Skip to content

Guide to the Secure Configuration of Red Hat Enterprise Linux 8

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Disable Mounting of squashfs

    To configure the system to prevent the <code>squashfs</code> kernel module from being loaded, add the following line to the file <code>/etc/modprobe.d/squashfs.conf</code>: <pre>install squashfs /...
    Rule Low Severity
  • Add noexec Option to /boot

    The <code>noexec</code> mount option can be used to prevent binaries from being executed out of <code>/boot</code>. Add the <code>noexec</code> option to the fourth column of <code>/etc/fstab</code...
    Rule Medium Severity
  • Disable storing core dumps

    To set the runtime status of the <code>kernel.core_pattern</code> kernel parameter, run the following command: <pre>$ sudo sysctl -w kernel.core_pattern=|/bin/false</pre> To make sure that the sett...
    Rule Medium Severity
  • Configure file name of core dumps

    To set the runtime status of the <code>kernel.core_uses_pid</code> kernel parameter, run the following command: <pre>$ sudo sysctl -w kernel.core_uses_pid=0</pre> To make sure that the setting is p...
    Rule Medium Severity
  • Limit CPU consumption of the Perf system

    To set the runtime status of the <code>kernel.perf_cpu_time_max_percent</code> kernel parameter, run the following command: <pre>$ sudo sysctl -w kernel.perf_cpu_time_max_percent=1</pre> To make su...
    Rule Medium Severity
  • Disable the gluster_anon_write SELinux Boolean

    By default, the SELinux boolean <code>gluster_anon_write</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>gluster_anon_write</code> SELinux boolean, run ...
    Rule Medium Severity
  • Limit sampling frequency of the Perf system

    To set the runtime status of the <code>kernel.perf_event_max_sample_rate</code> kernel parameter, run the following command: <pre>$ sudo sysctl -w kernel.perf_event_max_sample_rate=1</pre> To make ...
    Rule Medium Severity
  • Prevent applications from mapping low portion of virtual memory

    To set the runtime status of the <code>vm.mmap_min_addr</code> kernel parameter, run the following command: <pre>$ sudo sysctl -w vm.mmap_min_addr=65536</pre> To make sure that the setting is persi...
    Rule Medium Severity
  • Restrict Exposed Kernel Pointer Addresses Access

    To set the runtime status of the <code>kernel.kptr_restrict</code> kernel parameter, run the following command: <pre>$ sudo sysctl -w kernel.kptr_restrict=<xccdf-1.2:sub idref="xccdf_org.ssgproject...
    Rule Medium Severity
  • Enable page allocator poisoning

    To enable poisoning of free pages, add the argument <code>page_poison=1</code> to the default GRUB 2 command line for the Linux operating system. To ensure that <code>page_poison=1</code> is added ...
    Rule Medium Severity
  • Enable SLUB/SLAB allocator poisoning

    To enable poisoning of SLUB/SLAB objects, add the argument <code>slub_debug=<xccdf-1.2:sub idref="xccdf_org.ssgproject.content_value_var_slub_debug_options" use="legacy"></xccdf-1.2:sub> <...
    Rule Medium Severity
  • Uninstall setroubleshoot-plugins Package

    The SETroubleshoot plugins are used to analyze SELinux AVC data. The service provides information around configuration errors, unauthorized intrusions, and other potential errors. The <code>setroub...
    Rule Low Severity
  • Verify Group Who Owns /etc/selinux Directory

    To properly set the group owner of /etc/selinux, run the command:
    $ sudo chgrp root /etc/selinux
    Rule Medium Severity
  • Verify User Who Owns /etc/selinux Directory

    To properly set the owner of /etc/selinux, run the command:
    $ sudo chown root /etc/selinux 
    Rule Medium Severity
  • Configure the httpd_builtin_scripting SELinux Boolean

    By default, the SELinux boolean <code>httpd_builtin_scripting</code> is enabled. This setting should be disabled if <code>httpd</code> is not running <code>php</code> or some similary scripting lan...
    Rule Medium Severity
  • Ensure No Device Files are Unlabeled by SELinux

