An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.05.1-4c5acf
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.05.1-4c5acf
Open sidebar
Navigate
Top
Search
Checks (
252
)
Print
Changes
Pages (
8/17
)
RHEL 7 STIG
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
v3 r15 (Released July 24, 2024)
v3 r14 (Released Jan. 24, 2024)
v3 r13 (Released Oct. 25, 2023)
v3 r12 (Released July 26, 2023)
v3 r11 (Released April 27, 2023)
v3 r10 (Released Jan. 26, 2023)
v3 r9 (Released Oct. 26, 2022)
v3 r8 (Released July 27, 2022)
v3 r7 (Released April 27, 2022)
v3 r6 (Released Jan. 27, 2022)
v3 r5 (Released Oct. 27, 2021)
v3 r4 (Released July 23, 2021)
v3 r3 (Released April 23, 2021)
v3 r2 (Released Jan. 22, 2021)
v3 r1 (Released Oct. 23, 2020)
v2 r8 (Released July 24, 2020)
v2 r7 (Released April 24, 2020)
v3 r0.3 (Released March 31, 2020)
v2 r6 (Released Jan. 24, 2020)
v2 r5 (Released Oct. 25, 2019)
v2 r4 (Released July 26, 2019)
v2 r3 (Released April 26, 2019)
v2 r2 (Released Jan. 25, 2019)
v2 r1 (Released July 27, 2018)
v1 r4 (Released Jan. 26, 2018)
v1 r3 (Released Oct. 27, 2017)
v1 r2 (Released July 28, 2017)
v1 r1 (Released Feb. 27, 2017)
ID
Vuln ID
Title
Cat
Status
RHEL-07-021110
V-204490
The Red Hat Enterprise Linux operating system must be configured so that the cron.allow file, if it exists, is owned by root.
Cat II
RHEL-07-021120
V-204491
The Red Hat Enterprise Linux operating system must be configured so that the cron.allow file, if it exists, is group-owned by root.
Cat II
RHEL-07-021300
V-204492
The Red Hat Enterprise Linux operating system must disable Kernel core dumps unless needed.
Cat II
RHEL-07-021310
V-204493
The Red Hat Enterprise Linux operating system must be configured so that a separate file system is used for user home directories (such as /home or an equivalent).
Cat III
RHEL-07-021320
V-204494
The Red Hat Enterprise Linux operating system must use a separate file system for /var.
Cat III
RHEL-07-021330
V-204495
The Red Hat Enterprise Linux operating system must use a separate file system for the system audit data path.
Cat III
RHEL-07-021340
V-204496
The Red Hat Enterprise Linux operating system must use a separate file system for /tmp (or equivalent).
Cat III
RHEL-07-021350
V-204497
The Red Hat Enterprise Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
Cat I
RHEL-07-021600
V-204498
The Red Hat Enterprise Linux operating system must be configured so that the file integrity tool is configured to verify Access Control Lists (ACLs).
Cat III
RHEL-07-021610
V-204499
The Red Hat Enterprise Linux operating system must be configured so that the file integrity tool is configured to verify extended attributes.
Cat III
RHEL-07-021620
V-204500
The Red Hat Enterprise Linux operating system must use a file integrity tool that is configured to use FIPS 140-2 approved cryptographic hashes for validating file contents and directories.
Cat II
RHEL-07-021700
V-204501
The Red Hat Enterprise Linux operating system must not allow removable media to be used as the boot loader unless approved.
Cat II
RHEL-07-021710
V-204502
The Red Hat Enterprise Linux operating system must not have the telnet-server package installed.
Cat I
RHEL-07-030000
V-204503
The Red Hat Enterprise Linux operating system must be configured so that auditing is configured to produce records containing information to establish what type of events occurred, where the events occurred, the source of the events, and the outcome of the events. These audit records must also identify individual identities of group account users.
Cat II
RHEL-07-030010
V-204504
The Red Hat Enterprise Linux operating system must shut down upon audit processing failure, unless availability is an overriding concern. If availability is a concern, the system must alert the designated staff (System Administrator [SA] and Information System Security Officer [ISSO] at a minimum) in the event of an audit processing failure.
Cat II
Prev
1...
4
5
6
7
8
9
10
11
12
...17
Next
Print
Display this benchmark in a printer-friendly format for off-line reference. This display does not include any commands.
Version Changes
If there are multiple versions of this benchmark, Xylok can display the differences between any changes in the checks.