STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Riverbed NetIM OS Security Technical Implementation Guide

Version

V1R1

Release Date

Oct 2, 2025

SCAP Benchmark ID

RB_NetIM_OS_STIG

Total Checks

154

Tags

other
CAT I: 11CAT II: 139CAT III: 4

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (154)

V-275534MEDIUMUbuntu OS must be configured so that audit configuration files are not write-accessible by unauthorized users.V-275565MEDIUMUbuntu OS must disable the x86 Ctrl-Alt-Delete key sequence.V-275566HIGHUbuntu OS must require authentication upon booting into single-user and maintenance modes.V-275567MEDIUMUbuntu OS must restrict access to the kernel message buffer.V-275568MEDIUMUbuntu OS must disable kernel core dumps.V-275569MEDIUMUbuntu OS must implement address space layout randomization to protect its memory from unauthorized code execution.V-275570MEDIUMUbuntu OS must implement nonexecutable data to protect its memory from unauthorized code execution.V-275571HIGHUbuntu OS must be configured so that the Advance Package Tool (APT) prevents the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate recognized and approved by the organization.V-275573MEDIUMUbuntu OS must have the "libpam-pwquality" package installed.V-275574MEDIUMUbuntu OS must not have the "systemd-timesyncd" package installed.V-275575MEDIUMUbuntu OS must not have the "ntp" package installed.V-275576MEDIUMUbuntu OS must not have the "rsh-server" package installed.V-275577HIGHUbuntu OS must not have the "telnet" package installed.V-275578MEDIUMUbuntu OS must implement cryptographic mechanisms to prevent unauthorized disclosure and modification of all information that requires protection at rest.V-275579MEDIUMUbuntu OS must have directories that contain system commands set to a mode of "755" or less permissive.V-275580MEDIUMUbuntu OS must have system commands set to a mode of "755" or less permissive.V-275581MEDIUMUbuntu OS library files must have mode "755" or less permissive.V-275582MEDIUMUbuntu OS must configure the "/var/log" directory to have mode "755" or less permissive.V-275583MEDIUMUbuntu OS must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.V-275584MEDIUMUbuntu OS must generate system journal entries without revealing information that could be exploited by adversaries.V-275585MEDIUMUbuntu OS must configure "/var/log/syslog" file with mode "640" or less permissive.V-275586MEDIUMUbuntu OS must configure audit tools with a mode of "755" or less permissive.V-275587MEDIUMUbuntu OS must have directories that contain system commands owned by "root".V-275588MEDIUMUbuntu OS must have directories that contain system commands group-owned by "root".V-275589MEDIUMUbuntu OS must have system commands owned by "root" or a system account.V-275590MEDIUMUbuntu OS must have system commands group-owned by "root" or a system account.V-275591MEDIUMUbuntu OS library directories must be owned by "root".V-275592MEDIUMUbuntu OS library directories must be group-owned by "root".V-275593MEDIUMUbuntu OS library files must be owned by "root".V-275594MEDIUMUbuntu OS library files must be group-owned by "root".V-275595MEDIUMUbuntu OS must configure the directories used by the system journal to be owned by "root".V-275596MEDIUMUbuntu OS must configure the directories used by the system journal to be group-owned by "systemd-journal".V-275597MEDIUMUbuntu OS must configure the files used by the system journal to be owned by "root".V-275598MEDIUMUbuntu OS must configure the files used by the system journal to be group-owned by "systemd-journal".V-275599MEDIUMUbuntu OS must be configured so that the "journalctl" command is owned by "root".V-275600MEDIUMUbuntu OS must be configured so that the "journalctl" command is group-owned by "root".V-275601MEDIUMUbuntu OS must configure audit tools to be owned by "root".V-275602MEDIUMUbuntu OS must configure the "/var/log" directory to be owned by "root".V-275603MEDIUMUbuntu OS must configure the "/var/log" directory to be group-owned by "syslog".V-275604MEDIUMUbuntu OS must configure "/var/log/syslog" file to be owned by "syslog".V-275605MEDIUMUbuntu OS must configure the "/var/log/syslog" file to be group-owned by "adm".V-275606MEDIUMUbuntu OS must be configured so that the "journalctl" command is not accessible by unauthorized users.V-275607MEDIUMUbuntu OS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.V-275608MEDIUMUbuntu OS must have an application firewall installed to control remote access methods.V-275609MEDIUMUbuntu OS must enable and run the Uncomplicated Firewall (ufw).V-275610MEDIUMUbuntu OS must have an application firewall enabled.V-275611MEDIUMUbuntu OS must configure the Uncomplicated Firewall (ufw) to rate limit impacted network interfaces.V-275612MEDIUMUbuntu OS must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management Category Assurance List (PPSM CAL) and vulnerability assessments.V-275613MEDIUMUbuntu OS must compare internal information system clocks at least every 24 hours with a server synchronized to one of the redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS) to synchronize clocks between NetIM components.V-275614MEDIUMUbuntu OS must synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second.V-275615LOWUbuntu OS must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).V-275616MEDIUMUbuntu OS must be configured to use TCP syncookies.V-275617MEDIUMUbuntu OS must restrict SSH access to allow only NetIM internal communication.V-275619MEDIUMUbuntu OS must display the Standard Mandatory DOD Notice and Consent Banner before granting any user connection to the OS.V-275620HIGHUbuntu OS must not allow unattended or automatic login via SSH.V-275621MEDIUMUbuntu OS must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.V-275622MEDIUMUbuntu OS must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.V-275623MEDIUMUbuntu OS SSH daemon must prevent remote hosts from connecting to the proxy display.V-275624MEDIUMUbuntu OS must configure the SSH daemon to use FIPS 140-2/140-3 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.V-275625HIGHUbuntu OS must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-2/140-3 -approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.V-275626HIGHUbuntu OS SSH server must be configured to use only FIPS-validated key exchange algorithms.V-275627HIGHUbuntu OS must use strong authenticators in establishing nonlocal maintenance and diagnostic sessions.V-275628MEDIUMUbuntu OS must retain a user's session lock until that user reestablishes access using established identification and authentication procedures.V-275629MEDIUMUbuntu OS must initiate a graphical session lock after 15 minutes of inactivity.V-275630MEDIUMUbuntu OS must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.V-275631MEDIUMUbuntu OS must disable automatic mounting of Universal Serial Bus (USB) mass storage driver.V-275633MEDIUMUbuntu OS must prevent direct login into the root account.V-275634MEDIUMUbuntu OS must uniquely identify interactive users.V-275640LOWUbuntu OS must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.V-275642MEDIUMUbuntu OS must allow users to directly initiate a session lock for all connection types.V-275643MEDIUMUbuntu OS must automatically exit interactive command shell user sessions after five minutes of inactivity.V-275645MEDIUMUbuntu OS must have the "apparmor" package installed.V-275646MEDIUMUbuntu OS must be configured to use AppArmor.V-275647MEDIUMUbuntu OS must require users to reauthenticate for privilege escalation or when changing roles.V-275648HIGHUbuntu OS must ensure only users who need access to security functions are part of sudo group.V-275649MEDIUMUbuntu OS must enforce password complexity by requiring at least one uppercase character be used.V-275650MEDIUMUbuntu OS must enforce password complexity by requiring at least one lowercase character be used.V-275651MEDIUMUbuntu OS must enforce password complexity by requiring at least one numeric character be used.V-275652MEDIUMUbuntu OS must enforce password complexity by requiring at least one special character be used.V-275653MEDIUMUbuntu OS must prevent the use of dictionary words for passwords.V-275654MEDIUMUbuntu OS must enforce a minimum 15-character password length.V-275655MEDIUMUbuntu OS must require the change of at least eight characters when passwords are changed.V-275656MEDIUMUbuntu OS must be configured so that when passwords are changed or new passwords are established, pwquality must be used.V-275657HIGHUbuntu OS must store only encrypted representations of passwords.V-275658MEDIUMUbuntu OS must not allow accounts configured with blank or null passwords.V-275659MEDIUMUbuntu OS must not have accounts configured with blank or null passwords.V-275660MEDIUMUbuntu OS must encrypt all stored passwords with a FIPS 140-2/140-3-approved cryptographic hashing algorithm.V-275668MEDIUMUbuntu OS must be configured such that Pluggable Authentication Module (PAM) prohibits the use of cached authentications after one day.V-275669MEDIUMUbuntu OS must use a file integrity tool to verify correct operation of all security functions.V-275670MEDIUMUbuntu OS must configure AIDE to perform file integrity checking on the file system.V-275671MEDIUMUbuntu OS must notify designated personnel if baseline configurations are changed in an unauthorized manner.V-275672MEDIUMUbuntu OS must be configured so that the script that runs each 30 days or less to check file integrity is the default.V-275673HIGHUbuntu OS must use cryptographic mechanisms to protect the integrity of audit tools.V-275674LOWUbuntu OS must have a crontab script running weekly to off-load audit events of standalone systems.V-275675MEDIUMUbuntu OS must be configured to preserve log records from failure events.V-275676MEDIUMUbuntu OS must monitor remote access methods.V-275677MEDIUMUbuntu OS must have the "auditd" package installed.V-275678MEDIUMUbuntu OS must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions in near real time.V-275679MEDIUMUbuntu OS audit event multiplexor must be configured to off-load audit logs onto a different system from the system being audited.V-275680MEDIUMUbuntu OS must alert the information system security officer (ISSO) and system administrator (SA) in the event of an audit processing failure.V-275682LOWUbuntu OS must immediately notify the system administrator (SA) and information system security officer (ISSO) when the audit record storage volume reaches 25 percent remaining of the allocated capacity.V-275683MEDIUMUbuntu OS must be configured so that audit log files are not read- or write-accessible by unauthorized users.V-275684MEDIUMUbuntu OS must be configured to permit only authorized users ownership of the audit log files.V-275685MEDIUMUbuntu OS must permit only authorized groups ownership of the audit log files.V-275686MEDIUMUbuntu OS must be configured so that the audit log directory is not write-accessible by unauthorized users.V-275687MEDIUMUbuntu OS must permit only authorized accounts to own the audit configuration files.V-275688MEDIUMUbuntu OS must permit only authorized groups to own the audit configuration files.V-275689MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the apparmor_parser command.V-275690MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the chacl command.V-275691MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the chage command.V-275692MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the chcon command.V-275693MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the chfn command.V-275694MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the chsh command.V-275695MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the crontab command.V-275696MEDIUMUbuntu OS must generate audit records for successful/unsuccessful attempts to use the fdisk command.V-275697MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the gpasswd command.V-275698MEDIUMUbuntu OS must generate audit records for successful/unsuccessful attempts to use the kmod command.V-275699MEDIUMUbuntu OS must generate audit records for successful/unsuccessful attempts to use modprobe command.V-275700MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the mount command.V-275701MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the newgrp command.V-275702MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the pam_timestamp_check command.V-275703MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the passwd command.V-275704MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the setfacl command.V-275705MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the ssh-agent command.V-275706MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the ssh-keysign command.V-275707MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the su command.V-275708MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the sudo command.V-275709MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the sudoedit command.V-275710MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the umount command.V-275711MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the unix_update command.V-275712MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the usermod command.V-275713MEDIUMUbuntu OS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.V-275714MEDIUMUbuntu OS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.V-275715MEDIUMUbuntu OS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.V-275716MEDIUMUbuntu OS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.V-275717MEDIUMUbuntu OS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.V-275718MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the chmod, fchmod, and fchmodat system calls.V-275719MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the chown, fchown, fchownat, and lchown system calls.V-275720MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls.V-275721MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the delete_module system call.V-275722MEDIUMUbuntu OS must generate audit records for successful/unsuccessful uses of the init_module and finit_module system calls.V-275723MEDIUMUbuntu OS must generate audit records for any use of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.V-275724MEDIUMUbuntu OS must generate audit records for any successful/unsuccessful use of unlink, unlinkat, rename, renameat, and rmdir system calls.V-275725MEDIUMUbuntu OS must generate audit records for all events that affect the systemd journal files.V-275726MEDIUMUbuntu OS must generate audit records for the /var/log/btmp file.V-275727MEDIUMUbuntu OS must generate audit records for the /var/log/wtmp file.V-275728MEDIUMUbuntu OS must generate audit records for the /var/run/utmp file.V-275729MEDIUMUbuntu OS must generate audit records for the use and modification of the faillog file.V-275730MEDIUMUbuntu OS must generate audit records for the use and modification of the lastlog file.V-275731MEDIUMUbuntu OS must generate audit records when successful/unsuccessful attempts to modify the /etc/sudoers file occur.V-275732MEDIUMUbuntu OS must generate audit records when successful/unsuccessful attempts to modify the /etc/sudoers.d directory occur.V-275733MEDIUMUbuntu OS must prevent all software from executing at higher privilege levels than users executing the software, and the audit system must be configured to audit the execution of privileged functions.V-275734MEDIUMUbuntu OS must generate audit records for privileged activities, nonlocal maintenance, diagnostic sessions, and other system-level access.V-275735HIGHUbuntu OS must implement NIST FIPS-validated cryptography.