CCE-86519-6 |
Verify that system commands files are group owned by root or a system account |
N/A |
disabled |
fail |
CCE-80806-3 |
Verify that System Executables Have Root Ownership |
N/A |
disabled |
fail |
CCE-80807-1 |
Verify that Shared Library Files Have Root Ownership |
N/A |
enabled |
Passed |
CCE-80809-7 |
Verify that System Executables Have Restrictive Permissions |
N/A |
enabled |
Passed |
CCE-80815-4 |
Verify that Shared Library Files Have Restrictive Permissions |
N/A |
enabled |
Passed |
CCE-86523-8 |
Verify the system-wide library files in directories "/lib", "/lib64", "/usr/lib/" and "/usr/lib64" are group-owned by root. |
N/A |
enabled |
Passed |
CCE-83375-6 |
Ensure All World-Writable Directories Are Owned by root user |
N/A |
disabled |
fail |
CCE-80783-4 |
Verify that All World-Writable Directories Have Sticky Bits Set |
N/A |
disabled |
fail |
CCE-85886-0 |
Ensure All World-Writable Directories Are Group Owned by a System Account |
N/A |
disabled |
fail |
CCE-85871-2 |
Verify Permissions on /etc/audit/auditd.conf |
audit |
enabled |
Passed |
CCE-85875-3 |
Verify Permissions on /etc/audit/rules.d/*.rules |
audit |
enabled |
Passed |
CCE-83497-8 |
Ensure All Files Are Owned by a Group |
N/A |
enabled |
Passed |
CCE-83499-4 |
Ensure All Files Are Owned by a User |
N/A |
enabled |
Passed |
CCE-81027-5 |
Enable Kernel Parameter to Enforce DAC on Hardlinks |
N/A |
enabled |
Passed |
CCE-81030-9 |
Enable Kernel Parameter to Enforce DAC on Symlinks |
N/A |
enabled |
Passed |
CCE-80873-3 |
Disable the Automounter |
N/A |
enabled |
Passed |
CCE-80835-2 |
Disable Modprobe Loading of USB Storage Driver |
N/A |
enabled |
Passed |
CCE-86038-7 |
Add nosuid Option to /boot/efi |
N/A |
disabled |
Exception |
CCE-81033-3 |
Add nosuid Option to /boot |
mount |
enabled |
Passed |
CCE-80837-8 |
Add nodev Option to /dev/shm |
mount |
enabled |
Passed |
CCE-80838-6 |
Add noexec Option to /dev/shm |
mount |
enabled |
Passed |
CCE-80839-4 |
Add nosuid Option to /dev/shm |
mount |
enabled |
Passed |
CCE-83328-5 |
Add noexec Option to /home |
mount |
disabled |
Exception |
CCE-81050-7 |
Add nosuid Option to /home |
mount |
default |
Passed |
CCE-82069-6 |
Add nodev Option to Non-Root Local Partitions |
N/A |
enabled |
Passed |
CCE-82742-8 |
Add nodev Option to Removable Media Partitions |
N/A |
enabled |
Passed |
CCE-82746-9 |
Add noexec Option to Removable Media Partitions |
N/A |
enabled |
Passed |
CCE-82744-4 |
Add nosuid Option to Removable Media Partitions |
N/A |
enabled |
Passed |
CCE-82623-0 |
Add nodev Option to /tmp |
N/A |
disabled |
Exception |
CCE-82139-7 |
Add noexec Option to /tmp |
N/A |
disabled |
Exception |
CCE-82140-5 |
Add nosuid Option to /tmp |
N/A |
disabled |
Exception |
CCE-82080-3 |
Add nodev Option to /var/log/audit |
N/A |
disabled |
Exception |
CCE-82975-4 |
Add noexec Option to /var/log/audit |
N/A |
disabled |
Exception |
CCE-82921-8 |
Add nosuid Option to /var/log/audit |
N/A |
disabled |
Exception |
CCE-82077-9 |
Add nodev Option to /var/log |
mount |
enabled |
Passed |
CCE-82008-4 |
Add noexec Option to /var/log |
mount |
enabled |
Passed |
CCE-82065-4 |
Add nosuid Option to /var/log |
mount |
enabled |
Passed |
CCE-82068-8 |
Add nodev Option to /var/tmp |
N/A |
disabled |
Exception |
CCE-82151-2 |
Add noexec Option to /var/tmp |
N/A |
disabled |
Exception |
CCE-82154-6 |
Add nosuid Option to /var/tmp |
N/A |
disabled |
Exception |
CCE-82881-4 |
Disable acquiring, saving, and processing core dumps |
N/A |
disabled |
Exception |
CCE-82251-0 |
Disable core dump backtraces |
N/A |
disabled |
Exception |
CCE-82252-8 |
Disable storing core dump |
N/A |
disabled |
Exception |
CCE-81038-2 |
Disable Core Dumps for All Users |
N/A |
disabled |
Exception |
CCE-80915-2 |
Restrict Exposed Kernel Pointer Addresses Access |
N/A |
enabled |
Passed |
CCE-80916-0 |
Enable Randomized Layout of Virtual Address Space |
N/A |
disabled |
Exception |
CCE-83918-3 |
Enable NX or XD Support in the BIOS |
N/A |
enabled |
Passed |
CCE-80944-2 |
Enable page allocator poisoning |
N/A |
disabled |
Exception |
CCE-80945-9 |
Enable SLUB/SLAB allocator poisoning |
N/A |
disabled |
Exception |
CCE-82215-5 |
Disable storing core dumps |
N/A |
disabled |
Exception |
CCE-80952-5 |
Disable Kernel Image Loading |
N/A |
disabled |
Exception |
CCE-82974-7 |
Disable Access to Network bpf() Syscall From Unprivileged Processes |
N/A |
disabled |
Exception |
CCE-80953-3 |
Restrict usage of ptrace to descendant processes |
N/A |
disabled |
Exception |
CCE-82934-1 |
Harden the operation of the BPF just-in-time compiler |
N/A |
disabled |
Exception |
CCE-82211-4 |
Disable the use of user namespaces |
N/A |
disabled |
Exception |
CCE-80868-3 |
Configure SELinux Policy |
N/A |
enabled |
Passed |
CCE-86353-0 |
Map System Users To The Appropriate SELinux Role |
N/A |
disabled |
Exception |
CCE-80948-3 |
Uninstall Automatic Bug Reporting Tool (abrt) |
N/A |
enabled |
Passed |
CCE-80878-2 |
Disable KDump Kernel Crash Analyzer (kdump) |
N/A |
enabled |
Passed |
CCE-82191-8 |
Install fapolicyd Package |
N/A |
disabled |
Exception |
CCE-82249-4 |
Enable the File Access Policy Service |
N/A |
disabled |
Exception |
CCE-86478-5 |
Configure Fapolicy Module to Employ a Deny-all, Permit-by-exception Policy to Allow the Execution of Authorized Software Programs. |
N/A |
disabled |
Exception |
CCE-85887-8 |
Remove the Kerberos Server Package |
N/A |
N/A |
N/A |
CCE-82175-1 |
Disable Kerberos by removing host keytab |
N/A |
N/A |
N/A |
CCE-89063-2 |
Configure System to Forward All Mail From Postmaster to The Root Account |
N/A |
enabled |
Passed |
CCE-84054-6 |
Prevent Unrestricted Mail Relaying |
N/A |
N/A |
N/A |
CCE-85983-5 |
The Postfix package is installed |
N/A |
disabled |
Exception |
CCE-81039-0 |
Uninstall Sendmail Package |
N/A |
enabled |
Passed |
CCE-84052-0 |
Mount Remote Filesystems with nodev |
N/A |
enabled |
Passed |
CCE-84050-4 |
Mount Remote Filesystems with noexec |
N/A |
enabled |
Passed |
CCE-84053-8 |
Mount Remote Filesystems with nosuid |
N/A |
enabled |
Passed |
CCE-84059-5 |
Configure Time Service Maxpoll Interval |
N/A |
enabled |
Passed |
CCE-86077-5 |
Ensure Chrony is only configured with the server directive |
N/A |
disabled |
Exception |
CCE-82434-2 |
Ensure tftp Daemon Uses Secure Mode |
N/A |
disabled |
N/A |
CCE-80907-9 |
Set SSH Client Alive Count Max |
ssh |
disabled |
Exception |
CCE-80897-2 |
Disable GSSAPI Authentication |
ssh |
enabled |
Passed |
CCE-80898-0 |
Disable Kerberos Authentication |
ssh |
enabled |
Passed |
CCE-80901-2 |
Disable SSH Root Login |
ssh |
disabled |
Exception |
CCE-80902-0 |
Disable SSH Support for User Known Hosts |
ssh |
enabled |
Passed |
CCE-83360-8 |
Disable X11 Forwarding |
ssh |
enabled |
Passed |
CCE-80903-8 |
Do Not Allow SSH Environment Options |
ssh |
enabled |
Passed |
CCE-80904-6 |
Enable Use of Strict Mode Checking |
N/A |
disabled |
Exception |
CCE-80905-3 |
Enable SSH Warning Banner |
ssh |
enabled |
Passed |
CCE-82281-7 |
Enable SSH Print Last Log |
N/A |
enabled |
Passed |
CCE-82177-7 |
Force frequent session key renegotiation |
N/A |
disabled |
Exception |
CCE-84058-7 |
Prevent remote hosts from connecting to the proxy display |
N/A |
disabled |
Exception |
CCE-83303-8 |
Install the OpenSSH Server Package |
N/A |
enabled |
Passed |
CCE-82426-8 |
Enable the OpenSSH Service |
N/A |
enabled |
Passed |
CCE-82424-3 |
Verify Permissions on SSH Server Private *_key Key Files |
N/A |
enabled |
Passed |
CCE-82428-4 |
Verify Permissions on SSH Server Public *.pub Key Files |
N/A |
enabled |
Passed |
CCE-86120-3 |
Certificate status checking in SSSD |
N/A |
N/A |
Exception |
CCE-86060-1 |
Enable Certmap in SSSD |
N/A |
N/A |
Exception |
CCE-80909-5 |
Enable Smartcards in SSSD |
N/A |
N/A |
Exception |
CCE-82460-7 |
Configure SSSD to Expire Offline Credentials |
N/A |
N/A |
Exception |
CCE-82959-8 |
Install usbguard Package |
N/A |
N/A |
Exception |
CCE-82853-3 |
Enable the USBGuard Service |
N/A |
N/A |
Exception |
CCE-83774-0 |
Generate USBGuard Policy |
N/A |
N/A |
Exception |
CCE-83411-9 |
Disable graphical user interface |
N/A |
enabled |
Passed |
CCE-83380-6 |
Disable X Windows Startup By Setting Default Target |
N/A |
enabled |
Passed |
CCE-84220-3 |
Configure AIDE to Verify Access Control Lists (ACLs) |
N/A |
disabled |
Exception |
CCE-83733-6 |
Configure AIDE to Verify Extended Attributes |
N/A |
disabled |
Exception |
CCE-81044-0 |
Ensure /home Located On Separate Partition |
N/A |
enabled |
Passed |
CCE-80851-9 |
Ensure /tmp Located On Separate Partition |
N/A |
disabled |
Exception |
CCE-80852-7 |
Ensure /var Located On Separate Partition |
N/A |
disabled |
Exception |
CCE-80853-5 |
Ensure /var/log Located On Separate Partition |
N/A |
enabled |
Passed |
CCE-80854-3 |
Ensure /var/log/audit Located On Separate Partition |
N/A |
disabled |
Exception |
CCE-82968-9 |
Install rng-tools Package |
N/A |
enabled |
Passed |
CCE-82919-2 |
Uninstall abrt-addon-ccpp Package |
N/A |
enabled |
Passed |
CCE-82926-7 |
Uninstall abrt-addon-kerneloops Package |
N/A |
enabled |
Passed |
CCE-82907-7 |
Uninstall abrt-cli Package |
N/A |
enabled |
Passed |
CCE-82910-1 |
Uninstall abrt-plugin-sosreport Package |
N/A |
enabled |
Passed |
CCE-89201-8 |
Uninstall libreport-plugin-logger Package |
N/A |
enabled |
Passed |
CCE-88955-0 |
Uninstall libreport-plugin-rhtsupport Package |
N/A |
enabled |
Passed |
CCE-86084-1 |
Uninstall python3-abrt-addon Package |
N/A |
enabled |
Passed |
CCE-82476-3 |
Ensure yum Removes Previous Package Versions |
N/A |
enabled |
Passed |
CCE-80788-3 |
Ensure PAM Displays Last Logon/Access Notification |
auth |
disabled |
Exception |
CCE-86135-1 |
Configure the tmux lock session key binding |
auth |
disabled |
Exception |
CCE-82361-7 |
Prevent user from disabling the screen lock |
N/A |
enabled |
Passed |
CCE-80955-8 |
Limit the Number of Concurrent Login Sessions Allowed Per User |
N/A |
enabled |
Passed |
CCE-82201-5 |
Resolve information before writing to audit logs |
N/A |
enabled |
Passed |
CCE-80825-3 |
Enable Auditing for Processes Which Start Prior to the Audit Daemon |
N/A |
disabled |
Exception |
CCE-80943-4 |
