Skip to content

Guide to the Secure Configuration of Oracle Linux 7

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Record Events that Modify the System's Discretionary Access Controls - fchownat

    At a minimum, the audit system should collect file permission changes for all users and root. If the <code>auditd</code> daemon is configured to us...
    Rule Medium Severity
  • Record Events that Modify the System's Discretionary Access Controls - fremovexattr

    At a minimum, the audit system should collect file permission changes for all users and root. <br><br> If the <code>auditd</code> daemon is configu...
    Rule Medium Severity
  • Record Events that Modify the System's Discretionary Access Controls - fsetxattr

    At a minimum, the audit system should collect file permission changes for all users and root. If the <code>auditd</code> daemon is configured to us...
    Rule Medium Severity
  • Record Events that Modify the System's Discretionary Access Controls - lchown

    At a minimum, the audit system should collect file permission changes for all users and root. If the <code>auditd</code> daemon is configured to us...
    Rule Medium Severity
  • Record Events that Modify the System's Discretionary Access Controls - lremovexattr

    At a minimum, the audit system should collect file permission changes for all users and root. <br><br> If the <code>auditd</code> daemon is configu...
    Rule Medium Severity
  • Record Events that Modify the System's Discretionary Access Controls - lsetxattr

    At a minimum, the audit system should collect file permission changes for all users and root. If the <code>auditd</code> daemon is configured to us...
    Rule Medium Severity
  • Record Events that Modify the System's Discretionary Access Controls - removexattr

    At a minimum, the audit system should collect file permission changes for all users and root. <br><br> If the <code>auditd</code> daemon is configu...
    Rule Medium Severity
  • Record Events that Modify the System's Discretionary Access Controls - setxattr

    At a minimum, the audit system should collect file permission changes for all users and root. If the <code>auditd</code> daemon is configured to us...
    Rule Medium Severity
  • Record Events that Modify the System's Discretionary Access Controls - umount

    At a minimum, the audit system should collect file system umount changes. If the <code>auditd</code> daemon is configured to use the <code>augenrul...
    Rule Medium Severity
  • Record Events that Modify the System's Discretionary Access Controls - umount2

    At a minimum, the audit system should collect file system umount2 changes. If the <code>auditd</code> daemon is configured to use the <code>augenru...
    Rule Medium Severity
  • Record Execution Attempts to Run ACL Privileged Commands

    At a minimum, the audit system should collect the execution of ACL privileged commands for all users and root.
    Group
  • Record Execution Attempts to Run SELinux Privileged Commands

    At a minimum, the audit system should collect the execution of SELinux privileged commands for all users and root.
    Group
  • Record Any Attempts to Run chcon

    At a minimum, the audit system should collect any execution attempt of the <code>chcon</code> command for all users and root. If the <code>auditd</...
    Rule Medium Severity
  • Record Any Attempts to Run restorecon

    At a minimum, the audit system should collect any execution attempt of the <code>restorecon</code> command for all users and root. If the <code>aud...
    Rule Medium Severity
  • Record Any Attempts to Run semanage

    At a minimum, the audit system should collect any execution attempt of the <code>semanage</code> command for all users and root. If the <code>audit...
    Rule Medium Severity
  • Record Any Attempts to Run setfiles

    At a minimum, the audit system should collect any execution attempt of the <code>setfiles</code> command for all users and root. If the <code>audit...
    Rule Medium Severity
  • Record Any Attempts to Run setsebool

    At a minimum, the audit system should collect any execution attempt of the <code>setsebool</code> command for all users and root. If the <code>audi...
    Rule Medium Severity
  • Record Any Attempts to Run seunshare

    At a minimum, the audit system should collect any execution attempt of the <code>seunshare</code> command for all users and root. If the <code>audi...
    Rule Medium Severity
  • Record File Deletion Events by User

    At a minimum, the audit system should collect file deletion events for all users and root. If the <code>auditd</code> daemon is configured to use t...
    Group
  • Ensure auditd Collects File Deletion Events by User

    At a minimum the audit system should collect file deletion events for all users and root. If the <code>auditd</code> daemon is configured to use th...
    Rule Medium Severity
  • Ensure auditd Collects File Deletion Events by User - rename

    At a minimum, the audit system should collect file deletion events for all users and root. If the <code>auditd</code> daemon is configured to use t...
    Rule Medium Severity
  • Ensure auditd Collects File Deletion Events by User - renameat

    At a minimum, the audit system should collect file deletion events for all users and root. If the <code>auditd</code> daemon is configured to use t...
    Rule Medium Severity
  • Ensure auditd Collects File Deletion Events by User - rmdir

    At a minimum, the audit system should collect file deletion events for all users and root. If the <code>auditd</code> daemon is configured to use t...
    Rule Medium Severity
  • Ensure auditd Collects File Deletion Events by User - unlink

    At a minimum, the audit system should collect file deletion events for all users and root. If the <code>auditd</code> daemon is configured to use t...
    Rule Medium Severity
  • Ensure auditd Collects File Deletion Events by User - unlinkat

    At a minimum, the audit system should collect file deletion events for all users and root. If the <code>auditd</code> daemon is configured to use t...
    Rule Medium Severity
  • Record Unauthorized Access Attempts Events to Files (unsuccessful)

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. Note that the "-F arch=b32" lines should be presen...
    Group
  • Record Successful Permission Changes to Files - chmod

    At a minimum, the audit system should collect file permission changes for all users and root. If the <code>auditd</code> daemon is configured to us...
    Rule Medium Severity
  • Record Successful Ownership Changes to Files - chown

    At a minimum, the audit system should collect file ownership changes for all users and root. If the <code>auditd</code> daemon is configured to use...
    Rule Medium Severity
  • Record Successful Access Attempts to Files - creat

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Successful Permission Changes to Files - fchmod

    At a minimum, the audit system should collect file permission changes for all users and root. If the <code>auditd</code> daemon is configured to us...
    Rule Medium Severity
  • Record Successful Permission Changes to Files - fchmodat

    At a minimum, the audit system should collect file permission changes for all users and root. If the <code>auditd</code> daemon is configured to us...
    Rule Medium Severity
  • Record Successful Ownership Changes to Files - fchown

    At a minimum, the audit system should collect file ownership changes for all users and root. If the <code>auditd</code> daemon is configured to use...
    Rule Medium Severity
  • Record Successful Ownership Changes to Files - fchownat

    At a minimum, the audit system should collect file ownership changes for all users and root. If the <code>auditd</code> daemon is configured to use...
    Rule Medium Severity
  • Record Successful Permission Changes to Files - fremovexattr

    At a minimum, the audit system should collect file permission changes for all users and root. If the <code>auditd</code> daemon is configured to us...
    Rule Medium Severity
  • Record Successful Permission Changes to Files - fsetxattr

    At a minimum, the audit system should collect file permission changes for all users and root. If the <code>auditd</code> daemon is configured to us...
    Rule Medium Severity
  • Record Successful Access Attempts to Files - ftruncate

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Successful Ownership Changes to Files - lchown

    At a minimum, the audit system should collect file ownership changes for all users and root. If the <code>auditd</code> daemon is configured to use...
    Rule Medium Severity
  • Record Successful Permission Changes to Files - lremovexattr

    At a minimum, the audit system should collect file permission changes for all users and root. If the <code>auditd</code> daemon is configured to us...
    Rule Medium Severity
  • Record Successful Permission Changes to Files - lsetxattr

    At a minimum, the audit system should collect file permission changes for all users and root. If the <code>auditd</code> daemon is configured to us...
    Rule Medium Severity
  • Record Successful Access Attempts to Files - open

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Successful Access Attempts to Files - open_by_handle_at

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Successful Creation Attempts to Files - open_by_handle_at O_CREAT

    The <code>open_by_handle_at</code> syscall can be used to create new files when O_CREAT flag is specified. The following audit rules will assure t...
    Rule Medium Severity
  • Record Successful Creation Attempts to Files - open_by_handle_at O_TRUNC_WRITE

    The audit system should collect detailed file access records for all users and root. The <code>open_by_handle_at</code> syscall can be used to modi...
    Rule Medium Severity
  • Record Successful Creation Attempts to Files - open O_CREAT

    The <code>open</code> syscall can be used to create new files when O_CREAT flag is specified. The following audit rules will assure that successfu...
    Rule Medium Severity
  • Record Successful Creation Attempts to Files - open O_TRUNC_WRITE

    The audit system should collect detailed file access records for all users and root. The <code>open</code> syscall can be used to modify files if c...
    Rule Medium Severity
  • Record Successful Access Attempts to Files - openat

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Successful Creation Attempts to Files - openat O_CREAT

    The <code>openat</code> syscall can be used to create new files when O_CREAT flag is specified. The following audit rules will assure that success...
    Rule Medium Severity
  • Record Successful Creation Attempts to Files - openat O_TRUNC_WRITE

    The audit system should collect detailed file access records for all users and root. The <code>openat</code> syscall can be used to modify files if...
    Rule Medium Severity
  • Record Successful Permission Changes to Files - removexattr

    At a minimum, the audit system should collect file permission changes for all users and root. If the <code>auditd</code> daemon is configured to us...
    Rule Medium Severity
  • Record Successful Delete Attempts to Files - rename

    At a minimum, the audit system should collect file deletion for all users and root. If the <code>auditd</code> daemon is configured to use the <cod...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules