You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: RHEL 9 SSH server configuration file must be group-owned by root.
1874
1858
rules:
1859
+
- file_sshd_50_redhat_exists
1875
1860
- file_groupowner_sshd_config
1876
1861
- directory_groupowner_sshd_config_d
1877
1862
- file_groupowner_sshd_drop_in_config
@@ -1882,6 +1867,7 @@ controls:
1882
1867
- medium
1883
1868
title: RHEL 9 SSH server configuration file must be owned by root.
1884
1869
rules:
1870
+
- file_sshd_50_redhat_exists
1885
1871
- file_owner_sshd_config
1886
1872
- directory_owner_sshd_config_d
1887
1873
- file_owner_sshd_drop_in_config
@@ -3281,14 +3267,6 @@ controls:
3281
3267
roles appointed by the ISSM) to select which auditable events are to be audited.
3282
3268
rules:
3283
3269
- file_permissions_audit_configuration
3284
-
status: automated
3285
-
3286
-
- id: RHEL-09-653115
3287
-
levels:
3288
-
- medium
3289
-
title: RHEL 9 /etc/audit/auditd.conf file must have 0640 or less permissive to prevent unauthorized
3290
-
access.
3291
-
rules:
3292
3270
- file_permissions_etc_audit_auditd
3293
3271
status: automated
3294
3272
@@ -3831,7 +3809,7 @@ controls:
3831
3809
- id: RHEL-09-672020
3832
3810
levels:
3833
3811
- medium
3834
-
title: RHEL 9 crypto policy must not be overridden.
3812
+
title: RHEL 9 cryptographic policy must not be overridden.
3835
3813
notes: Rules for this control are intentionally not implemented. Checking whether files under /etc/crypto-policies/back-ends/
3836
3814
are symlinks is not an appropriate way to verify the consistency of the system's cryptographic settings.
3837
3815
The suggested fix mentioned in the STIG does not fully satisfy its own requirements, as it also symlinks the nss.config file.
@@ -3841,16 +3819,6 @@ controls:
3841
3819
More information can be found at https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/security_hardening/switching-rhel-to-fips-mode_security-hardening
3842
3820
status: pending
3843
3821
3844
-
- id: RHEL-09-672025
3845
-
levels:
3846
-
- medium
3847
-
title: RHEL 9 must use mechanisms meeting the requirements of applicable federal laws, executive
3848
-
orders, directives, policies, regulations, standards, and guidance for authentication to a
0 commit comments