STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Red Hat Enterprise Linux 10 Security Technical Implementation Guide

V-280962

CAT II (Medium)

RHEL 10 must have the USBGuard package installed.

Rule ID

SV-280962r1195350_rule

STIG

Red Hat Enterprise Linux 10 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001958

Discussion

The USBGuard-daemon is the main component of the USBGuard software framework. It runs as a service in the background and enforces the USB device authorization policy for all USB devices. The policy is defined by a set of rules using a rule language described in the "usbguard-rules.conf" file. The policy and the authorization state of USB devices can be modified during runtime using the USBGuard tool. The system administrator (SA) must work with the site information system security officer (ISSO) to determine a list of authorized peripherals and establish rules within the USBGuard software framework to allow only authorized devices.

Check Content

Verify RHEL 10 has USBGuard installed on the operating system with the following command:

$ sudo dnf list --installed usbguard
Installed Packages
usbguard.x86_64                             1.1.3-6.el10                              @rhel-10-for-x86_64-appstream-rpms

If the USBGuard package is not installed, ask the SA to indicate how unauthorized peripherals are being blocked.

If there is no evidence that unauthorized peripherals are being blocked before establishing a connection, this is a finding.

If the system is a virtual machine with no virtual or physical USB peripherals attached, this is not a finding.

Fix Text

Configure RHEL 10 to have the USBGuard package installed with the following command:

$ sudo dnf -y install usbguard

Enable the service to start on boot and then start it with the following commands:

$ sudo systemctl enable usbguard
$ sudo systemctl start usbguard

Verify the status of the service with the following command:

$ sudo systemctl status usbguard

Note: USBGuard must be configured to allow authorized devices once it is enabled on RHEL 10.