Guide to the Secure Configuration of Fedora
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Disable Full User Name on Splash Shield
By default when the screen is locked, the splash shield will show the user's full name. This should be disabled to prevent casual observers from se...Rule Medium Severity -
Ensure Users Cannot Change GNOME3 Screensaver Settings
If not already configured, ensure that users cannot change GNOME3 screensaver lock settings by adding <code>/org/gnome/desktop/screensaver/lock-del...Rule Medium Severity -
Sudo - timestamp_timeout value
Defines the number of minutes that can elapse before <code>sudo</code> will ask for a passwd again. If set to a value less than 0 the user's time s...Value -
Sudo - umask value
Specify the sudo umask to use. The actual umask value that is used is the union of the user's umask and the sudo umask. The default sudo umask is 0...Value -
Ensure Users Cannot Change GNOME3 Session Idle Settings
If not already configured, ensure that users cannot change GNOME3 session idle settings by adding <code>/org/gnome/desktop/session/idle-delay</code...Rule Medium Severity -
GNOME System Settings
GNOME provides configuration and functionality to a graphical desktop environment that changes grahical configurations or allow a user to perform a...Group -
Disable Ctrl-Alt-Del Reboot Key Sequence in GNOME3
By default, <code>GNOME</code> will reboot the system if the <code>Ctrl-Alt-Del</code> key sequence is pressed. <br><br> To configure the system to...Rule High Severity -
Disable Geolocation in GNOME3
<code>GNOME</code> allows the clock and applications to track and access location information. This setting should be disabled as applications shou...Rule Medium Severity -
Disable Power Settings in GNOME3
By default, <code>GNOME</code> enables a power profile designed for mobile devices with battery usage. While useful for mobile devices, this settin...Rule Medium Severity -
Disable User Administration in GNOME3
By default, <code>GNOME</code> will allow all users to have some administratrion capability. This should be disabled so that non-administrative use...Rule High Severity -
SAP Specific Requirement
SAP (Systems, Applications and Products in Data Processing) is enterprise software to manage business operations and customer relations. The follow...Group -
Sudo
<code>Sudo</code>, which stands for "su 'do'", provides the ability to delegate authority to certain users, groups of users, or system administrato...Group -
Install sudo Package
Thesudo
package can be installed with the following command:$ sudo dnf install sudo
Rule Medium Severity -
Ensure Privileged Escalated Commands Cannot Execute Other Commands - sudo NOEXEC
The sudo <code>NOEXEC</code> tag, when specified, prevents user executed commands from executing other commands, like a shell for example. This sho...Rule High Severity -
Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo requiretty
The sudo <code>requiretty</code> tag, when specified, will only execute sudo commands from users logged in to a real tty. This should be enabled by...Rule Medium Severity -
Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty
The sudo <code>use_pty</code> tag, when specified, will only execute sudo commands from users logged in to a real tty. This should be enabled by ma...Rule Medium Severity -
Ensure Sudo Logfile Exists - sudo logfile
A custom log sudo file can be configured with the 'logfile' tag. This rule configures a sudo custom logfile at the default location suggested by CI...Rule Low Severity -
Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate
The sudo <code>!authenticate</code> option, when specified, allows a user to execute commands using sudo without having to authenticate. This shoul...Rule Medium Severity -
Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
The sudo <code>NOPASSWD</code> tag, when specified, allows a user to execute commands using sudo without having to authenticate. This should be dis...Rule Medium Severity -
Ensure Users Re-Authenticate for Privilege Escalation - sudo
The sudo <code>NOPASSWD</code> and <code>!authenticate</code> option, when specified, allows a user to execute commands using sudo without having t...Rule Medium Severity -
Require Re-Authentication When Using the sudo Command
The sudo <code>timestamp_timeout</code> tag sets the amount of time sudo password prompt waits. The default <code>timestamp_timeout</code> value is...Rule Medium Severity -
Only the VDSM User Can Use sudo NOPASSWD
The sudo <code>NOPASSWD</code> tag, when specified, allows a user to execute commands using sudo without having to authenticate. Only the <code>vds...Rule Medium Severity -
Install libcap-ng-utils Package
Thelibcap-ng-utils
package can be installed with the following command:$ sudo dnf install libcap-ng-utils
Rule Medium Severity -
Ensure sudo only includes the default configuration directory
Administrators can configure authorized <code>sudo</code> users via drop-in files, and it is possible to include other directories and configuratio...Rule Medium Severity -
Explicit arguments in sudo specifications
All commands in the sudoers file must strictly specify the arguments allowed to be used for a given user. If the command is supposed to be executed...Rule Medium Severity -
Don't define allowed commands in sudoers by means of exclusion
Policies applied by sudo through the sudoers file should not involve negation. Each user specification in the <code>sudoers</code> file contains a...Rule Medium Severity -
Don't target root user in the sudoers file
The targeted users of a user specification should be, as much as possible, non privileged users (i.e.: non-root). User specifications have to expl...Rule Medium Severity -
Ensure invoking users password for privilege escalation when using sudo
The sudoers security policy requires that users authenticate themselves before they can use sudo. When sudoers requires authentication, it validate...Rule Medium Severity -
System Tooling / Utilities
The following checks evaluate the system for recommended base packages -- both for installation and removal.Group -
Install binutils Package
Thebinutils
package can be installed with the following command:$ sudo dnf install binutils
Rule Medium Severity -
Ensure gnutls-utils is installed
Thegnutls-utils
package can be installed with the following command:$ sudo dnf install gnutls-utils
Rule Medium Severity -
Ensure nss-tools is installed
Thenss-tools
package can be installed with the following command:$ sudo dnf install nss-tools
Rule Medium Severity -
Install openscap-scanner Package
Theopenscap-scanner
package can be installed with the following command:$ sudo dnf install openscap-scanner
Rule Medium Severity -
Install rear Package
Therear
package can be installed with the following command:$ sudo dnf install rear
Rule Medium Severity -
Install rng-tools Package
Therng-tools
package can be installed with the following command:$ sudo dnf install rng-tools
Rule Low Severity -
Install scap-security-guide Package
Thescap-security-guide
package can be installed with the following command:$ sudo dnf install scap-security-guide
Rule Medium Severity -
Install tar Package
Thetar
package can be installed with the following command:$ sudo dnf install tar
Rule Medium Severity -
Install vim Package
Thevim-enhanced
package can be installed with the following command:$ sudo dnf install vim-enhanced
Rule Low Severity -
Uninstall abrt-addon-ccpp Package
Theabrt-addon-ccpp
package can be removed with the following command:$ sudo dnf erase abrt-addon-ccpp
Rule Low Severity -
Uninstall abrt-addon-kerneloops Package
Theabrt-addon-kerneloops
package can be removed with the following command:$ sudo dnf erase abrt-addon-kerneloops
Rule Low Severity -
Uninstall abrt-cli Package
Theabrt-cli
package can be removed with the following command:$ sudo dnf erase abrt-cli
Rule Low Severity -
Uninstall abrt-plugin-logger Package
Theabrt-plugin-logger
package can be removed with the following command:$ sudo dnf erase abrt-plugin-logger
Rule Low Severity -
Uninstall abrt-plugin-rhtsupport Package
Theabrt-plugin-rhtsupport
package can be removed with the following command:$ sudo dnf erase abrt-plugin-rhtsupport
Rule Low Severity -
Uninstall abrt-plugin-sosreport Package
Theabrt-plugin-sosreport
package can be removed with the following command:$ sudo dnf erase abrt-plugin-sosreport
Rule Low Severity -
Uninstall geolite2-city Package
Thegeolite2-city
package can be removed with the following command:$ sudo dnf erase geolite2-city
Rule Low Severity -
Uninstall geolite2-country Package
Thegeolite2-country
package can be removed with the following command:$ sudo dnf erase geolite2-country
Rule Low Severity -
Uninstall iprutils Package
Theiprutils
package can be removed with the following command:$ sudo dnf erase iprutils
Rule Medium Severity -
Uninstall krb5-workstation Package
Thekrb5-workstation
package can be removed with the following command:$ sudo dnf erase krb5-workstation
Rule Medium Severity -
Uninstall libreport-plugin-logger Package
Thelibreport-plugin-logger
package can be removed with the following command:$ sudo dnf erase libreport-plugin-logger
Rule Low Severity -
Uninstall libreport-plugin-rhtsupport Package
The <code>libreport-plugin-rhtsupport</code> package can be removed with the following command: <pre> $ sudo dnf erase libreport-plugin-rhtsupport<...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.