Skip to content

Guide to the Secure Configuration of Red Hat Enterprise Linux 10

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Stack Protector buffer overlow detection

    This feature puts, at the beginning of functions, a canary value on the stack just before the return address, and validates the value just before a...
    Rule Medium Severity
  • Strong Stack Protector

    This features adds canary logic protection to more kinds of vulnerable functions than CONFIG_STACKPROTECTOR, but not to all functions so that perfo...
    Rule Medium Severity
  • net.ipv4.tcp_rfc1337

    Enable to enable TCP behavior conformant with RFC 1337
    Value
  • net.ipv4.tcp_syncookies

    Enable to turn on TCP SYN Cookie Protection
    Value
  • Make the kernel text and rodata read-only

    When set, kernel text and rodata memory will be made read-only, and non-text memory will be made non-executable. This configuration is available fr...
    Rule Medium Severity
  • Make the module text and rodata read-only

    When set, module text and rodata memory will be made read-only, and non-text memory will be made non-executable. This configuration is available fr...
    Rule Medium Severity
  • Enable TCP/IP syncookie support

    Normal TCP/IP networking is open to an attack known as SYN flooding. It is denial-of-service attack that prevents legitimate remote users from bein...
    Rule Medium Severity
  • Unmap kernel when running in userspace (aka KAISER)

    Speculation attacks against some high-performance processors can be used to bypass MMU permission checks and leak kernel data to userspace. This ca...
    Rule Medium Severity
  • User a virtually-mapped stack

    Enable this to use virtually-mapped kernel stacks with guard pages. This configuration is available from kernel 4.9. The configuration that was us...
    Rule Medium Severity
  • Disable x86 vsyscall emulation

    Disabling it is roughly equivalent to booting with vsyscall=none, except that it will also disable the helpful warning if a program tries to use a ...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules