Skip to content

Commit c8e4134

Browse files
committed
update stig_rhel9 to v2r7
1 parent fe081c9 commit c8e4134

File tree

3 files changed

+7
-41
lines changed

3 files changed

+7
-41
lines changed

products/rhel9/controls/stig_rhel9.yml

Lines changed: 7 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ policy: 'Red Hat Enterprise Linux 9 Security Technical Implementation Guide'
33
title: 'Red Hat Enterprise Linux 9 Security Technical Implementation Guide'
44
id: stig_rhel9
55
source: https://www.cyber.mil/stigs/downloads/
6-
version: V2R4
6+
version: V2R7
77
reference_type: stigid
88
product: rhel9
99

@@ -1766,23 +1766,6 @@ controls:
17661766
- sshd_enable_pam
17671767
status: automated
17681768

1769-
- id: RHEL-09-255055
1770-
levels:
1771-
- medium
1772-
title: RHEL 9 SSH daemon must be configured to use system-wide crypto policies.
1773-
rules:
1774-
- file_sshd_50_redhat_exists
1775-
- sshd_include_crypto_policy
1776-
status: automated
1777-
1778-
- id: RHEL-09-255060
1779-
levels:
1780-
- medium
1781-
title: RHEL 9 must implement DOD-approved encryption ciphers to protect the confidentiality of
1782-
SSH client connections.
1783-
rules:
1784-
- sshd_include_crypto_policy
1785-
status: automated
17861769
- id: RHEL-09-255064
17871770
title: The RHEL 9 SSH client must be configured to use only DOD-approved encryption ciphers employing
17881771
FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client
@@ -1795,9 +1778,10 @@ controls:
17951778
- id: RHEL-09-255065
17961779
levels:
17971780
- medium
1798-
title: RHEL 9 must implement DOD-approved encryption ciphers to protect the confidentiality of
1799-
SSH server connections.
1781+
title: The RHEL 9 SSH server must be configured to use only DOD-approved encryption ciphers employing
1782+
FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.
18001783
rules:
1784+
- sshd_include_crypto_policy
18011785
- harden_sshd_ciphers_opensshserver_conf_crypto_policy
18021786
- sshd_approved_ciphers=stig_rhel9
18031787
status: automated
@@ -1872,6 +1856,7 @@ controls:
18721856
- medium
18731857
title: RHEL 9 SSH server configuration file must be group-owned by root.
18741858
rules:
1859+
- file_sshd_50_redhat_exists
18751860
- file_groupowner_sshd_config
18761861
- directory_groupowner_sshd_config_d
18771862
- file_groupowner_sshd_drop_in_config
@@ -1882,6 +1867,7 @@ controls:
18821867
- medium
18831868
title: RHEL 9 SSH server configuration file must be owned by root.
18841869
rules:
1870+
- file_sshd_50_redhat_exists
18851871
- file_owner_sshd_config
18861872
- directory_owner_sshd_config_d
18871873
- file_owner_sshd_drop_in_config
@@ -3281,14 +3267,6 @@ controls:
32813267
roles appointed by the ISSM) to select which auditable events are to be audited.
32823268
rules:
32833269
- file_permissions_audit_configuration
3284-
status: automated
3285-
3286-
- id: RHEL-09-653115
3287-
levels:
3288-
- medium
3289-
title: RHEL 9 /etc/audit/auditd.conf file must have 0640 or less permissive to prevent unauthorized
3290-
access.
3291-
rules:
32923270
- file_permissions_etc_audit_auditd
32933271
status: automated
32943272

@@ -3831,7 +3809,7 @@ controls:
38313809
- id: RHEL-09-672020
38323810
levels:
38333811
- medium
3834-
title: RHEL 9 crypto policy must not be overridden.
3812+
title: RHEL 9 cryptographic policy must not be overridden.
38353813
notes: Rules for this control are intentionally not implemented. Checking whether files under /etc/crypto-policies/back-ends/
38363814
are symlinks is not an appropriate way to verify the consistency of the system's cryptographic settings.
38373815
The suggested fix mentioned in the STIG does not fully satisfy its own requirements, as it also symlinks the nss.config file.
@@ -3841,16 +3819,6 @@ controls:
38413819
More information can be found at https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/security_hardening/switching-rhel-to-fips-mode_security-hardening
38423820
status: pending
38433821

3844-
- id: RHEL-09-672025
3845-
levels:
3846-
- medium
3847-
title: RHEL 9 must use mechanisms meeting the requirements of applicable federal laws, executive
3848-
orders, directives, policies, regulations, standards, and guidance for authentication to a
3849-
cryptographic module.
3850-
rules:
3851-
- configure_kerberos_crypto_policy
3852-
status: automated
3853-
38543822
- id: RHEL-09-672030
38553823
levels:
38563824
- high

tests/data/profile_stability/rhel9/stig.profile

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,6 @@ chronyd_specify_remote_server
149149
clean_components_post_updating
150150
configure_bind_crypto_policy
151151
configure_crypto_policy
152-
configure_kerberos_crypto_policy
153152
configure_libreswan_crypto_policy
154153
configure_opensc_card_drivers
155154
configure_usbguard_auditbackend

tests/data/profile_stability/rhel9/stig_gui.profile

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,6 @@ chronyd_specify_remote_server
149149
clean_components_post_updating
150150
configure_bind_crypto_policy
151151
configure_crypto_policy
152-
configure_kerberos_crypto_policy
153152
configure_libreswan_crypto_policy
154153
configure_opensc_card_drivers
155154
configure_usbguard_auditbackend

0 commit comments

Comments
 (0)