Skip to content

Guide to the Secure Configuration of Fedora

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Ensure gnutls-utils is installed

    The gnutls-utils package can be installed with the following command:
    $ sudo dnf install gnutls-utils
    Rule Medium Severity
  • Install openscap-scanner Package

    The openscap-scanner package can be installed with the following command:
    $ sudo dnf install openscap-scanner
    Rule Medium Severity
  • Install rear Package

    The rear package can be installed with the following command:
    $ sudo dnf install rear
    Rule Medium Severity
  • Install rng-tools Package

    The rng-tools package can be installed with the following command:
    $ sudo dnf install rng-tools
    Rule Low Severity
  • Install tar Package

    The tar package can be installed with the following command:
    $ sudo dnf install tar
    Rule Medium Severity
  • Install vim Package

    The vim-enhanced package can be installed with the following command:
    $ sudo dnf install vim-enhanced
    Rule Low Severity
  • Uninstall abrt-addon-ccpp Package

    The abrt-addon-ccpp package can be removed with the following command:
    $ sudo dnf remove abrt-addon-ccpp
    Rule Low Severity
  • Uninstall abrt-addon-kerneloops Package

    The abrt-addon-kerneloops package can be removed with the following command:
    $ sudo dnf remove abrt-addon-kerneloops
    Rule Low Severity
  • Uninstall abrt-cli Package

    The abrt-cli package can be removed with the following command:
    $ sudo dnf remove abrt-cli
    Rule Low Severity
  • Uninstall abrt-plugin-logger Package

    The abrt-plugin-logger package can be removed with the following command:
    $ sudo dnf remove abrt-plugin-logger
    Rule Low Severity
  • Uninstall abrt-plugin-rhtsupport Package

    The abrt-plugin-rhtsupport package can be removed with the following command:
    $ sudo dnf remove abrt-plugin-rhtsupport
    Rule Low Severity
  • Uninstall abrt-plugin-sosreport Package

    The abrt-plugin-sosreport package can be removed with the following command:
    $ sudo dnf remove abrt-plugin-sosreport
    Rule Low Severity
  • Uninstall geolite2-city Package

    The geolite2-city package can be removed with the following command:
    $ sudo dnf remove geolite2-city
    Rule Low Severity
  • Uninstall geolite2-country Package

    The geolite2-country package can be removed with the following command:
    $ sudo dnf remove geolite2-country
    Rule Low Severity
  • Uninstall krb5-workstation Package

    The krb5-workstation package can be removed with the following command:
    $ sudo dnf remove krb5-workstation
    Rule Medium Severity
  • Uninstall libreport-plugin-logger Package

    The libreport-plugin-logger package can be removed with the following command:
    $ sudo dnf remove libreport-plugin-logger
    Rule Low Severity
  • Uninstall libreport-plugin-rhtsupport Package

    The libreport-plugin-rhtsupport package can be removed with the following command:
    $ sudo dnf remove libreport-plugin-rhtsupport
    Rule Low Severity
  • Uninstall python3-abrt-addon Package

    The python3-abrt-addon package can be removed with the following command:
    $ sudo dnf remove python3-abrt-addon
    Rule Low Severity
  • Updating Software

    The <code>dnf</code> command line tool is used to install and update software packages. The system also provides a graphical software update tool in the <b>System</b> menu, in the <b>Administration...
    Group
  • Install dnf-automatic Package

    The dnf-automatic package can be installed with the following command:
    $ sudo dnf install dnf-automatic
    Rule Medium Severity
  • Install GNOME Software

    The gnome-software package can be installed with the following command:
    $ sudo dnf install gnome-software
    Rule Medium Severity
  • Ensure dnf Removes Previous Package Versions

    <code>dnf</code> should be configured to remove previous software components after new versions have been installed. To configure <code>dnf</code> to remove the previous software components after ...
    Rule Low Severity
  • Configure dnf-automatic to Install Available Updates Automatically

    To ensure that the packages comprising the available updates will be automatically installed by <code>dnf-automatic</code>, set <code>apply_updates</code> to <code>yes</code> under <code>[commands]...
    Rule Medium Severity
  • Configure dnf-automatic to Install Only Security Updates

    To configure <code>dnf-automatic</code> to install only security updates automatically, set <code>upgrade_type</code> to <code>security</code> under <code>[commands]</code> section in <code>/etc/dn...
    Rule Low Severity
  • Ensure Fedora GPG Key Installed

    To ensure the system can cryptographically verify base software packages come from Fedora (and to connect to the Fedora Network to receive them), the Fedora GPG key must properly be installed. To i...
    Rule High Severity
  • Ensure gpgcheck Enabled for Local Packages

    <code>dnf</code> should be configured to verify the signature(s) of local packages prior to installation. To configure <code>dnf</code> to verify signatures of local packages, set the <code>localpk...
    Rule High Severity
  • Ensure gpgcheck Enabled for All dnf Package Repositories

    To ensure signature checking is not disabled for any repos, remove any lines from files in /etc/yum.repos.d of the form:
    gpgcheck=0
    Rule High Severity
  • Ensure gpgcheck Enabled for Repository Metadata

    Verify the operating system prevents the installation of patches, service packs, device drivers, or operating system components of local packages without verification of the repository metadata. Ch...
    Rule High Severity
  • Ensure Software Patches Installed



    NOTE: U.S. Defense systems are required to be patched within 30 days or sooner as local policy dictates.
    Rule Medium Severity
  • Enable dnf-automatic Timer

    The dnf-automatic timer can be enabled with the following command:
    $ sudo systemctl enable dnf-automatic.timer
    Rule Medium Severity
  • Account and Access Control

    In traditional Unix security, if an attacker gains shell access to a certain login account, they can perform any action or access any file to which that account has access. Therefore, making it mor...
    Group
  • Authselect profile

    Specify the authselect profile to select
    Value
  • Enable authselect

    Configure user authentication setup to use the <code>authselect</code> tool. If authselect profile is selected, the rule will enable the <xccdf-1.2:sub idref="xccdf_org.ssgproject.content_value_var...
    Rule Medium Severity
  • Set Lockouts for Failed Password Attempts

    The <code>pam_faillock</code> PAM module provides the capability to lock out user accounts after a number of failed login attempts. Its documentation is available in <code>/usr/share/doc/pam-VERSIO...
    Group
  • Login Banner Verbiage

    Enter an appropriate login banner for your organization. Please note that new lines must be expressed by the '\n' character and special characters like parentheses and quotation marks must be escap...
    Value
  • MotD Banner Verbiage

    Enter an appropriate login banner for your organization. Please note that new lines must be expressed by the '\n' character and special characters like parentheses and quotation marks must be escap...
    Value
  • Remote Login Banner Verbiage

    Enter an appropriate login banner for your organization. Please note that new lines must be expressed by the '\n' character and special characters like parentheses and quotation marks must be escap...
    Value
  • fail_deny

    Number of failed login attempts before account lockout
    Value
  • Verify Group Ownership of Message of the Day Banner

    To properly set the group owner of /etc/motd, run the command:
    $ sudo chgrp root /etc/motd
    Rule Medium Severity
  • Verify ownership of System Login Banner

    To properly set the owner of /etc/issue, run the command:
    $ sudo chown root /etc/issue 
    Rule Medium Severity
  • Verify ownership of System Login Banner for Remote Connections

    To properly set the owner of /etc/issue.net, run the command:
    $ sudo chown root /etc/issue.net 
    Rule Medium Severity
  • Verify ownership of Message of the Day Banner

    To properly set the owner of /etc/motd, run the command:
    $ sudo chown root /etc/motd 
    Rule Medium Severity
  • Verify permissions on System Login Banner

    To properly set the permissions of /etc/issue, run the command:
    $ sudo chmod 0644 /etc/issue
    Rule Medium Severity
  • Verify permissions on System Login Banner for Remote Connections

    To properly set the permissions of /etc/issue.net, run the command:
    $ sudo chmod 0644 /etc/issue.net
    Rule Medium Severity
  • Verify permissions on Message of the Day Banner

    To properly set the permissions of /etc/motd, run the command:
    $ sudo chmod 0644 /etc/motd
    Rule Medium Severity
  • Implement a GUI Warning Banner

    In the default graphical environment, users logging directly into the system are greeted with a login screen provided by the GNOME Display Manager (GDM). The warning banner should be displayed in t...
    Group
  • faillock directory

    The directory where the user files with the failure records are kept
    Value
  • fail_interval

    Interval for counting failed login attempts before account lockout
    Value
  • fail_unlock_time

    Seconds before automatic unlocking or permanently locking after excessive failed logins
    Value
  • Set the GNOME3 Login Warning Banner Text

    In the default graphical environment, configuring the login warning banner text in the GNOME Display Manager's login screen can be configured on the login screen by setting <code>banner-message-tex...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules