Skip to content

Guide to the Secure Configuration of Oracle Linux 7

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Enable the login_console_enabled SELinux Boolean

    By default, the SELinux boolean <code>login_console_enabled</code> is enabled. If this setting is disabled, it should be enabled as it allows login...
    Rule Medium Severity
  • Disable the mmap_low_allowed SELinux Boolean

    By default, the SELinux boolean <code>mmap_low_allowed</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the mock_enable_homedirs SELinux Boolean

    By default, the SELinux boolean <code>mock_enable_homedirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <...
    Rule Medium Severity
  • Enable the mount_anyfile SELinux Boolean

    By default, the SELinux boolean <code>mount_anyfile</code> is enabled. If this setting is disabled, it should be enabled to allow any file or direc...
    Rule Medium Severity
  • Configure the polyinstantiation_enabled SELinux Boolean

    By default, the SELinux boolean <code>polyinstantiation_enabled</code> is disabled. This setting should be configured to <xccdf-1.2:sub idref="xccd...
    Rule Medium Severity
  • Enable the secadm_exec_content SELinux Boolean

    By default, the SELinux boolean <code>secadm_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <cod...
    Rule Medium Severity
  • Disable the secure_mode SELinux Boolean

    By default, the SELinux boolean <code>secure_mode</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>secu...
    Rule Medium Severity
  • Configure the secure_mode_insmod SELinux Boolean

    By default, the SELinux boolean <code>secure_mode_insmod</code> is disabled. This setting should be configured to <xccdf-1.2:sub idref="xccdf_org.s...
    Rule Medium Severity
  • Disable the secure_mode_policyload SELinux Boolean

    By default, the SELinux boolean <code>secure_mode_policyload</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Configure the selinuxuser_direct_dri_enabled SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_direct_dri_enabled</code> is enabled. If XWindows is not installed or used on the system, this se...
    Rule Medium Severity
  • Disable the selinuxuser_execheap SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_execheap</code> is disabled. When enabled this boolean is enabled it allows selinuxusers to execu...
    Rule Medium Severity
  • Enable the selinuxuser_execmod SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_execmod</code> is enabled. If this setting is disabled, it should be enabled. To enable the <cod...
    Rule Medium Severity
  • Disable the selinuxuser_execstack SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_execstack</code> is enabled. This setting should be disabled as unconfined executables should not...
    Rule Medium Severity
  • Disable the selinuxuser_mysql_connect_enabled SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_mysql_connect_enabled</code> is disabled. If this setting is enabled, it should be disabled. To ...
    Rule Medium Severity
  • Enable the selinuxuser_ping SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_ping</code> is enabled. If this setting is disabled, it should be enabled as it allows confined u...
    Rule Medium Severity
  • Disable the selinuxuser_postgresql_connect_enabled SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_postgresql_connect_enabled</code> is disabled. If this setting is enabled, it should be disabled....
    Rule Medium Severity
  • Disable the selinuxuser_rw_noexattrfile SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_rw_noexattrfile</code> is enabled. This setting should be disabled as users should not be able to...
    Rule Medium Severity
  • Disable the selinuxuser_share_music SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_share_music</code> is disabled. If this setting is enabled, it should be disabled. To disable th...
    Rule Medium Severity
  • Disable the selinuxuser_tcp_server SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_tcp_server</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the selinuxuser_udp_server SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_udp_server</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the selinuxuser_use_ssh_chroot SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_use_ssh_chroot</code> is disabled. If this setting is enabled, it should be disabled. To disable...
    Rule Medium Severity
  • Disable the ssh_chroot_rw_homedirs SELinux Boolean

    By default, the SELinux boolean <code>ssh_chroot_rw_homedirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable Cockpit Management Server

    The Cockpit Management Server (<code>cockpit</code>) provides a web based login and management framework. The <code>cockpit</code> service can be ...
    Rule Medium Severity
  • Disable the ssh_sysadm_login SELinux Boolean

    By default, the SELinux boolean <code>ssh_sysadm_login</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Enable the staff_exec_content SELinux Boolean

    By default, the SELinux boolean <code>staff_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code...
    Rule Medium Severity
  • Enable the sysadm_exec_content SELinux Boolean

