Check: RHEL-09-291030
RHEL 9 STIG:
RHEL-09-291030
(in versions v1 r3 through v1 r2)
Title
RHEL 9 must block unauthorized peripherals before establishing a connection. (Cat II impact)
Discussion
The USBguard-daemon is the main component of the USBGuard software framework. It runs as a service in the background and enforces the USB device authorization policy for all USB devices. The policy is defined by a set of rules using a rule language described in the usbguard-rules.conf file. The policy and the authorization state of USB devices can be modified during runtime using the usbguard tool. The system administrator (SA) must work with the site information system security officer (ISSO) to determine a list of authorized peripherals and establish rules within the USBGuard software framework to allow only authorized devices.
Check Content
Verify the USBGuard has a policy configured with the following command: $ usbguard list-rules allow id 1d6b:0001 serial If the command does not return results or an error is returned, ask the SA to indicate how unauthorized peripherals are being blocked. If there is no evidence that unauthorized peripherals are being blocked before establishing a connection, this is a finding. If the system is virtual machine with no virtual or physical USB peripherals attached, this is not a finding.
Fix Text
Configure the operating system to enable the blocking of unauthorized peripherals with the following command: Note: This command must be run from a root shell and will create an allow list for any usb devices currently connect to the system. # usbguard generate-policy --no-hash > /etc/usbguard/rules.conf Note: Enabling and starting usbguard without properly configuring it for an individual system will immediately prevent any access over a usb device such as a keyboard or mouse.
Additional Identifiers
Rule ID: SV-258038r943052_rule
Vulnerability ID: V-258038
Group Title: SRG-OS-000378-GPOS-00163
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001958 |
The information system authenticates an organization-defined list of specific and/or types of devices before establishing a local, remote, or network connection. |
Controls
Number | Title |
---|---|
IA-3 |
Device Identification And Authentication |