STIG customer responsibilities

The following STIG items are the customer's responsibility to implement according to their requirements and environment.

V-204510

Finding ID
For more information, see V-204510.
Version
RHEL-07-041003
Rule ID
xccdf_org.ssgproject.content_rule_auditd_audispd_encrypt_sent_records
Title
The Red Hat® Enterprise Linux® operating system must encrypt the transfer of audit records that are off-loaded onto a different system or media from the system that is audited.
Justification
The implementation of this item depends on the environment and how you want audit logs to be encrypted and off-loaded to different systems or media. You are responsible for the configuration.

V-204632

Finding ID
For more information, see V-204632.
Version
RHEL-07-041002
Rule ID
xccdf_org.ssgproject.content_rule_sssd_enable_pam_services
Title
The Red Hat Enterprise Linux operating system must implement multifactor authentication for access to privileged accounts through pluggable authentication modules (PAM).
Justification
The implementation of this item depends on the environment and how you want audit logs to be encrypted and off-loaded to different systems or media. You are responsible for the configuration.

For information on configuring SSSD, see Configuring SSSD.

V-204633

Finding ID
For more information, see V-204633.
Version
RHEL-07-041003
Rule ID
xccdf_org.ssgproject.content_rule_smartcard_configure_cert_checking
Title
The Red Hat Enterprise Linux operating system must implement certificate status checking for PKI authentication.
Justification
The implementation of this item depends on the environment and how you want audit logs to be encrypted and off-loaded to different systems or media. You are responsible for the configuration.

For more information on configuring oscp, see Configuring OCSP Responders.

V-214801

Finding ID
For more information, see V-214801.
Version
RHEL-07-032000
Rule ID
xccdf_org.ssgproject.content_rule_install_antivirus
Title
The Red Hat Enterprise Linux operating system must use a virus scan program.
Justification
Available open source virus scan programs do not meet the security requirements to be included in QRadar®. It is your responsibility to select and implement a suitable anti virus solution.

V-204577

Finding ID
For more information, see V-204577.
Version
RHEL-07-040100
Rule ID
xccdf_org.ssgproject.content_rule_configure_firewalld_ports
Title
The Red Hat Enterprise Linux operating system must be configured to prohibit or restrict the use of functions, ports, protocols or services, as defined in the Ports, Protocols, and Services Management Component Local Service Assessment (PPSM CLSA) and vulnerability assessments.
Justification
The implementation of this item depends on the environment and the specific services that are allowed based on your organization's site or program PPSM CLSA.

V-214800

Finding ID
For more information, see V-214800.
Version
RHEL-07-020019
Rule ID
xccdf_org.ssgproject.content_rule_package_mcafeetp_installed
Title
The Red Hat Enterprise Linux operating system must have a host-based intrusion detection tool installed.
Justification
Available open source programs do not meet the security requirements to be included in QRadar. It is your responsibility to select and implement a suitable host-based intrusion detection tool.

V-204511

Finding ID
For more information, see V-204511.
Version
RHEL-07-030320
Rule ID
xccdf_org.ssgproject.content_rule_auditd_audispd_disk_full_action
Title
The Red Hat Enterprise Linux operating system must be configured so that the audit system takes appropriate action when the audit storage volume is full.
Justification
The implementation of this item depends on the environment. Syslog-ng is used in QRadar instead of audisp and is installed by default and ready to be configured for compliance of this item. The most common implementation is to configure syslog-ng to send logs to a remote server. Add destination entries for each log type into /etc/syslog-ng/syslog-ng.conf. For example, to send messages by using TCP to a remote server with an IP address of 10.1.3.4 on port 1500, you add the following entry:
destination messages { network("10.1.3.4" port(1500)); };

For configuration information and examples, see syslog-ng Open Source Edition 3.19 - Administration Guide.

After the configuration is completed, restart the syslog-ng service to apply the changes:
service syslog-ng restart

Scanners might report this item as noncompliant even after syslog-ng is configured to handle logs when the storage volume is full because most scanners check for the use of audisp. It is most likely a false positive, if syslog-ng is properly configured.

