Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-OS-000154-NA | SRG-OS-000154-NA | SRG-OS-000154-NA_rule | Medium |
Description |
---|
Allowing discovery of operating system resources, names, or components can lead to giving information to an attacker that may be used as an attack vector. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 6 Security Technical Implementation Guide | 2013-02-05 |
Check Text ( C-SRG-OS-000154-NA_chk ) |
---|
RHEL6 cannot support this requirement without assistance from an external application, policy, or service. This requirement is NA. |
Fix Text (F-SRG-OS-000154-NA_fix) |
---|
This requirement is NA. No fix is required. |