U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Red Hat 5 STIG Version 1, Release 18 Checklist Details (Checklist Revisions)

SCAP 1.0 Content:

Supporting Resources:

Target:

Target CPE Name
Red Hat Enterprise Linux 5 cpe:/o:redhat:enterprise_linux:5 (View CVEs)

Checklist Highlights

Checklist Name:
Red Hat 5 STIG
Checklist ID:
355
Version:
Version 1, Release 18
Type:
Compliance
Review Status:
Under Review
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
06/03/2012

Checklist Summary:

This UNIX Technology Overview, along with the Operating System (OS) Security Requirements Guide (SRG) (UNIX Version) and associated Security Technical Implementation Guides (STIGs), provides the technical security policies, requirements, and implementation details for applying security concepts to UNIX systems. The OS SRG (UNIX Version) contains general requirements for operating systems as well as specific requirements for UNIX operating systems. This SRG may be used as a guide for enhancing the security configuration of any UNIX-like system. The Generic UNIX STIG contains all requirements present in the OS SRG (UNIX Version) and, additionally, contains check and fix procedures that are expected to be applicable to most UNIX-like systems.

Checklist Role:

  • Operating System

Known Issues:

Not provided.

Target Audience:

The security requirements contained within the OS SRG (UNIX Version) and the UNIX STIGs are applicable to all DoD-administered systems and all systems connected to DoD networks. The SRG and STIGs provide requirements and associated procedures to reduce the security vulnerabilities of UNIX systems. These requirements are designed to assist Security Managers(SMs), Information Assurance Managers (IAMs), IAOs, and System Administrators (SAs) with configuring and maintaining security controls in a UNIX environment. This UNIX Technology Overview document introduces security concepts and terminology used in the OS SRG (UNIX Version) and the UNIX STIGs. This document is not a guide to UNIX system administration.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

DoD Directive (DoDD) 8500.1

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via e-mail to fso_spt@disa.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Disclaimer:

Not provided.

Product Support:

fso_spt@disa.mil

Point of Contact:

fso_spt@disa.mil

Sponsor:

DoD

Licensing:

Not provided.

Change History:



					

Dependency/Requirements:

URL Description
http://iase.disa.mil/stigs/Documents/u_stig_transition_to_xccdf_faq_20100126.pdf STIG Transition to XCCDF FAQ
http://iase.disa.mil/stigs/Documents/u_unix_tech_overview_v1r2.pdf UNIX Technology Overview, Version 1, Release 2

References:

Reference URL Description

NIST checklist record last modified on 09/11/2012


* This checklist is still undergoing review for inclusion into the NCP.