    By default, the SELinux boolean <code>sysadm_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <cod...
    Rule Medium Severity
  • Enable the unconfined_login SELinux Boolean

    By default, the SELinux boolean <code>unconfined_login</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>u...
    Rule Medium Severity
  • Disable the use_ecryptfs_home_dirs SELinux Boolean

    By default, the SELinux boolean <code>use_ecryptfs_home_dirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Enable the user_exec_content SELinux Boolean

    By default, the SELinux boolean <code>user_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>...
    Rule Medium Severity
  • Disable the xdm_bind_vnc_tcp_port SELinux Boolean

    By default, the SELinux boolean <code>xdm_bind_vnc_tcp_port</code> is disabled. If this setting is enabled, it should be disabled. To disable the ...
    Rule Medium Severity
  • Disable the xdm_exec_bootloader SELinux Boolean

    By default, the SELinux boolean <code>xdm_exec_bootloader</code> is disabled. If this setting is enabled, it should be disabled. To disable the <c...
    Rule Medium Severity
  • Disable the xdm_sysadm_login SELinux Boolean

    By default, the SELinux boolean <code>xdm_sysadm_login</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the xdm_write_home SELinux Boolean

    By default, the SELinux boolean <code>xdm_write_home</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>x...
    Rule Medium Severity
  • Disable the xguest_connect_network SELinux Boolean

    By default, the SELinux boolean <code>xguest_connect_network</code> is enabled. This setting should be disabled as guest users should not be able t...
    Rule Medium Severity
  • Disable the xguest_exec_content SELinux Boolean

    By default, the SELinux boolean <code>xguest_exec_content</code> is enabled. This setting should be disabled as guest users should not be able to r...
    Rule Medium Severity
  • Disable the xguest_mount_media SELinux Boolean

    By default, the SELinux boolean <code>xguest_mount_media</code> is enabled. This setting should be disabled as guest users should not be able to mo...
    Rule Medium Severity
  • Disable the xguest_use_bluetooth SELinux Boolean

    By default, the SELinux boolean <code>xguest_use_bluetooth</code> is enabled. This setting should be disabled as guests users should not be able to...
    Rule Medium Severity
  • Disable the xserver_clients_write_xshm SELinux Boolean

    By default, the SELinux boolean <code>xserver_clients_write_xshm</code> is disabled. If this setting is enabled, it should be disabled. To disable...
    Rule Medium Severity
  • Disable the xserver_execmem SELinux Boolean

    By default, the SELinux boolean <code>xserver_execmem</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>...
    Rule Medium Severity
  • Disable the xserver_object_manager SELinux Boolean

    By default, the SELinux boolean <code>xserver_object_manager</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Services

    The best protection against vulnerable software is running less software. This section describes how to review the software which Oracle Linux 7 in...
    Group
  • Apport Service

    The Apport service provides debugging and crash reporting features on Ubuntu distributions.
    Group
  • APT service configuration

    The apt service manage the package management and update of the whole system. Its configuration need to be properly defined to ensure efficient sec...
    Group
  • Avahi Server

    The Avahi daemon implements the DNS Service Discovery and Multicast DNS protocols, which provide service and host discovery on a network. It allows...
    Group
  • Configure Avahi if Necessary

    If your system requires the Avahi daemon, its configuration can be restricted to improve security. The Avahi daemon configuration file is <code>/et...
    Group
  • Disable Avahi Publishing

    To prevent Avahi from publishing its records, edit <code>/etc/avahi/avahi-daemon.conf</code> and ensure the following line appears in the <code>[pu...
    Rule Low Severity
  • Disable Avahi Server if Possible

    Because the Avahi daemon service keeps an open network port, it is subject to network attacks. Disabling it can reduce the system's vulnerability t...
    Group
  • Disable Avahi Server Software

    The avahi-daemon service can be disabled with the following command:
    $ sudo systemctl mask --now avahi-daemon.service
    Rule Medium Severity
  • Base Services

    This section addresses the base services that are installed on a Oracle Linux 7 default installation which are not covered in other sections. Some ...
    Group
  • Uninstall Automatic Bug Reporting Tool (abrt)

    The Automatic Bug Reporting Tool (<code>abrt</code>) collects and reports crash data when an application crash is detected. Using a variety of plug...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules