RHEL 10 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).

STIG ID: RHEL-10-200634  |  SRG: SRG-OS-000404-GPOS-00183 |  Severity: medium (CAT II)  |  CCI: CCI-002475 |  Vulnerability Id: V-280981

Vulnerability Discussion

RHEL 10 installation media ships with an optional file integrity tool called Advanced Intrusion Detection Environment (AIDE). AIDE is highly configurable at install time. This requirement assumes the "aide.conf" file is under the "/etc" directory.

ACLs can provide permissions beyond those permitted through the file mode and must be verified by the file integrity tools.

Check

Verify RHEL 10 AIDE is verifying ACLs.

Verify ACL settings for all uncommented file and directory selection lists with the following command:

$ sudo grep -E '^[^#]*acl' /etc/aide.conf
FIPSR = p+i+n+u+g+s+m+growing+acl+selinux+xattrs+sha512
/usr/sbin/auditctl p+i+n+u+g+s+b+acl+xattrs+sha512
/usr/sbin/auditd p+i+n+u+g+s+b+acl+xattrs+sha512
/usr/sbin/ausearch p+i+n+u+g+s+b+acl+xattrs+sha512
/usr/sbin/aureport p+i+n+u+g+s+b+acl+xattrs+sha512
/usr/sbin/augenrules p+i+n+u+g+s+b+acl+xattrs+sha512
DIR = p+i+n+u+g+acl+selinux+xattrs
PERMS = p+i+u+g+acl+selinux

Open the file and verify no additional uncommented file and directory selection lines are missing the "acl" rule.

If the "acl" rule is not being used on all uncommented selection lines in the "/etc/aide.conf" file, or ACLs are not being checked by another file integrity tool, this is a finding.

Fix

Configure RHEL 10 so that the file integrity tool checks file and directory ACLs.

If AIDE is installed, ensure the "acl" rule is present on all uncommented file and directory selection lists.