V-204512

Finding ID
For more information, see V-204512.
Version
RHEL-07-030321
Rule ID
xccdf_org.ssgproject.content_rule_auditd_audispd_network_failure_action
Title
The Red Hat Enterprise Linux operating system must be configured so that the audit system takes appropriate action when there is an error when are sent to a remote system.
Justification
The implementation of this item depends on the environment. Syslog-ng is used in QRadar instead of audisp and is installed by default and ready to be configured for compliance of this item. The most common implementation is to introduce a disk buffer to store logs in the event of a failure. Add a disk buffer option to each destination entry in /etc/syslog-ng/syslog-ng.conf. For example, to set up a disk buffer on messages that are being sent to a remote server with an IP address of 10.1.3.4 on port 1500 with the buffer location at /tmp/disk-buffer, reliable set to yes (ensures that logs are nor lost during a reload, restart, unreachable destination or crash), and a disk-buf-size of 2000000 bytes.
destination messages {
    network(
        "10.1.3.4"
        port(1500)
        disk-buffer(
            disk-buf-size(2000000)
            reliable(yes)
            dir("/tmp/disk-buffer")
        )
    );
};

For configuration information and examples, see https://www.syslog-ng.com/technical-documents/doc/syslog-ng-open-source-edition/3.24/administration-guide/50.

After you create the configuration, restart the syslog-ng service to apply the changes:

service syslog-ng restart

Scanners might report this item as noncompliant even after syslog-ng is configured to handle logs when there is an error sending to a remote system is full since most scanners check for the use of audisp. This is most likely a false positive when syslog-ng is properly configured.

V-204509

Finding ID
For more information, see V-204509.
Version
RHEL-07-030300
Rule ID
xccdf_org.ssgproject.content_rule_auditd_audispd_configure_remote_server
Title
The Red Hat Enterprise Linux operating system must offload audit records onto a different system or media from the system being audited.
Justification
The implementation of this item depends on the environment. Syslog-ng is used in QRadar instead of audisp and is installed by default and ready to be configured for compliance of this item, but the specifics of the implementation depends on the destination that the customer wants to off-load logs to. You can do this by adding destination entries for each log type into /etc/syslog-ng/syslog-ng.conf. For example, to send messages by using TCP to a remote server with an IP address of 10.1.3.4 on port 1500, you would add the following entry:
destination messages { network("10.1.3.4" port(1500)); };

For configuration information and examples, see: https://www.syslog-ng.com/technical-documents/doc/syslog-ng-open-source-edition/3.19/administration-guide/40

After you complete the configuration, restart the syslog-ng service to apply the changes:
service syslog-ng restart

Scanners might report this item as noncompliant because most scanners check for the use of audisp. This is most likely a false positive when syslog-ng is properly configured.

V-204574

Finding ID
For more information, see V-204574.
Version
RHEL-07-031000
Rule ID
xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost
Title
The Red Hat Enterprise Linux operating system must send rsyslog output to a log aggregation server.
Justification
The implementation of this item is highly dependent on the environment in which it is being implemented. Syslog-ng is used in QRadar instead of rsyslog and is installed by default and ready to be configured for compliance of this item, but the specifics of the implementation will depend on the destination that the customer wants to off-load logs to. This can be done by adding destination entries for each log type into /etc/syslog-ng/syslog-ng.conf. For example, to send messages via TCP to a remote server with an ip address of 10.1.3.4 on port 1500, the following entry would be added:
destination messages { network("10.1.3.4" port(1500)); };

For configuration information and examples, see https://www.syslog-ng.com/technical-documents/doc/syslog-ng-open-source-edition/3.19/administration-guide/40.

After you create the configuration, restart the syslog-ng service to apply the changes:
service syslog-ng restart

Scanners might report this item as noncompliant even after syslog-ng is configured to off-load logs since most scanners check for the use of audisp. This is most likely a false positive when syslog-ng is properly configured.

V-204506

Finding ID
For more information, see V-204506.
Version
RHEL-07-030201
Rule ID
N/A
Title
The Red Hat Enterprise Linux operating system must be configured to off-load audit logs onto a different system or storage media from the system being audited.
Justification
The implementation of this item depends on the environment. Syslog-ng is used in QRadar instead of audisp and is installed by default and ready to be configured for compliance of this item, but the specifics of the implementation depend on the destination that you want to offload logs to. This can be done by adding destination entries for each log type into /etc/syslog-ng/syslog-ng.conf. For example, to send messages by using TCP to a remote server with an IP address of 10.1.3.4 on port 1500, you would add the following entry:
destination messages { network("10.1.3.4" port(1500)); };

For configuration information and examples, seehttps://www.syslog-ng.com/technical-documents/doc/syslog-ng-open-source-edition/3.19/administration-guide/40.

After you create the configuration, restart the syslog-ng service to apply the changes:
service syslog-ng restart

Scanners might report this item as noncompliant even after syslog-ng is configured to offload logs since most scanners check for the use of audisp. This is most likely a false positive when syslog-ng is properly configured.

V-204441

Finding ID
For more information, see V-204441.
Version
RHEL-07-010500
Rule ID
xccdf_org.ssgproject.content_rule_auditd_audispd_network_failure_action
Title
The Red Hat Enterprise Linux operating system must uniquely identify and must authenticate organizational users (or processes acting on behalf of organizational users) by using multifactor authentication.
Justification

The implementation of this item depends on the environment and the specific multifactor authentication solution you chose. It is your responsibility to configure this item.

For information on configuring SSSD, Configuring SSSD.

V-204473

Finding ID
For more information, see V-204473.
Version
RHEL-07-020680
Rule ID

xccdf_org.ssgproject.content_rule_accounts_users_home_files_permissions

Title

The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a mode of 0750 or less permissive.

Justification

QRadar is compliant by default with these items but any newly created users are not compliant. It is the responsibility of the customer to ensure that the home directory for any new user is configured with the appropriate file and folder permissions in order to maintain compliance with these items. Use the following procedure to bring any newly created users into compliance:

  1. Run the command:
    $ sudo stat -c "%04a %n %F" /<user home dir>/* 

    Where <user home dir> is the home directory of the newly created user. This produces an output in the following format: <permission> <file path> <file type>. For example, 0600 /<user home dir>/.bash_profile regular file.

  2. If the first digit of any permission listed is not 0 (including files and directories, excluding files starting with .), run the following command:
    $ sudo chmod a-s /path/to/file
  3. If the last 3 digits of any permission listed are more permissive than 750 (including files and directories, excluding files starting with .), run the following commands:
    $ sudo chmod g-rwx,g+rx /path/to/file
    $ sudo chmod o-rwx /path/to/file

V-204476

Finding ID
For more information, see V-204476.
Version

RHEL-07-020710

Rule ID

xccdf_org.ssgproject.content_rule_file_permission_user_init_files

Title

The Red Hat Enterprise Linux operating system must be configured so that all local initialization files have mode 0740 or less permissive

Justification

QRadar is compliant by default with these items but any newly created users are not compliant. It is the responsibility of the customer to ensure that the home directory for any new user is configured with the appropriate file and folder permissions in order to maintain compliance with these items. Use the following procedure to bring any newly created users into compliance:

  1. Run the command:
    $ sudo stat -c "%04a %n %F" /<user home dir>/.* 

    Where <user home dir> is the home directory of the newly created user. This produces an output in the following format: <permission> <file path> <file type>. For example, 0600 /<user home dir>/.bash_profile regular file.

  2. If the first digit of any permission listed (excluding directories) is not 0, run the following command:
    $ sudo chmod a-s /path/to/file
  3. If the last 3 digits of any permission listed (excluding directories) are more permissive than 740, run the following commands:
    $ sudo chmod g-rwx,g+rx /path/to/file
    $ sudo chmod o-rwx /path/to/file

V-204488

Finding ID
For more information, see V-204488.
Version
RHEL-07-030310
Rule ID
xccdf_org.ssgproject.content_rule_auditd_audispd_configure_remote_server
Title
The Red Hat Enterprise Linux operating system must set the umask value to 077 for all local interactive user accounts.
Justification
The implementation of this item depends on the environment and the user accounts that were created. It is your responsibility to ensure that all created accounts comply with this item.

V-204504

Finding ID
For more information, see V-204504.
Version
RHEL-07-030010
Rule ID
xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost
Title
The Red Hat Enterprise Linux operating system must shut down upon audit processing failure, unless availability is an overriding concern. If availability is a concern, the system must alert the designated staff (System Administrator [SA] and Information System Security Officer [ISSO] at a minimum) when an audit processing fails.
Justification
Availability is an overriding concern for QRadar. The configuration to alert any designated staff is your responsibility.

V-204608

Finding ID
For more information, see V-204608.
Version

RHEL-07-040600

Rule ID

xccdf_org.ssgproject.content_rule_network_configure_name_resolution

Title

For Red Hat Enterprise Linux operating systems using DNS resolution, at least two name servers must be configured.

Justification

The system verifies /etc/resolv.conf by using the file integrity tool by default, but it is the responsibility of the customer to document this with their Information System Security Officer (ISSO).

V-244557

Finding ID
For more information, see V-244557.
Version

RHEL-07-010483

Rule ID

xccdf_org.ssgproject.content_rule_grub2_admin_username

Title

Red Hat Enterprise Linux operating systems version 7.2 or later that are booted with a BIOS, must have a unique name for the grub superusers account when booting into single-user and maintenance modes.

Justification

The implementation of this item depends on the environment and the user accounts that were created. It is the responsibility of the customer to ensure that the boot user is correctly configured to comply with this item.

V-204581

Finding ID
For more information, see https://www.stigviewer.com/stig/red_hat_enterprise_linux_7/2020-12-08/finding/V-204581.
Version

RHEL-07-040180

Rule ID

xccdf_org.ssgproject.content_rule_sssd_ldap_start_tls

Title

The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications.

Justification

QRadar, by default, is not configured to use LDAP. If LDAP is used in your environment, you should also ensure that you are compliant with this item.

V-204582

Finding ID
For more information, see V-204582.
Version

RHEL-07-040190

Rule ID

xccdf_org.ssgproject.content_rule_sssd_ldap_configure_tls_reqcert

Title

The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.

Justification

QRadar, by default, is not configured to use LDAP. If LDAP is used in your environment, you should also ensure that you are compliant with this item.

V-204583

Finding ID
For more information, see V-204583.
Version

RHEL-07-040200

Rule ID

xccdf_org.ssgproject.content_rule_sssd_ldap_configure_tls_ca_dir

Title

The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications

Justification

QRadar, by default, is not configured to use LDAP. If LDAP is used in your environment, you should also ensure that you are compliant with this item.

V-204603

Finding ID
For more information, see V-204603.
Version

RHEL-07-040500

Rule ID

xccdf_org.ssgproject.content_rule_chronyd_or_ntpd_set_maxpoll

Title

The Red Hat Enterprise Linux operating system must, for networked systems, synchronize clocks with a server that is synchronized to one of the redundant United States Naval Observatory (USNO) time servers, a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).

Justification

It is the responsibility of the customer to ensure that a proper time server is being used for synchronization.

V-244525

Finding ID
For more information, see V-244525.
Version

RHEL-08-010201

Rule ID

SV-244525r743824_rule

Title

The SSH daemon ClientAliveCountMax option must be set correctly.

Justification

During installation or patching the ClientAliveCountMax is reset due to technical limitations. You are responsible for setting ClientAliveCountMax to 0 in /etc/ssh/sshd_config.