Red Hat 5 STIG Version 1, Release 18 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
SCAP 1.0 Content:
-
Download SCAP 1.0 Content - Red Hat 5 STIG Benchmark, Version 1, Release 1
- Author: Defense Information Systems Agency
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Red Hat 5 Manual STIG Benchmark Version 1, Release 1
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Red Hat Enterprise Linux 5 | cpe:/o:redhat:enterprise_linux:5 (View CVEs) |
Checklist Highlights
- Checklist Name:
- Red Hat 5 STIG
- Checklist ID:
- 355
- Version:
- Version 1, Release 18
- Type:
- Compliance
- Review Status:
- Under Review
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 06/03/2012
Checklist Summary:
This UNIX Technology Overview, along with the Operating System (OS) Security Requirements Guide (SRG) (UNIX Version) and associated Security Technical Implementation Guides (STIGs), provides the technical security policies, requirements, and implementation details for applying security concepts to UNIX systems. The OS SRG (UNIX Version) contains general requirements for operating systems as well as specific requirements for UNIX operating systems. This SRG may be used as a guide for enhancing the security configuration of any UNIX-like system. The Generic UNIX STIG contains all requirements present in the OS SRG (UNIX Version) and, additionally, contains check and fix procedures that are expected to be applicable to most UNIX-like systems.
Checklist Role:
- Operating System
Known Issues:
Not provided.
Target Audience:
The security requirements contained within the OS SRG (UNIX Version) and the UNIX STIGs are applicable to all DoD-administered systems and all systems connected to DoD networks. The SRG and STIGs provide requirements and associated procedures to reduce the security vulnerabilities of UNIX systems. These requirements are designed to assist Security Managers(SMs), Information Assurance Managers (IAMs), IAOs, and System Administrators (SAs) with configuring and maintaining security controls in a UNIX environment. This UNIX Technology Overview document introduces security concepts and terminology used in the OS SRG (UNIX Version) and the UNIX STIGs. This document is not a guide to UNIX system administration.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
DoD Directive (DoDD) 8500.1
Comments/Warnings/Miscellaneous:
Comments or proposed revisions to this document should be sent via e-mail to fso_spt@disa.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.
Disclaimer:
Not provided.
Product Support:
fso_spt@disa.mil
Point of Contact:
fso_spt@disa.mil
Sponsor:
DoD
Licensing:
Not provided.
Change History:
Dependency/Requirements:
URL | Description |
---|---|
http://iase.disa.mil/stigs/Documents/u_stig_transition_to_xccdf_faq_20100126.pdf | STIG Transition to XCCDF FAQ |
http://iase.disa.mil/stigs/Documents/u_unix_tech_overview_v1r2.pdf | UNIX Technology Overview, Version 1, Release 2 |
References:
Reference URL | Description |
---|
NIST checklist record last modified on 09/11/2012
* This checklist is still undergoing review for inclusion into the NCP.