Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Ensure all zIPL boot entries are BLS compliant
Ensure that zIPL boot entries fully adheres to Boot Loader Specification (BLS) by checking that/etc/zipl.conf
doesn't containimage =
.Rule Medium Severity -
Ensure zIPL bootmap is up to date
Make sure that <code>/boot/bootmap</code> is up to date.<br> Every time a boot entry or zIPL configuration is changed <code>/boot/bootmap</code> needs to be updated to reflect the changes.<br> Run ...Rule Medium Severity -
Ensure SELinux Not Disabled in zIPL
To ensure SELinux is not disabled at boot time, check that no boot entry in/boot/loader/entries/*.conf
hasselinux=0
included in its options.
Rule Medium Severity -
Enable page allocator poisoning in zIPL
To enable poisoning of free pages, check that all boot entries in <code>/boot/loader/entries/*.conf</code> have <code>page_poison=1</code> included in its options.<br> To ensure that new kernels an...Rule Medium Severity -
Enable SLUB/SLAB allocator poisoning in zIPL
To enable poisoning of SLUB/SLAB objects, check that all boot entries in <code>/boot/loader/entries/*.conf</code> have <code>slub_debug=P</code> included in its options.<br> To ensure that new kern...Rule Medium Severity -
Disable vsyscalls in zIPL
To disable use of virtual syscalls, check that all boot entries in <code>/boot/loader/entries/*.conf</code> have <code>vsyscall=none</code> included in its options.<br> To ensure that new kernels a...Rule Medium Severity -
Protect Random-Number Entropy Pool
The I/O operations of the Linux kernel block layer due to their inherently unpredictable execution times have been traditionally considered as a reliable source to contribute to random-number entro...Group -
Kernel Configuration
Contains rules that check the kernel configuration that was used to build it.Group -
Hash function for kernel module signing
The hash function to use when signing modules during kernel build process.Value -
Key and certificate for kernel module signing
The private key and certificate to use when signing modules during kernel build process. On systems where the OpenSSL ENGINE_pkcs11 is functional — a PKCS#11 URI as defined by RFC7512 In the latter...Value
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules