RHEL 10 must have the USBGuard package enabled.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-280963 | RHEL-10-200561 | SV-280963r1165244_rule | CCI-001958 | medium |
| Description | ||||
| The USBGuard-daemon is the main component of the USBGuard software framework. It runs as a service in the background and enforces the USB device authorization policy for all USB devices. The policy is defined by a set of rules using a rule language described in the "usbguard-rules.conf" file. The policy and the authorization state of USB devices can be modified during runtime using the USBGuard tool. The system administrator (SA) must work with the site information system security officer (ISSO) to determine a list of authorized peripherals and establish rules within the USBGuard software framework to allow only authorized devices. Satisfies: SRG-OS-000378-GPOS-00163, SRG-OS-000690-GPOS-00140 | ||||
| STIG | Date | |||
| Red Hat Enterprise Linux 10 Security Technical Implementation Guide | 2026-03-11 | |||
Details
Check Text (C-280963r1165244_chk)
Note: If the system is virtual machine with no virtual or physical USB peripherals attached, this is not applicable.
Verify RHEL 10 has USBGuard enabled with the following command:
$ systemctl is-active usbguard
active
If USBGuard is not active, ask the SA to indicate how unauthorized peripherals are being blocked.
If there is no evidence that unauthorized peripherals are being blocked before establishing a connection, this is a finding.
Fix Text (F-85429r1165243_fix)
Configure RHEL 10 to have the USBGuard service enabled by running the following command:
$ sudo systemctl enable --now usbguard