Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document RHEL-08-020320/OL08-00-020320 (V-230379/V-248713) as a known finding #2869

Merged
merged 2 commits into from
May 9, 2023
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
15 changes: 15 additions & 0 deletions docs/findings/el8.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@
.. _User Account Passwords Must Be Restricted To A 60-Day Maximum Lifetime: #user-account-passwords-must-be-restricted-to-a-60-day-maximum-lifetime
.. _OS Must Be Configured In The Password-Auth File To Prohibit Password Reuse For A Minimum Of Five Generations: #os-must-prohibit-password-reuse-for-a-minimum-of-five-generations
.. _The Installed Operating System Is Not Vendor Supported: #the-installed-operating-system-is-not-vendor-supported
.. _"Only Authorized Local User Accounts Exist on Operating System" is always flagged: #only-authorized-local-user-accounts-exist-on-operating-system"-is-always-flagged


+----------------------------------------------------------------------------------------+---------------------+
Expand Down Expand Up @@ -65,6 +66,10 @@
| | |
| | RHEL-08-010000 |
+----------------------------------------------------------------------------------------+---------------------+
| `"Only Authorized Local User Accounts Exist on Operating System" is always flagged`_ | V-230379 |
| | |
| | RHEL-08-020320 |
+----------------------------------------------------------------------------------------+---------------------+
```


Expand Down Expand Up @@ -252,3 +257,13 @@ This rule effects primarily "free" versions of the Red Hat Enterprise Linux oper
And an `/etc/redhat-release` file with contents that aligns to one that's delivered with any of the preceding RPM. The various "free" versions of the Red Hat Enterprise Linux operating system will not have any of the above RPMs present.

If using a vendor-supported Linux and this scan finding occurs, it's likely that either the `release-` RPM is missing or damaged, something has unexpectedly altered the target's `/etc/redhat-release` file or the scanner is looking for a wildcarded `release` file under the `/etc` directory and there's an unexpected filename found.

# "Only Authorized Local User Accounts Exist on Operating System" is always flagged

**Expected Finding:**

Per the STIG notes:

> Automatic remediation of this control is not available due to the unique requirements of each system.

While-automation _could_ be authored that would leverage a site- or host-specific allowed-users list to disable or delete forbidden accounts, there exists an extremely-high likelihood that scanners used against such configuration-controlled operating environments would not contain the scanning logic necessary to validate compliance. As such – and with or without user-controlling automation-content – STIG scanners would still flag systems that are technically compliant.