Control updates introduced for Red Hat Enterprise Linux 7 STIG, Version 3, Release 12

The Compliance Enforcement Module (CEM) for Linux v1.7.0 introduces enforcement for an updated Security Technical Implementation Guide (STIG) standard: Red Hat Enterprise Linux STIG 7 - Version 3, Release 12. The transition from the previously supported version (Version 3, Release 8) resulted in module updates.

  • Added
    • The following controls are added to the module:
      • V-255925 - The Red Hat Enterprise Linux operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
      • V-255926 - The Red Hat Enterprise Linux operating system must have the screen package installed.
      • V-255927 - The Red Hat Enterprise Linux operating system must restrict access to the kernel message buffer.
      • V-255928 - The Red Hat Enterprise Linux operating system must be configured to prevent overwriting of custom authentication configuration settings by the authconfig utility.
      • V-256969 - The Red Hat Enterprise Linux operating system must disable the login screen user list for graphical user interfaces.
      • V-256970 - The Red Hat Enterprise Linux operating system must be configured to allow sending email notifications of configuration changes and adverse events to designated personnel.