Extend Audit Backlog Limit for the Audit Daemon |
N/A |
disabled |
Exception |
CCE-82194-2 |
Enable Kernel Page-Table Isolation (KPTI) |
N/A |
disabled |
Exception |
CCE-82005-0 |
Disable IEEE 1394 (FireWire) Support |
services |
enabled |
Passed |
CCE-82297-3 |
Disable TIPC Support |
services |
enabled |
Passed |
CCE-81031-7 |
Disable Mounting of cramfs |
services |
enabled |
Passed |
CCE-80913-7 |
Restrict Access to Kernel Message Buffer |
N/A |
disabled |
Exception |
CCE-81054-9 |
Disallow kernel profiling by unprivileged users |
N/A |
disabled |
Exception |
CCE-82976-2 |
Install policycoreutils Package |
N/A |
enabled |
Passed |
CCE-82988-7 |
Disable chrony daemon from acting as server |
N/A |
disabled |
Exception |
CCE-82840-0 |
Disable network management of chrony daemon |
N/A |
enabled |
Passed |
CCE-82462-3 |
SSH server uses strong entropy to seed |
N/A |
disabled |
Exception |
CCE-82168-6 |
Log USBGuard daemon audit events using Linux Audit |
N/A |
disabled |
Exception |
Exceptions to STIG ComplianceExceptions to STIG Compliance
This topic contains:
- Rule exceptions that are the responsibility of the customer to resolve.
-
Rule exceptions that are "Not a Finding" which means that they do not apply to NetWitness Platform. NetWitness has verified that the system meets these requirements.
- Rules to be supported in future release.
Key to Elements in Exception Descriptions
CCE Number
The Common Configuration Enumeration (CCE), assigns unique entries (also called CCE numbers) to configuration guidance statements and configuration controls to improve workflow by facilitating fast and accurate correlation of configuration issues present in disparate domains. In this way, it is similar to other comparable data standards such as the Common Vulnerability and Exposure (CVE®) List (http://cve.mitre.org/cve), which assigns identifiers to publicly known system vulnerabilities. The OpenSCAP report lists exceptions by CCE number.
This sections lists the exceptions you can receive when you run the OpenSCAP report. The ID or Common Configuration Enumeration (CCE) number in the table is the identification number for the exception from the OpenSCAP report.
Control Group ID
Number that identifies the control group you specify in the manage-stig-controls script to enable or disable the rule.
ID | Group | Description | Specified by Default |
---|---|---|---|
1 |
ssh-prevent-root | Prevent root login through SSH. |
no |
2 | ssh | SSH STIG configuration. | yes |
3 |
fips-kernel | FIPS Kernel configuration |
no |
4 | auth | Authentication STIG configuration | yes |
5 |
audit |
Audit STIG configuration |
yes |
6 | packages | RPM Package STIG configuration | yes |
7 |
services |
Services STIG configuration |
yes |
8 |
mount |
Mount STIG configuration |
yes |
Check
Describes what the rule checks to identify exceptions to DISA STIG compliance.
Comments
Provides insight on why you would receive this exception. This section includes one of the following comments that describes the exception:
- Customer Responsibility - You are responsible to make sure the system meets this requirement.
- Not a Finding - Exception does not apply to NetWitness Platform. NetWitness has verified that the system meets this requirement.
- Future Feature - NetWitness Platform does not meet this requirement. NetWitness plans to fix this in a future release of NetWitness Platform.
Customer Responsibility ExceptionsCustomer Responsibility Exceptions
CCE-80844-4 Install AIDE (Control Group = n/a)
Check |
Install the AIDE package with the following command: |
---|---|
Comments |
Customer Responsibility. NetWitness Platform does not provide AIDE because it has a negative impact on performance. If you must install it, run as infrequently as possible to adhere to your security policy. |
CCE-80869-1 Ensure SELinux State is Enforcing
Check |
Ensure SELinux State is Enforcing |
---|---|
Comments |
SELinux state is default it is set to 'permissive' by default for all the NetWitness Platform hosts instead of 'Enforcing' due to performance impact. |
CCE-80901-2 Disable SSH Root Login (Control Group = ssh-prevent-root)
Check |
The root user should never be allowed to login to a system directly over a network. |
---|---|
Comments |
Customer Responsibility.Disable root login through SSH by adding or editing the following line in the /etc/ssh/sshd_config file: PermitRootLoginNetWitness. |
CCE-86260-7 Virus Scanning Software Definitions Are Updated (ENSL) (Control Group = n/a)
Check |
Make sure that virus definition files are no older than 7 days or their last release. |
---|---|
Comments | Customer Responsibility. NetWitness does not provide this software. |
CCE-80942-6 Enable FIPS Mode (Control Group = fips-kernel)
Check |
To ensure FIPS mode is enabled, install the dracut-fips package and rebuild initramfs by running the following commands: $ yum install dracut-fips dracut After the packages has been installed, enable fips mode with below command. fips-mode-setup --enable After the fips-mode-setup command has been run, add the fips=1 argument to the default GRUB 2 command line for the Linux operating system in the /etc/default/grub file as shown in the following example: GRUB_CMDLINE_LINUX='crashkernel=auto rd.lvm.lv=VolGroup/LogVol06 rd.lvm.lv=VolGroup/lv_swap rhgb quiet rd.shell=0 fips=1' Finally, rebuild the grub.cfg file by using the grub2-mkconfig -o command as follows ( On BIOS-based machines, issue the following command as root): ~]# grub2-mkconfig -o /boot/grub2/grub.cfg On UEFI-based machines, issue the following command as root: ~]# grub2-mkconfig -o /boot/efi/EFI/redhat/grub.cfg |
---|---|
Comments |
Customer Responsibility. NetWitness Platform does not enable it by default. |
CCE-82891-3 Configure Notification of Post-AIDE Scan Details (Control Group = n/a)
Check |
AIDE should notify appropriate personnel of the details of a scan after the scan has been run. If AIDE has already been configured for periodic execution in the /etc/crontab file, append the following line to the existing AIDE line: | /bin/mail -s '$(hostname) - AIDE Integrity Check' root@localhost Otherwise, add the following line to the /etc/crontab file: 05 4 * * * root /usr/sbin/aide --check | /bin/mail -s '$(hostname) - AIDE Integrity Check' root@localhost AIDE can be executed periodically through other means. This is just one example. |
---|---|
Comments |
Customer Responsibility. NetWitness Platform does not provide AIDE because it has a negative impact on performance. If you must install it, run as infrequently possible to adhere to your security policy. |
CCE-84220-3 Configure AIDE to Verify Access Control Lists (Control Group = n/a)
Check |
By default, the acl option is added to the FIPSR ruleset in AIDE. If using a custom ruleset or the acl option is missing, add acl to the appropriate ruleset. For example, add acl to the following line in the /etc/aide.conf file: FIPSR = p+i+n+u+g+s+m+c+acl+selinux+xattrs+sha256 AIDE rules can be configured in multiple ways; this is merely one example that is already configured by default. |
---|---|
Comments |
Customer Responsibility. NetWitness Platform does not provide AIDE because it has a negative impact on performance. If you must install it, run as infrequently possible to adhere to your security policy. |
CCE-83733-6 Configure AIDE to Verify Extended Attributes (Control Group = n/a)
Check |
By default, the xattrs option is added to the FIPSR ruleset in AIDE. If using a custom ruleset or the xattrs option is missing, add xattrs to the appropriate ruleset. For example, add xattrs to the following line in the /etc/aide.conf file: FIPSR = p+i+n+u+g+s+m+c+acl+selinux+xattrs+sha256 AIDE rules can be configured in multiple ways. This is just one example that is already configured by default. |
---|---|
Comments |
Customer Responsibility. NetWitness does not provide AIDE because it has a negative impact on performance. If you must install it, run as infrequently possible to adhere to your security policy. |
CCE-84029-8 Install Smart Card Packages For Multi-Factor Authentication (Control Group = n/a)
Check |
Configure the operating system to implement multifactor authentication by installing the required packages with the following command: $ sudo sudo yum install openssl-pkcs11 |
---|---|
Comments |
Customer Responsibility. The NetWitness Platform supports username/certificate for authentication to shell. If you want to configure a smart card log in, you must do this outside of NetWitness. |
CCE-27309-4 Set Boot Loader Password in grub2 (Control Group = fips-kernel)
Check |
The grub2 boot loader should have a superuser account and password protection enabled to protect boot-time settings. To do so, select a superuser account name and password and modify the /etc/grub.d/01_users configuration file with the new account name. Because plain text passwords are a security risk, generate a hash for the password by running the following command: $ grub2-setpassword When prompted, enter the password that was selected. NOTE: It is recommended not to use common administrator account names like root, admin, or administrator for the grub2 superuser account. Change the superuser to a different username (The default is 'root'). $ sed -i s/root/bootuser/g /etc/grub.d/01_users To meet FISMA Moderate, the bootloader superuser account and password MUST differ from the root account and password. Once the superuser account and password have been added, update the grub.cfg file by running: grub2-mkconfig -o /boot/grub2/grub.cfg NOTE: Do NOT manually add the superuser account and password to the grub.cfg file as the grub2-mkconfig command overwrites this file. |
---|---|
Comments | Customer Responsibility. Netwitness ships with root as the default super user for fips-control. Customer is expected to select a different superuser with the above steps. |
Exceptions That Are Not a Finding
The following exceptions do not apply to NetWitness Platform. NetWitness has verified that the system meets these requirements.
CCE-80852-7 Ensure /var Located On Separate Partition (Control Group = n/a)
Check |
The /var directory is used by daemons and other system services to store frequently-changing data. Ensure that /var has its own partition or logical volume at installation time, or migrate it using LVM. |
---|---|
Comments |
Not a Finding.NetWitness software is installed in /var/netwitness by default and has a separate partition on /var/netwitness. |
CCE-80775-0 Set GNOME3 Screensaver Inactivity Timeout (Control Group = n/a)
Check |
Verify that the GNOME Login Inactivity Timeout is set on the host (The graphical desktop environment must set the idle timeout to no more than 15 minutes.). |
---|---|
Comments |
Not a Finding. NetWitness Platform does not use Gnome Graphical User Interface (GUI) Desktop. |
CCE-80670-3 Set Lockout Time For Failed Password Attempts (Control Group = auth)
Check |
To configure the system to lock out accounts after a number of incorrect login attempts and require an administrator to unlock the account using pam_faillock.so, modify the content of both /etc/pam.d/system-auth and /etc/pam.d/password-auth by adding the following line immediately before the pam_unix.so statement in the AUTH section: |
---|---|
Comments | Not a Finding. root_unlock_time is set to 600 seconds. |
CCE-80854-3 Ensure /var/log/audit Located On Separate Partition (Control Group = audit)
Check |
Audit logs are stored in the /var/log/audit directory. Ensure that it has its own partition or logical volume at installation time, or migrate it later using LVM. Make absolutely certain that it is large enough to store all audit logs that will be created by the auditing daemon. |
---|---|
Comments | Not a Finding.NetWitness Platform has the /var/log directory as a separate partition. |
CCE-80916-0 Enable Randomized Layout of Virtual Address Space (Control Group = n/a)
Check |
To set the runtime status of the kernel.randomize_va_space kernel parameter, run the following command: |
---|---|
Comments | Not a Finding. Value of /proc/sys/kernel/randomize_va_space is already 2. |
CCE-80763-6 (Control ID = 2) Modify the System Login Banner (Control Group = ssh)
Check |
To configure the system login banner edit the /etc/issue file. Replace the default text with a message compliant with the local site policy or a legal disclaimer. The DoD required text is either:
or " I've read & consent to terms in IS user agreem't." |
---|---|
Comments | Not a Finding. The login banner is displayed but does not hyphenate "agreem't" |
CCE-80905-3 Enable SSH Warning Banner (Control Group = na)
Check |
To set the default banner SSH banner, customers are required to go into /etc/ssh/sshd_config and add their banner path under the # no default banner path tag. They can then add their Banner content in this file. |
---|---|
Comments | Not a Finding. The required configuration exists in the /etc/ssh/sshd_config file. |
CCE-80156-3 Disable Kernel Parameter for Sending ICMP Redirects for All Interfaces (Control Group = n/a)
Check |
To set the runtime status of the t.ipv4.conf.all.send_redirects kernel parameter, run the following command: |
---|---|
Comments | Not a Finding. NetWitness Platform does not accept incoming Internet Control Message Protocol (ICMP) traffic. |
CCE-80157-1 Disable Kernel Parameter for IP Forwarding (Control Group = n/a)
Check |
To set the runtime status of the t.ipv4.ip_forward kernel parameter, run the following command: |
---|---|
Comments | Not a Finding. NetWitness Platform only uses FIPS certified MACs (for example, MACs hmac-sha1,hmac-sha2-256,hmac-sha2-512). |
CCE-80158-9 Configure Kernel Parameter for Accepting ICMP Redirects for All Interfaces (Control Group = n/a)
Check |
To set the runtime status of the t.ipv4.conf.all.accept_redirects kernel parameter, run the following command: |
---|---|
Comments |
Not a Finding NetWitness Platform does not accept incoming Internet Control Message Protocol (ICMP) traffic. |
CCE-80163-9 Configure Kernel Parameter for Accepting ICMP Redirects By Default (Control Group = n/a)
Check |
To set the runtime status of the t.ipv4.conf.default.accept_redirects kernel parameter, run the following command: |
---|---|
Comments |
Not a Finding NetWitness Platform does not accept incoming Internet Control Message Protocol (ICMP) traffic. |
CCE-80165-4 Configure Kernel Parameter to Ignore ICMP Broadcast Echo Requests (Control Group = n/a)
Rule Name |
|
Check |
To set the runtime status of the t.ipv4.icmp_echo_ignore_broadcasts kernel parameter, run the following command: |
---|---|
Comments |
Not a FindingNetWitness Platform does not accept incoming Internet Control Message Protocol (ICMP) traffic. |
CCE-80438-5 Configure Multiple DNS Servers in /etc/resolv.conf (Control Group = n/a)
Check |
Multiple Domain Name System (DNS) Servers should be configured in the /etc/resolv.conf file. This provides redundant name resolution services in the event that a domain server crashes. To configure the system to contain as least 2 DNS servers, add a corresponding nameserver entry in ip_address /etc/resolv.conf file for each DNS server where ip_address is the IP address of a valid DNS server. For example: |
---|---|
Comments | Not a Finding. NetWitness Platform orchestrates and configures an internal DNS server that all NetWitness hosts use for name resolution. You can configure external DNS servers, but it is dependent on your environment. |
CCE-80447-6 Configure the Firewalld Ports (Control Group = n/a)
Check |
Configure the firewalld ports to allow approved services to have access to the system. To configure firewalld to open ports, run the following command: Run the command list above for each of the ports listed below: <ports> |
---|---|
Comments | Not a Finding. NetWitness Platform firewalld service is disabled because it uses IP Tables, not FirewallD. |
CCE-80877-4 Verify firewalld Enabled
Check |
Verify the operating system enabled an application firewall. Check to see if "firewalld" is installed with the following command: yum list installed firewalld Installed Packages firewalld.noarch 0.9.11-1.el8_8 @anaconda If the "firewalld" package is not installed, ask the System Administrator if another firewall application (such as iptables) is installed. If an application firewall is not installed, this is a finding. Check to see if the firewall is loaded and active with the following command: systemctl status firewalld firewalld.service - firewalld - dynamic firewall daemon Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled) Active: active (running) since Tue 2014-06-17 11:14:49 CEST; 5 days ago If "firewalld" does not show a status of "loaded" and "active", this is a finding. Check the state of the firewall: firewall-cmd --state running If "firewalld" does not show a state of "running", this is a finding. |
Comments | Not a Finding. NetWitness Platform firewalldservice is disabled because it uses IP Tables, not FirewallD. |
CCE-80854-3 Ensure /var/log/audit Located On Separate Partition
Check |
Determine if the operating system is configured to have the "/var/log/audit" path is on a separate file system. grep /var/log/audit /etc/fstab If no result is returned, or the operating system is not configured to have "/var/log/audit" on a separate file system, this is a finding. Verify that "/var/log/audit" is mounted on a separate file system: mount | grep "/var/log/audit" If no result is returned, or "/var/log/audit" is not on a separate file system, this is a finding. |
Comments | Not a Finding. NetWitness Platform has the /var/log directory as a separate partition. |
CCE-80851-9 Ensure /tmp Located On Separate Partition
Check |
Verify that a separate file system/partition has been created for "/tmp". Check that a file system/partition has been created for "/tmp" with the following command: systemctl is-enabled tmp.mount enabled If the "tmp.mount" service is not enabled, check to see if "/tmp" is defined in the fstab with a device and mount point: grep -i /tmp /etc/fstab UUID=a411dc99-f2a1-4c87-9e05-184977be8539 /tmp ext4 rw,relatime,discard,data=ordered,nosuid,noexec, 0 0 If "tmp.mount" service is not enabled or the "/tmp" directory is not defined in the fstab with a device and mount point, this is a finding. |
Comments | Future Feature - NetWitness Platform does not meet this requirement. NetWitness plans to fix this in a future release of NetWitness Platform. |
CCE-80852-7 Ensure /var Located On Separate Partition
Check |
Verify that a separate file system/partition has been created for "/var". Check that a file system/partition has been created for "/var" with the following command: grep /var /etc/fstab UUID=c274f65f /var ext4 noatime,nobarrier 1 2 If a separate entry for "/var" is not in use, this is a finding. |
Comments | Not a Finding. Hardware is dedicated for NetWitness, and NetWitness software is installed in /var/netwitness by default and a separate partition is on /var/netwitness. |
Rules Supported in a Future Release
The following checks for non-compliance to STIG rules are not supported in NetWitness Platform and will be added in a future release.
CCE-80920-2 Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default
Check |
To set the runtime status of the net.ipv4.conf.default.accept_source_route kernel parameter, run the following command: $ sudo sysctl -w net.ipv4.conf.default.accept_source_route=0 To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d: net.ipv4.conf.default.accept_source_route = 0 |
---|---|
Comments |
Future Feature. |
CCE-86220-1 Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces
Check |
To set the runtime status of the net.ipv4.conf.all.forwarding kernel parameter, run the following command: $ sudo sysctl -w net.ipv4.conf.all.forwarding=0 To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d: net.ipv4.conf.all.forwarding = 0 |
---|---|
Comments |
Future Feature. |
CCE-81006-9 Disable Accepting ICMP Redirects for All IPv6 Interfaces
Check |
To set the runtime status of the net.ipv6.conf.all.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0 To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d: net.ipv6.conf.all.accept_redirects = 0 |
---|---|
Comments |
Future Feature. |
CCE-81013-5 Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces
Check |
To set the runtime status of the net.ipv6.conf.all.accept_source_route kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_source_route=0 To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d: net.ipv6.conf.all.accept_source_route = 0 |
---|---|
Comments |
Future Feature. |
CCE-82863-2 Disable Kernel Parameter for IPv6 Forwarding
Check |
To set the runtime status of the net.ipv6.conf.all.forwarding kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.forwarding=0 To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d: net.ipv6.conf.all.forwarding = 0 |
---|---|
Comments |
Future Feature. |
CCE-81007-7 Disable Accepting Router Advertisements on all IPv6 Interfaces by Default
Check |
To set the runtime status of the net.ipv6.conf.default.accept_ra kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.default.accept_ra=0 To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d: net.ipv6.conf.default.accept_ra = 0 |
---|---|
Comments |
Future Feature. |
CCE-81010-1 Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces
Check |
To set the runtime status of the net.ipv6.conf.default.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.default.accept_redirects=0 To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d: net.ipv6.conf.default.accept_redirects = 0 |
---|---|
Comments |
Future Feature. |
CCE-81015-0 Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default
Check |
To set the runtime status of the net.ipv6.conf.default.accept_source_route kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.default.accept_source_route=0 To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d: net.ipv6.conf.default.accept_source_route = 0 |
---|---|
Comments |
Future Feature. |