Skip to content

Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Record Unsuccessful Permission Changes to Files - fsetxattr

    The audit system should collect unsuccessful file permission change attempts for all users and root. If the <code>auditd</code> daemon is configured to use the <code>augenrules</code> program to re...
    Rule Medium Severity
  • Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module

    If the <code>auditd</code> daemon is configured to use the <code>augenrules</code> program to read audit rules during daemon startup (the default), add the following lines to a file with suffix <co...
    Rule Medium Severity
  • Record Unsuccessful Permission Changes to Files - lremovexattr

    The audit system should collect unsuccessful file permission change attempts for all users and root. If the <code>auditd</code> daemon is configured to use the <code>augenrules</code> program to re...
    Rule Medium Severity
  • Record Unsuccessful Permission Changes to Files - lsetxattr

    The audit system should collect unsuccessful file permission change attempts for all users and root. If the <code>auditd</code> daemon is configured to use the <code>augenrules</code> program to re...
    Rule Medium Severity
  • Record Unsuccessful Access Attempts to Files - open

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to use the <code>augenrules</code> program to read a...
    Rule Medium Severity
  • Record Unsuccessful Access Attempts to Files - open_by_handle_at

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to use the <code>augenrules</code> program to read a...
    Rule Medium Severity
  • Record Unsuccessful Modification Attempts to Files - open_by_handle_at O_TRUNC_WRITE

    The audit system should collect detailed unauthorized file accesses for all users and root. The <code>open_by_handle_at</code> syscall can be used to modify files if called for write operation of w...
    Rule Medium Severity
  • Ensure auditd Unauthorized Access Attempts To open_by_handle_at Are Ordered Correctly

    The audit system should collect detailed unauthorized file accesses for all users and root. To correctly identify unsuccessful creation, unsuccessful modification and unsuccessful access of files v...
    Rule Medium Severity
  • Record Unsuccessful Creation Attempts to Files - open O_CREAT

    The audit system should collect unauthorized file accesses for all users and root. The <code>open</code> syscall can be used to create new files when O_CREAT flag is specified. The following auidt...
    Rule Medium Severity
  • Configure audispd Plugin To Send Logs To Remote Server

    Configure the audispd plugin to off-load audit records onto a different system or media from the system being audited. Set the <code>remote_server</code> option in <pre>/etc/audit/audisp-remote.co...
    Rule Medium Severity
  • Ensure auditd Rules For Unauthorized Attempts To open Are Ordered Correctly

    The audit system should collect detailed unauthorized file accesses for all users and root. To correctly identify unsuccessful creation, unsuccessful modification and unsuccessful access of files v...
    Rule Medium Severity
  • Record Unsuccessful Creation Attempts to Files - openat O_CREAT

    The audit system should collect unauthorized file accesses for all users and root. The <code>openat</code> syscall can be used to create new files when O_CREAT flag is specified. The following aui...
    Rule Medium Severity
  • Configure audispd's Plugin disk_full_action When Disk Is Full

    Configure the action the operating system takes if the disk the audit records are written to becomes full. Edit the file <code>/etc/audit/audisp-remote.conf</code>. Add or modify the following line...
    Rule Medium Severity
  • Ensure auditd Rules For Unauthorized Attempts To openat Are Ordered Correctly

    The audit system should collect detailed unauthorized file accesses for all users and root. To correctly identify unsuccessful creation, unsuccessful modification and unsuccessful access of files v...
    Rule Medium Severity
  • Record Unsuccessful Permission Changes to Files - removexattr

    The audit system should collect unsuccessful file permission change attempts for all users and root. If the <code>auditd</code> daemon is configured to use the <code>augenrules</code> program to re...
    Rule Medium Severity
  • Record Unsuccessful Delete Attempts to Files - rename

    The audit system should collect unsuccessful file deletion attempts for all users and root. If the <code>auditd</code> daemon is configured to use the <code>augenrules</code> program to read audit ...
    Rule Medium Severity
  • Record Unsuccessful Delete Attempts to Files - renameat

    The audit system should collect unsuccessful file deletion attempts for all users and root. If the <code>auditd</code> daemon is configured to use the <code>augenrules</code> program to read audit...
    Rule Medium Severity
  • Record Unsuccessful Delete Attempts to Files - unlink

    The audit system should collect unsuccessful file deletion attempts for all users and root. If the <code>auditd</code> daemon is configured to use the <code>augenrules</code> program to read audit...
    Rule Medium Severity
  • Record Unsuccessful Delete Attempts to Files - unlinkat

    The audit system should collect unsuccessful file deletion attempts for all users and root. If the <code>auditd</code> daemon is configured to use the <code>augenrules</code> program to read audit...
    Rule Medium Severity
  • Ensure auditd Collects Information on Kernel Module Loading and Unloading

    To capture kernel module loading and unloading events, use following lines, setting ARCH to either b32 for 32-bit system, or having two lines for both b32 and b64 in case your system is 64-bit: <pr...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules