An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.10.3-0fa4-8a67
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.10.3-0fa4-8a67
Open sidebar
Navigate
Top
Search
Checks (
244
)
Print
Changes
Pages (
4/17
)
Red Hat Enterprise Linux 7 STIG
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
v3 r14 (Released Jan. 24, 2024)
v3 r13 (Released Oct. 25, 2023)
v3 r12 (Released July 26, 2023)
v3 r11 (Released April 27, 2023)
v3 r10 (Released Jan. 26, 2023)
v3 r9 (Released Oct. 26, 2022)
v3 r8 (Released July 27, 2022)
v3 r7 (Released April 27, 2022)
v3 r6 (Released Jan. 27, 2022)
v3 r5 (Released Oct. 27, 2021)
v3 r4 (Released July 23, 2021)
v3 r3 (Released April 23, 2021)
v3 r2 (Released Jan. 22, 2021)
v3 r1 (Released Oct. 23, 2020)
v2 r8 (Released July 24, 2020)
v2 r7 (Released April 24, 2020)
v3 r0.3 (Released March 31, 2020)
v2 r6 (Released Jan. 24, 2020)
v2 r5 (Released Oct. 25, 2019)
v2 r4 (Released July 26, 2019)
v2 r3 (Released April 26, 2019)
v2 r2 (Released Jan. 25, 2019)
v2 r1 (Released July 27, 2018)
v1 r4 (Released Jan. 26, 2018)
v1 r3 (Released Oct. 27, 2017)
v1 r2 (Released July 28, 2017)
v1 r1 (Released Feb. 27, 2017)
ID
Vuln ID
Title
Cat
Status
RHEL-07-010340
V-204429
The Red Hat Enterprise Linux operating system must be configured so that users must provide a password for privilege escalation.
Cat II
RHEL-07-010341
V-237633
The Red Hat Enterprise Linux operating system must restrict privilege elevation to authorized personnel.
Cat II
RHEL-07-010342
V-237634
The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using "sudo".
Cat II
RHEL-07-010343
V-237635
The Red Hat Enterprise Linux operating system must require re-authentication when using the "sudo" command.
Cat II
RHEL-07-010344
V-251704
The Red Hat Enterprise Linux operating system must not be configured to bypass password requirements for privilege escalation.
Cat II
RHEL-07-010350
V-204430
The Red Hat Enterprise Linux operating system must be configured so that users must re-authenticate for privilege escalation.
Cat II
RHEL-07-010375
V-255927
The Red Hat Enterprise Linux operating system must restrict access to the kernel message buffer.
Cat III
RHEL-07-010430
V-204431
The Red Hat Enterprise Linux operating system must be configured so that the delay between logon prompts following a failed console logon attempt is at least four seconds.
Cat II
RHEL-07-010440
V-204432
The Red Hat Enterprise Linux operating system must not allow an unattended or automatic logon to the system via a graphical user interface.
Cat I
RHEL-07-010450
V-204433
The Red Hat Enterprise Linux operating system must not allow an unrestricted logon to the system.
Cat I
RHEL-07-010460
V-204434
The Red Hat Enterprise Linux operating system must not allow users to override SSH environment variables.
Cat II
RHEL-07-010470
V-204435
The Red Hat Enterprise Linux operating system must not allow a non-certificate trusted host SSH logon to the system.
Cat II
RHEL-07-010481
V-204437
The Red Hat Enterprise Linux operating system must require authentication upon booting into single-user and maintenance modes.
Cat II
RHEL-07-010482
V-204438
Red Hat Enterprise Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.
Cat I
RHEL-07-010483
V-244557
Red Hat Enterprise Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.
Cat II
Prev
1
2
3
4
5
6
7
8
...17
Next
Print
Display this benchmark in a printer-friendly format for off-line reference. This display does not include any commands.
Version Changes
If there are multiple versions of this benchmark, Xylok can display the differences between any changes in the checks.