    Device files, which are used for communication with important system resources, should be labeled with proper SELinux types. If any device files carry the SELinux type <code>device_t</code> or <cod...
    Rule Medium Severity
  • Map System Users To The Appropriate SELinux Role

    Configure the operating system to prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. ...
    Rule Medium Severity
  • Disable the abrt_anon_write SELinux Boolean

    By default, the SELinux boolean <code>abrt_anon_write</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>abrt_anon_write</code> SELinux boolean, run the fo...
    Rule Medium Severity
  • Disable the abrt_upload_watch_anon_write SELinux Boolean

    By default, the SELinux boolean <code>abrt_upload_watch_anon_write</code> is enabled. This setting should be disabled as it allows the Automatic Bug Report Tool (ABRT) to modify public files used f...
    Rule Medium Severity
  • Disable the awstats_purge_apache_log_files SELinux Boolean

    By default, the SELinux boolean <code>awstats_purge_apache_log_files</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>awstats_purge_apache_log_files</cod...
    Rule Medium Severity
  • Disable the cron_system_cronjob_use_shares SELinux Boolean

    By default, the SELinux boolean <code>cron_system_cronjob_use_shares</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>cron_system_cronjob_use_shares</cod...
    Rule Medium Severity
  • Configure the deny_execmem SELinux Boolean

    By default, the SELinux boolean <code>deny_execmem</code> is disabled. This setting should be configured to <xccdf-1.2:sub idref="xccdf_org.ssgproject.content_value_var_deny_execmem" use="legacy"><...
    Rule Medium Severity
  • Enable the domain_fd_use SELinux Boolean

    By default, the SELinux boolean <code>domain_fd_use</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>domain_fd_use</code> SELinux boolean, run the followin...
    Rule Medium Severity
  • Disable the domain_kernel_load_modules SELinux Boolean

    By default, the SELinux boolean <code>domain_kernel_load_modules</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>domain_kernel_load_modules</code> SELin...
    Rule Medium Severity
  • Disable the ftpd_use_nfs SELinux Boolean

    By default, the SELinux boolean <code>ftpd_use_nfs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>ftpd_use_nfs</code> SELinux boolean, run the followin...
    Rule Medium Severity
  • Disable the ftpd_use_passive_mode SELinux Boolean

    By default, the SELinux boolean <code>ftpd_use_passive_mode</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>ftpd_use_passive_mode</code> SELinux boolean...
    Rule Medium Severity
  • Disable the httpd_can_network_connect_cobbler SELinux Boolean

    By default, the SELinux boolean <code>httpd_can_network_connect_cobbler</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>httpd_can_network_connect_cobble...
    Rule Medium Severity
  • Disable the httpd_mod_auth_pam SELinux Boolean

    By default, the SELinux boolean <code>httpd_mod_auth_pam</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>httpd_mod_auth_pam</code> SELinux boolean, run ...
    Rule Medium Severity
  • Disable the httpd_use_nfs SELinux Boolean

    By default, the SELinux boolean <code>httpd_use_nfs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>httpd_use_nfs</code> SELinux boolean, run the follow...
    Rule Medium Severity
  • Disable the httpd_use_openstack SELinux Boolean

    By default, the SELinux boolean <code>httpd_use_openstack</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>httpd_use_openstack</code> SELinux boolean, ru...
    Rule Medium Severity
  • Disable the logging_syslogd_run_nagios_plugins SELinux Boolean

    By default, the SELinux boolean <code>logging_syslogd_run_nagios_plugins</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>logging_syslogd_run_nagios_plug...
    Rule Medium Severity
  • Disable the logrotate_use_nfs SELinux Boolean

    By default, the SELinux boolean <code>logrotate_use_nfs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>logrotate_use_nfs</code> SELinux boolean, run th...
    Rule Medium Severity
  • Disable the mozilla_plugin_bind_unreserved_ports SELinux Boolean

    By default, the SELinux boolean <code>mozilla_plugin_bind_unreserved_ports</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>mozilla_plugin_bind_unreserve...
    Rule Medium Severity
  • Disable the mozilla_plugin_use_gps SELinux Boolean

    By default, the SELinux boolean <code>mozilla_plugin_use_gps</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>mozilla_plugin_use_gps</code> SELinux boole...
    Rule Medium Severity
  • Disable KDump Kernel Crash Analyzer (kdump)

    The <code>kdump</code> service provides a kernel crash dump analyzer. It uses the <code>kexec</code> system call to boot a secondary kernel ("capture" kernel) following a system crash, which can lo...
    Rule Medium Severity
  • Disable Red Hat Network Service (rhnsd)

    The Red Hat Network service automatically queries Red Hat Network servers to determine whether there are any actions that should be executed, such as package updates. This only occurs if the system...
    Rule Low Severity
  • Disable the ssh_sysadm_login SELinux Boolean

    By default, the SELinux boolean <code>ssh_sysadm_login</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>ssh_sysadm_login</code> SELinux boolean, run the ...
    Rule Medium Severity
  • Enable the staff_exec_content SELinux Boolean

    By default, the SELinux boolean <code>staff_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>staff_exec_content</code> SELinux boolean, run th...
    Rule Medium Severity
  • Disable the telepathy_tcp_connect_generic_network_ports SELinux Boolean

    By default, the SELinux boolean <code>telepathy_tcp_connect_generic_network_ports</code> is enabled. This setting should be disabled as <code>telepathy</code> should not connect to any generic netw...
    Rule Medium Severity
  • Disable the unprivuser_use_svirt SELinux Boolean

    By default, the SELinux boolean <code>unprivuser_use_svirt</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>unprivuser_use_svirt</code> SELinux boolean, ...
    Rule Medium Severity
  • Disable the virt_transition_userdomain SELinux Boolean

    By default, the SELinux boolean <code>virt_transition_userdomain</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>virt_transition_userdomain</code> SELin...
    Rule Medium Severity
  • Disable the xdm_write_home SELinux Boolean

    By default, the SELinux boolean <code>xdm_write_home</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>xdm_write_home</code> SELinux boolean, run the foll...
    Rule Medium Severity
  • Disable the xguest_connect_network SELinux Boolean

    By default, the SELinux boolean <code>xguest_connect_network</code> is enabled. This setting should be disabled as guest users should not be able to configure <code>NetworkManager</code>. To disab...
    Rule Medium Severity
  • Disable the zoneminder_run_sudo SELinux Boolean

    By default, the SELinux boolean <code>zoneminder_run_sudo</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>zoneminder_run_sudo</code> SELinux boolean, ru...
    Rule Medium Severity
  • Services

    The best protection against vulnerable software is running less software. This section describes how to review the software which Red Hat Enterprise Linux 8 installs on a system and disable softwar...
    Group
  • Disable Avahi Server Software

    The avahi-daemon service can be disabled with the following command:
    $ sudo systemctl mask --now avahi-daemon.service
    Rule Medium Severity
  • Disable Automatic Bug Reporting Tool (abrtd)

    The Automatic Bug Reporting Tool (<code>abrtd</code>) daemon collects and reports crash data when an application crash is detected. Using a variety of plugins, abrtd can email crash reports to syst...
    Rule Medium Severity
  • Verify Group Who Owns cron.daily

    To properly set the group owner of /etc/cron.daily, run the command:
    $ sudo chgrp root /etc/cron.daily
    Rule Medium Severity
  • Disable Cyrus SASL Authentication Daemon (saslauthd)

    The <code>saslauthd</code> service handles plaintext authentication requests on behalf of the SASL library. The service isolates all code requiring superuser privileges for SASL authentication into...
    Rule Low Severity
  • Name Service Switch does not use NIS

    Each call to a function which retrieves data from a system database like the password or group database is handled by the Name Service Switch implementation in the GNU C library. The various servi...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules