Skip to content

Guide to the Secure Configuration of Red Hat Enterprise Linux 8

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Disable the xguest_connect_network SELinux Boolean

    By default, the SELinux boolean <code>xguest_connect_network</code> is enabled. This setting should be disabled as guest users should not be able t...
    Rule Medium Severity
  • Disable the xguest_exec_content SELinux Boolean

    By default, the SELinux boolean <code>xguest_exec_content</code> is enabled. This setting should be disabled as guest users should not be able to r...
    Rule Medium Severity
  • Disable the xguest_mount_media SELinux Boolean

    By default, the SELinux boolean <code>xguest_mount_media</code> is enabled. This setting should be disabled as guest users should not be able to mo...
    Rule Medium Severity
  • Disable the xguest_use_bluetooth SELinux Boolean

    By default, the SELinux boolean <code>xguest_use_bluetooth</code> is enabled. This setting should be disabled as guests users should not be able to...
    Rule Medium Severity
  • Disable the xserver_clients_write_xshm SELinux Boolean

    By default, the SELinux boolean <code>xserver_clients_write_xshm</code> is disabled. If this setting is enabled, it should be disabled. To disable...
    Rule Medium Severity
  • Disable the xserver_execmem SELinux Boolean

    By default, the SELinux boolean <code>xserver_execmem</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>...
    Rule Medium Severity
  • Disable the xserver_object_manager SELinux Boolean

    By default, the SELinux boolean <code>xserver_object_manager</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the zabbix_can_network SELinux Boolean

    By default, the SELinux boolean <code>zabbix_can_network</code> is disabled. If this setting is enabled, it should be disabled. To disable the <co...
    Rule Medium Severity
  • Disable the zarafa_setrlimit SELinux Boolean

    By default, the SELinux boolean <code>zarafa_setrlimit</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the zebra_write_config SELinux Boolean

    By default, the SELinux boolean <code>zebra_write_config</code> is disabled. If this setting is enabled, it should be disabled. To disable the <co...
    Rule Medium Severity
  • Disable the zoneminder_anon_write SELinux Boolean

    By default, the SELinux boolean <code>zoneminder_anon_write</code> is disabled. If this setting is enabled, it should be disabled. To disable the ...
    Rule Medium Severity
  • Disable the zoneminder_run_sudo SELinux Boolean

    By default, the SELinux boolean <code>zoneminder_run_sudo</code> is disabled. If this setting is enabled, it should be disabled. To disable the <c...
    Rule Medium Severity
  • Services

    The best protection against vulnerable software is running less software. This section describes how to review the software which Red Hat Enterpris...
    Group
  • Apport Service

    The Apport service provides debugging and crash reporting features on Ubuntu distributions.
    Group
  • APT service configuration

    The apt service manage the package management and update of the whole system. Its configuration need to be properly defined to ensure efficient sec...
    Group
  • Avahi Server

    The Avahi daemon implements the DNS Service Discovery and Multicast DNS protocols, which provide service and host discovery on a network. It allows...
    Group
  • Configure Avahi if Necessary

    If your system requires the Avahi daemon, its configuration can be restricted to improve security. The Avahi daemon configuration file is <code>/et...
    Group
  • Check Avahi Responses' TTL Field

    To make Avahi ignore packets unless the TTL field is 255, edit <code>/etc/avahi/avahi-daemon.conf</code> and ensure the following line appears in t...
    Rule Low Severity
  • Disable Avahi Publishing

    To prevent Avahi from publishing its records, edit <code>/etc/avahi/avahi-daemon.conf</code> and ensure the following line appears in the <code>[pu...
    Rule Low Severity
  • Serve Avahi Only via Required Protocol

    If you are using only IPv4, edit <code>/etc/avahi/avahi-daemon.conf</code> and ensure the following line exists in the <code>[server]</code> sectio...
    Rule Low Severity
  • Prevent Other Programs from Using Avahi's Port

    To prevent other mDNS stacks from running, edit <code>/etc/avahi/avahi-daemon.conf</code> and ensure the following line appears in the <code>[serve...
    Rule Medium Severity
  • Restrict Information Published by Avahi

    If it is necessary to publish some information to the network, it should not be joined by any extraneous information, or by information supplied by...
    Rule Low Severity
  • Disable Avahi Server if Possible

    Because the Avahi daemon service keeps an open network port, it is subject to network attacks. Disabling it can reduce the system's vulnerability t...
    Group
  • Uninstall avahi-autoipd Server Package

    If the system does not need to have an Avahi server which implements the DNS Service Discovery and Multicast DNS protocols, the avahi-autoipd and ...
    Rule Medium Severity
  • Set Permissions on the /etc/httpd/conf/ Directory

    To properly set the permissions of /etc/http/conf, run the command:
    $ sudo chmod 0750 /etc/http/conf
    Rule Unknown Severity
  • Uninstall avahi Server Package

    If the system does not need to have an Avahi server which implements the DNS Service Discovery and Multicast DNS protocols, the avahi-autoipd and a...
    Rule Medium Severity
  • Disable Avahi Server Software

    The avahi-daemon service can be disabled with the following command:
    $ sudo systemctl mask --now avahi-daemon.service
    Rule Medium Severity
  • Base Services

    This section addresses the base services that are installed on a Red Hat Enterprise Linux 8 default installation which are not covered in other sec...
    Group
  • Install the psacct package

    The process accounting service, <code>psacct</code>, works with programs including <code>acct</code> and <code>ac</code> to allow system administra...
    Rule Low Severity
  • Uninstall Automatic Bug Reporting Tool (abrt)

    The Automatic Bug Reporting Tool (<code>abrt</code>) collects and reports crash data when an application crash is detected. Using a variety of plug...
    Rule Medium Severity
  • Enable Process Accounting (psacct)

    The process accounting service, <code>psacct</code>, works with programs including <code>acct</code> and <code>ac</code> to allow system administra...
    Rule Low Severity
  • Disable Automatic Bug Reporting Tool (abrtd)

    The Automatic Bug Reporting Tool (<code>abrtd</code>) daemon collects and reports crash data when an application crash is detected. Using a variety...
    Rule Medium Severity
  • Disable Advanced Configuration and Power Interface (acpid)

    The Advanced Configuration and Power Interface Daemon (<code>acpid</code>) dispatches ACPI events (such as power/reset button depressed) to userspa...
    Rule Medium Severity
  • Disable Certmonger Service (certmonger)

    Certmonger is a D-Bus based service that attempts to simplify interaction with certifying authorities on networks which use public-key infrastructu...
    Rule Low Severity
  • Disable Cockpit Management Server

    The Cockpit Management Server (<code>cockpit</code>) provides a web based login and management framework. The <code>cockpit</code> service can be ...
    Rule Medium Severity
  • Disable CPU Speed (cpupower)

    The <code>cpupower</code> service can adjust the clock speed of supported CPUs based upon the current processing load thereby conserving power and ...
    Rule Low Severity
  • Disable Dovecot Service

    The dovecot service can be disabled with the following command:
    $ sudo systemctl mask --now dovecot.service
    Rule Unknown Severity
  • Disable KDump Kernel Crash Analyzer (kdump)

    The <code>kdump</code> service provides a kernel crash dump analyzer. It uses the <code>kexec</code> system call to boot a secondary kernel ("captu...
    Rule Medium Severity
  • Disable Software RAID Monitor (mdmonitor)

    The <code>mdmonitor</code> service is used for monitoring a software RAID array; hardware RAID setups do not use this service. The <code>mdmonitor...
    Rule Low Severity
  • Disable Network Console (netconsole)

    The <code>netconsole</code> service is responsible for loading the netconsole kernel module, which logs kernel printk messages over UDP to a syslog...
    Rule Low Severity
  • Disable ntpdate Service (ntpdate)

    The <code>ntpdate</code> service sets the local hardware clock by polling NTP servers when the system boots. It synchronizes to the NTP servers lis...
    Rule Low Severity
  • Disable Odd Job Daemon (oddjobd)

    The <code>oddjobd</code> service exists to provide an interface and access control mechanism through which specified privileged tasks can run tasks...
    Rule Medium Severity
  • Disable Portreserve (portreserve)

    The <code>portreserve</code> service is a TCP port reservation utility that can be used to prevent portmap from binding to well known TCP ports tha...
    Rule Low Severity
  • Disable Apache Qpid (qpidd)

    The <code>qpidd</code> service provides high speed, secure, guaranteed delivery services. It is an implementation of the Advanced Message Queuing ...
    Rule Low Severity
  • Disable Quota Netlink (quota_nld)

    The <code>quota_nld</code> service provides notifications to users of disk space quota violations. It listens to the kernel via a netlink socket fo...
    Rule Low Severity
  • Disable Network Router Discovery Daemon (rdisc)

    The <code>rdisc</code> service implements the client side of the ICMP Internet Router Discovery Protocol (IRDP), which allows discovery of routers ...
    Rule Medium Severity
  • Kerberos

    The Kerberos protocol is used for authentication across non-secure network. Authentication can happen between various types of principals -- users,...
    Group
  • Disable Red Hat Network Service (rhnsd)

    The Red Hat Network service automatically queries Red Hat Network servers to determine whether there are any actions that should be executed, such ...
    Rule Low Severity
  • Disable Red Hat Subscription Manager Daemon (rhsmcertd)

    The Red Hat Subscription Manager (rhsmcertd) periodically checks for changes in the entitlement certificates for a registered system and updates it...
    Rule Low Severity
  • Disable Cyrus SASL Authentication Daemon (saslauthd)

    The <code>saslauthd</code> service handles plaintext authentication requests on behalf of the SASL library. The service isolates all code requiring...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules