Logo
Main site Submit a request Sign in
  1. Help Central | G5 Cyber Security
  2. Security Hardening
  3. DISA STIG for Red Hat Enterprise Linux 5 v1r18

DISA STIG for Red Hat Enterprise Linux 5 v1r18

Follow New articles New articles and comments
  • GEN000000-LNX001431 - The /etc/gshadow file must be owned by root.
  • GEN000000-LNX001432 - The /etc/gshadow file must be group-owned by root.
  • GEN000000-LNX001433 - The /etc/gshadow file must have mode 0400.
  • GEN000000-LNX001434 - The /etc/gshadow file must not have an extended ACL.
  • GEN000000-LNX001476 - The /etc/gshadow file must not contain any group password hashes.
  • GEN000000-LNX00320 - The system must not have special privilege accounts, such as shutdown and halt - '/etc/passwd - halt'
  • GEN000000-LNX00320 - The system must not have special privilege accounts, such as shutdown and halt - '/etc/passwd - reboot'
  • GEN000000-LNX00320 - The system must not have special privilege accounts, such as shutdown and halt - '/etc/passwd - shutdown'
  • GEN000000-LNX00320 - The system must not have special privilege accounts, such as shutdown and halt - '/etc/shadow - halt'
  • GEN000000-LNX00320 - The system must not have special privilege accounts, such as shutdown and halt - '/etc/shadow - reboot'
  • GEN000000-LNX00320 - The system must not have special privilege accounts, such as shutdown and halt - '/etc/shadow - shutdown'
  • GEN000000-LNX00360 - The X server must have the correct options enabled - '-audit = 4'
  • GEN000000-LNX00360 - The X server must have the correct options enabled - '-auth'
  • GEN000000-LNX00360 - The X server must have the correct options enabled - '-s <= 15'
  • GEN000000-LNX00360 - The X server must have the correct options enabled - ':0 /usr/bin/X:0'
  • GEN000000-LNX00380 - An X server must have none of the following options enabled: -ac, -core (except for debugging) or -nolock - '-nolock'
  • GEN000000-LNX00380 - An X server must have none of the following options enabled: -ac, -core (except for debugging), or -nolock - '-ac'
  • GEN000000-LNX00380 - An X server must have none of the following options enabled: -ac, -core (except for debugging), or -nolock - '-core'
  • GEN000000-LNX00400 - The /etc/security/access.conf file must be owned by root.
  • GEN000000-LNX00420 - The /etc/security/access.conf file must have a privileged group owner.
  • GEN000000-LNX00440 - The /etc/security/access.conf file must have mode 0640 or less permissive.
  • GEN000000-LNX00450 - The /etc/security/access.conf file must not have an extended ACL.
  • GEN000000-LNX00480 - The /etc/sysctl.conf file must be owned by root.
  • GEN000000-LNX00500 - The /etc/sysctl.conf file must be group-owned by root.
  • GEN000000-LNX00520 - The /etc/sysctl.conf file must have mode 0600 or less permissive.
  • GEN000000-LNX00530 - The /etc/sysctl.conf file must not have an extended ACL.
  • GEN000000-LNX00560 - The Linux NFS Server must not have the insecure file locking option.
  • GEN000000-LNX00580 - The x86 CTRL-ALT-DELETE key sequence must be disabled.
  • GEN000000-LNX00600 - PAM system must not grant sole access to admin privileges to the first user who logs into the console.
  • GEN000000-LNX00620 - The /etc/securetty file must be group-owned by root, sys, or bin.
  • 1
  • 2
  • ›
  • »

© Help Central | G5 Cyber Security