UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide


Overview

Date Finding Count (211)
2024-06-04 CAT I (High): 23 CAT II (Med): 185 CAT III (Low): 3
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC I - Mission Critical Sensitive)

Finding ID Severity Title
V-261336 High SLEM 5 SSH server must be configured to use only FIPS 140-2/140-3 validated key exchange algorithms.
V-261334 High SLEM 5 must implement DOD-approved encryption to protect the confidentiality of SSH remote connections.
V-261335 High SLEM 5 SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2/140-3 approved cryptographic hash algorithms.
V-261330 High SLEM 5 must not allow unattended or automatic logon via SSH.
V-261328 High SLEM 5 must use SSH to protect the confidentiality and integrity of transmitted information.
V-261284 High All SLEM 5 persistent disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.
V-261327 High SLEM 5 must have SSH installed to protect the confidentiality and integrity of transmitted information.
V-261345 High SLEM 5 must not allow unattended or automatic logon via the graphical user interface (GUI).
V-261344 High There must be no shosts.equiv files on SLEM 5.
V-261343 High There must be no .shosts files on SLEM 5.
V-261268 High SLEM 5 with Unified Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.
V-261263 High SLEM 5 must be a vendor-supported release.
V-261266 High SLEM 5 must disable the x86 Ctrl-Alt-Delete key sequence.
V-261267 High SLEM 5 with a basic input/output system (BIOS) must require authentication upon booting into single-user and maintenance modes.
V-261473 High FIPS 140-2/140-3 mode must be enabled on SLEM 5.
V-261359 High SLEM 5 root account must be the only account with unrestricted access to the system.
V-261277 High SLEM 5 must not have the telnet-server package installed.
V-261274 High The SLEM 5 tool zypper must have gpgcheck enabled.
V-261369 High SLEM 5 must use a Linux Security Module configured to enforce limits on system services.
V-261391 High SLEM 5 must employ FIPS 140-2/140-3-approved cryptographic hashing algorithms for system authentication.
V-261392 High SLEM 5 shadow password suite must be configured to use a sufficient number of hashing rounds.
V-261387 High SLEM 5 must not have accounts configured with blank or null passwords.
V-261386 High SLEM 5 must not be configured to allow blank or null passwords.
V-261435 Medium SLEM 5 must generate audit records for all uses of the "modprobe" command.
V-261434 Medium SLEM 5 must generate audit records for all uses of the "kmod" command.
V-261437 Medium SLEM 5 must generate audit records for all uses of the "pam_timestamp_check" command.
V-261436 Medium SLEM 5 must generate audit records for all uses of the "newgrp" command.
V-261431 Medium SLEM 5 must generate audit records for all uses of the "crontab" command.
V-261430 Medium SLEM 5 must generate audit records for a uses of the "chsh" command.
V-261433 Medium SLEM 5 must generate audit records for all uses of the "insmod" command.
V-261432 Medium SLEM 5 must generate audit records for all uses of the "gpasswd" command.
V-261439 Medium SLEM 5 must generate audit records for all uses of the "rm" command.
V-261438 Medium SLEM 5 must generate audit records for all uses of the "passwd" command.
V-261337 Medium SLEM 5 must deny direct logons to the root account using remote access via SSH.
V-261332 Medium SLEM 5 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive.
V-261333 Medium SLEM 5 SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.
V-261331 Medium SLEM 5 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.
V-261338 Medium SLEM 5 must log SSH connection attempts and failures to the server.
V-261339 Medium SLEM 5 must display the date and time of the last successful account logon upon an SSH logon.
V-261378 Medium SLEM 5 must enforce passwords that contain at least one lowercase character.
V-261329 Medium SLEM 5 must display the Standard Mandatory DOD Notice and Consent Banner before granting access via SSH.
V-261280 Medium SLEM 5 must use a separate file system for the system audit data path.
V-261281 Medium SLEM 5 file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.
V-261286 Medium SLEM 5 must disable the file system automounter unless required.
V-261287 Medium SLEM 5 must have directories that contain system commands set to a mode of 755 or less permissive.
V-261285 Medium SLEM 5 file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.
V-261321 Medium SLEM 5 must not forward Internet Protocol version 6 (IPv6) source-routed packets.
V-261320 Medium SLEM 5 must be configured to use TCP syncookies.
V-261323 Medium SLEM 5 must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
V-261322 Medium SLEM 5 must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.
V-261325 Medium SLEM 5 must not be performing Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.
V-261324 Medium SLEM 5 must not allow interfaces to accept Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages by default.
V-261326 Medium SLEM 5 must not be performing Internet Protocol version 6 (IPv6) packet forwarding by default unless the system is a router.
V-261440 Medium SLEM 5 must generate audit records for all uses of the "rmmod" command.
V-261441 Medium SLEM 5 must generate audit records for all uses of the "setfacl" command.
V-261442 Medium SLEM 5 must generate audit records for all uses of the "ssh-agent" command.
V-261443 Medium SLEM 5 must generate audit records for all uses of the "ssh-keysign" command.
V-261444 Medium SLEM 5 must generate audit records for all uses of the "su" command.
V-261445 Medium SLEM 5 must generate audit records for all uses of the "sudo" command.
V-261446 Medium SLEM 5 must generate audit records for all uses of the "sudoedit" command.
V-261447 Medium SLEM 5 must generate audit records for all uses of the "unix_chkpwd" or "unix2_chkpwd" commands.
V-261448 Medium SLEM 5 must generate audit records for all uses of the "usermod" command.
V-261449 Medium SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
V-261295 Medium SLEM 5 library files must be owned by root.
V-261294 Medium SLEM 5 SSH daemon private host key files must have mode 640 or less permissive.
V-261297 Medium SLEM 5 library directories must be owned by root.
V-261296 Medium SLEM 5 library files must be group-owned by root.
V-261291 Medium All SLEM 5 local interactive user home directories must have mode 750 or less permissive.
V-261290 Medium SLEM 5 library files must have mode 755 or less permissive.
V-261293 Medium SLEM 5 SSH daemon public host key files must have mode 644 or less permissive.
V-261292 Medium All SLEM 5 local initialization files must have mode 740 or less permissive.
V-261354 Medium All SLEM 5 local initialization files must not execute world-writable programs.
V-261355 Medium SLEM 5 must automatically expire temporary accounts within 72 hours.
V-261356 Medium SLEM 5 must never automatically remove or disable emergency administrator accounts.
V-261357 Medium SLEM 5 must not have unnecessary accounts.
V-261299 Medium SLEM 5 must have system commands owned by root.
V-261298 Medium SLEM 5 library directories must be group-owned by root.
V-261352 Medium All SLEM 5 local interactive user home directories defined in the /etc/passwd file must exist.
V-261353 Medium All SLEM 5 local interactive user initialization files executable search paths must contain only paths that resolve to the users' home directory.
V-261453 Medium SLEM 5 must generate audit records for all uses of the "chmod", "fchmod" and "fchmodat" system calls.
V-261452 Medium SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
V-261451 Medium SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
V-261450 Medium SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
V-261457 Medium SLEM 5 must generate audit records for all uses of the "init_module" and "finit_module" system calls.
V-261456 Medium SLEM 5 must generate audit records for all uses of the "delete_module" system call.
V-261455 Medium SLEM 5 must generate audit records for all uses of the "creat", "open", "openat", "open_by_handle_at", "truncate", and "ftruncate" system calls.
V-261454 Medium SLEM 5 must generate audit records for all uses of the "chown", "fchown", "fchownat", and "lchown" system calls.
V-261459 Medium SLEM 5 must generate audit records for all uses of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
V-261458 Medium SLEM 5 must generate audit records for all uses of the "mount" system call.
V-261349 Medium SLEM 5 default permissions must be defined in such a way that all authenticated users can only read and modify their own files.
V-261348 Medium All SLEM 5 local interactive user accounts, upon creation, must be assigned a home directory.
V-261347 Medium SLEM 5 must disable the USB mass storage kernel module.
V-261346 Medium SLEM 5 wireless network adapters must be disabled unless approved and documented.
V-261342 Medium SLEM 5, for PKI-based authentication, must enforce authorized access to the corresponding private key.
V-261341 Medium SLEM 5 SSH daemon must perform strict mode checking of home directory configuration files.
V-261340 Medium SLEM 5 SSH daemon must be configured to not allow authentication using known hosts authentication.
V-261466 Medium Successful/unsuccessful uses of "setfiles" in SLEM 5 must generate an audit record.
V-261467 Medium Successful/unsuccessful uses of "semanage" in SLEM 5 must generate an audit record.
V-261464 Medium SLEM 5 must generate audit records for all modifications to the "tallylog" file must generate an audit record.
V-261465 Medium SLEM 5 must audit all uses of the sudoers file and all files in the "/etc/sudoers.d/" directory.
V-261462 Medium SLEM 5 must generate audit records for all uses of privileged functions.
V-261463 Medium SLEM 5 must generate audit records for all modifications to the "lastlog" file.
V-261460 Medium SLEM 5 must generate audit records for all uses of the "umount" system call.
V-261461 Medium SLEM 5 must generate audit records for all uses of the "unlink", "unlinkat", "rename", "renameat", and "rmdir" system calls.
V-261468 Medium Successful/unsuccessful uses of "setsebool" in SLEM 5 must generate an audit record.
V-261469 Medium SLEM 5 must generate audit records for the "/run/utmp file".
V-261269 Medium SLEM 5 must restrict access to the kernel message buffer.
V-261264 Medium SLEM 5 must implement an endpoint security tool.
V-261265 Medium SLEM 5 must display the Standard Mandatory DOD Notice and Consent Banner before granting any local or remote connection to the system.
V-261372 Medium SLEM 5 must use the invoking user's password for privilege escalation when using "sudo".
V-261373 Medium SLEM 5 must reauthenticate users when changing authenticators, roles, or escalating privileges.
V-261370 Medium SLEM 5 must enable the SELinux targeted policy.
V-261371 Medium SLEM 5 must prevent nonprivileged users from executing privileged functions, including disabling, circumventing, or altering implemented security safeguards/countermeasures.
V-261376 Medium SLEM 5 must specify the default "include" directory for the /etc/sudoers file.
V-261377 Medium SLEM 5 must enforce passwords that contain at least one uppercase character.
V-261374 Medium SLEM 5 must require reauthentication when using the "sudo" command.
V-261375 Medium SLEM 5 must restrict privilege elevation to authorized personnel.
V-261471 Medium SLEM 5 must generate audit records for the "/var/log/wtmp" file.
V-261470 Medium SLEM 5 must generate audit records for the "/var/log/btmp" file.
V-261379 Medium SLEM 5 must enforce passwords that contain at least one numeric character.
V-261358 Medium SLEM 5 must not have unnecessary account capabilities.
V-261351 Medium All SLEM 5 local interactive users must have a home directory assigned in the /etc/passwd file.
V-261279 Medium SLEM 5 must use a separate file system for /var.
V-261278 Medium A separate file system must be used for SLEM 5 user home directories (such as /home or an equivalent).
V-261273 Medium Vendor-packaged SLEM 5 security patches and updates must be installed and up to date.
V-261272 Medium SLEM 5 must implement kptr-restrict to prevent the leaking of internal kernel addresses.
V-261271 Medium Address space layout randomization (ASLR) must be implemented by SLEM 5 to protect memory from unauthorized code execution.
V-261270 Medium SLEM 5 kernel core dumps must be disabled unless needed.
V-261276 Medium SLEM 5 must use vlock to allow for session locking.
V-261275 Medium SLEM 5 must remove all outdated software components after updated versions have been installed.
V-261365 Medium SLEM 5 must enforce a delay of at least five seconds between logon prompts following a failed logon attempt via pluggable authentication modules (PAM).
V-261364 Medium SLEM 5 must lock an account after three consecutive invalid access attempts.
V-261366 Medium SLEM 5 must use the default pam_tally2 tally directory.
V-261361 Medium SLEM 5 must not have duplicate User IDs (UIDs) for interactive users.
V-261360 Medium SLEM 5 must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity after password expiration.
V-261363 Medium SLEM 5 must initiate a session lock after a 15-minute period of inactivity.
V-261362 Medium SLEM 5 must display the date and time of the last successful account logon upon logon.
V-261404 Medium SLEM 5 file integrity tool must be configured to verify Access Control Lists (ACLs).
V-261350 Medium SLEM 5 shadow password suite must be configured to enforce a delay of at least five seconds between logon prompts following a failed logon attempt.
V-261406 Medium SLEM 5 file integrity tool must be configured to protect the integrity of the audit tools.
V-261407 Medium Advanced Intrusion Detection Environment (AIDE) must verify the baseline SLEM 5 configuration at least weekly.
V-261402 Medium SLEM 5 must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.
V-261403 Medium SLEM 5 must use a file integrity tool to verify correct operation of all security functions.
V-261289 Medium SLEM 5 library directories must have mode 755 or less permissive.
V-261282 Medium SLEM 5 file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.
V-261419 Medium SLEM 5 audit tools must have the proper permissions configured to protect against unauthorized access.
V-261418 Medium SLEM 5 must protect audit rules from unauthorized modification.
V-261417 Medium Audispd must take appropriate action when SLEM 5 audit storage is full.
V-261416 Medium SLEM 5 must offload audit records onto a different system or media from the system being audited.
V-261415 Medium SLEM 5 audit system must take appropriate action when the audit storage volume is full.
V-261414 Medium SLEM 5 auditd service must notify the system administrator (SA) and information system security officer (ISSO) immediately when audit storage capacity is 75 percent full.
V-261413 Medium SLEM 5 must allocate audit record storage capacity to store at least one week of audit records when audit records are not immediately sent to a central audit record storage facility.
V-261412 Medium The audit-audispd-plugins package must be installed on SLEM 5.
V-261411 Medium SLEM 5 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
V-261410 Medium SLEM 5 must have the auditing package installed.
V-261310 Medium SLEM 5 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.
V-261311 Medium SLEM 5 clock must, for networked systems, be synchronized to an authoritative DOD time source at least every 24 hours.
V-261312 Medium SLEM 5 must not have network interfaces in promiscuous mode unless approved and documented.
V-261313 Medium SLEM 5 must not forward Internet Protocol version 4 (IPv4) source-routed packets.
V-261314 Medium SLEM 5 must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
V-261315 Medium SLEM 5 must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
V-261316 Medium SLEM 5 must not allow interfaces to accept Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
V-261317 Medium SLEM 5 must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
V-261318 Medium SLEM 5 must not allow interfaces to send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
V-261408 Medium SLEM 5 must notify the system administrator (SA) when Advanced Intrusion Detection Environment (AIDE) discovers anomalies in the operation of any security functions.
V-261409 Medium SLEM 5 must offload rsyslog messages for networked systems in real time and offload standalone systems at least weekly.
V-261398 Medium SLEM 5 must implement certificate status checking for multifactor authentication.
V-261399 Medium If Network Security Services (NSS) is being used by SLEM 5 it must prohibit the use of cached authentications after one day.
V-261283 Medium SLEM 5 file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.
V-261390 Medium SLEM 5 must employ a password history file.
V-261393 Medium SLEM 5 must employ FIPS 140-2/140-3 approved cryptographic hashing algorithm for system authentication (login.defs).
V-261394 Medium SLEM 5 must be configured to create or update passwords with a minimum lifetime of 24 hours (one day).
V-261395 Medium SLEM 5 must be configured to create or update passwords with a maximum lifetime of 60 days.
V-261396 Medium SLEM 5 must have the packages required for multifactor authentication to be installed.
V-261397 Medium SLEM 5 must implement multifactor authentication for access to privileged accounts via pluggable authentication modules (PAM).
V-261405 Medium SLEM 5 file integrity tool must be configured to verify extended attributes.
V-261319 Medium SLEM 5 must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.
V-261288 Medium SLEM 5 must have system commands set to a mode of 755 or less permissive.
V-261422 Medium Audispd must offload audit records onto a different system or media from SLEM 5 being audited.
V-261423 Medium The information system security officer (ISSO) and system administrator (SA), at a minimum, must have mail aliases to be notified of a SLEM 5 audit processing failure.
V-261420 Medium SLEM 5 audit tools must have the proper permissions applied to protect against unauthorized access.
V-261426 Medium SLEM 5 must generate audit records for all uses of the "chage" command.
V-261427 Medium SLEM 5 must generate audit records for all uses of the "chcon" command.
V-261424 Medium The information system security officer (ISSO) and system administrator (SA), at a minimum, must be alerted of a SLEM 5 audit processing failure event.
V-261425 Medium SLEM 5 must generate audit records for all uses of the "chacl" command.
V-261400 Medium SLEM 5 must configure the Linux Pluggable Authentication Modules (PAM) to prohibit the use of cached offline authentications after one day.
V-261428 Medium SLEM 5 must generate audit records for all uses of the "chfn" command.
V-261429 Medium SLEM 5 must generate audit records for all uses of the "chmod" command.
V-261401 Medium SLEM 5, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
V-261303 Medium All SLEM 5 files and directories must have a valid owner.
V-261302 Medium SLEM 5 must have directories that contain system commands group-owned by root.
V-261301 Medium SLEM 5 must have directories that contain system commands owned by root.
V-261300 Medium SLEM 5 must have system commands group-owned by root or a system account.
V-261307 Medium The sticky bit must be set on all SLEM 5 world-writable directories.
V-261306 Medium All SLEM 5 world-writable directories must be group-owned by root, sys, bin, or an application group.
V-261305 Medium All SLEM 5 local interactive user home directories must be group-owned by the home directory owner's primary group.
V-261304 Medium All SLEM 5 files and directories must have a valid group owner.
V-261309 Medium SLEM 5 must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
V-261308 Medium SLEM 5 must prevent unauthorized users from accessing system error messages.
V-261472 Medium SLEM 5 must not disable syscall auditing.
V-261388 Medium SLEM 5 must employ user passwords with a minimum lifetime of 24 hours (one day).
V-261383 Medium SLEM 5 must require the change of at least eight of the total number of characters when passwords are changed.
V-261382 Medium SLEM 5 must employ passwords with a minimum of 15 characters.
V-261381 Medium SLEM 5 must prevent the use of dictionary words for passwords.
V-261380 Medium SLEM 5 must enforce passwords that contain at least one special character.
V-261385 Medium SLEM 5 must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords.
V-261384 Medium SLEM 5 must not allow passwords to be reused for a minimum of five generations.
V-261389 Medium SLEM 5 must employ user passwords with a maximum lifetime of 60 days.
V-261367 Low SLEM 5 must limit the number of concurrent sessions to 10 for all accounts and/or account types.
V-261368 Low SLEM 5 must have policycoreutils package installed.
V-261421 Low SLEM 5 audit event multiplexor must be configured to use Kerberos.