Skip to content

Guide to the Secure Configuration of Red Hat Enterprise Linux 7

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Install the psacct package

    The process accounting service, <code>psacct</code>, works with programs including <code>acct</code> and <code>ac</code> to allow system administra...
    Rule Low Severity
  • Uninstall Automatic Bug Reporting Tool (abrt)

    The Automatic Bug Reporting Tool (<code>abrt</code>) collects and reports crash data when an application crash is detected. Using a variety of plug...
    Rule Medium Severity
  • Enable IRQ Balance (irqbalance)

    The <code>irqbalance</code> service optimizes the balance between power savings and performance through distribution of hardware interrupts across ...
    Rule Low Severity
  • Enable Process Accounting (psacct)

    The process accounting service, <code>psacct</code>, works with programs including <code>acct</code> and <code>ac</code> to allow system administra...
    Rule Low Severity
  • Disable Automatic Bug Reporting Tool (abrtd)

    The Automatic Bug Reporting Tool (<code>abrtd</code>) daemon collects and reports crash data when an application crash is detected. Using a variety...
    Rule Medium Severity
  • Disable Advanced Configuration and Power Interface (acpid)

    The Advanced Configuration and Power Interface Daemon (<code>acpid</code>) dispatches ACPI events (such as power/reset button depressed) to userspa...
    Rule Medium Severity
  • Disable Certmonger Service (certmonger)

    Certmonger is a D-Bus based service that attempts to simplify interaction with certifying authorities on networks which use public-key infrastructu...
    Rule Low Severity
  • Disable Control Group Config (cgconfig)

    Control groups allow an administrator to allocate system resources (such as CPU, memory, network bandwidth, etc) among a defined group (or groups) ...
    Rule Low Severity
  • Disable Control Group Rules Engine (cgred)

    The <code>cgred</code> service moves tasks into control groups according to parameters set in the <code>/etc/cgrules.conf</code> configuration file...
    Rule Low Severity
  • Disable Cockpit Management Server

    The Cockpit Management Server (<code>cockpit</code>) provides a web based login and management framework. The <code>cockpit</code> service can be ...
    Rule Medium Severity
  • Disable CPU Speed (cpupower)

    The <code>cpupower</code> service can adjust the clock speed of supported CPUs based upon the current processing load thereby conserving power and ...
    Rule Low Severity
  • Disable KDump Kernel Crash Analyzer (kdump)

    The <code>kdump</code> service provides a kernel crash dump analyzer. It uses the <code>kexec</code> system call to boot a secondary kernel ("captu...
    Rule Medium Severity
  • Disable Software RAID Monitor (mdmonitor)

    The <code>mdmonitor</code> service is used for monitoring a software RAID array; hardware RAID setups do not use this service. The <code>mdmonitor...
    Rule Low Severity
  • Disable D-Bus IPC Service (messagebus)

    D-Bus provides an IPC mechanism used by a growing list of programs, such as those used for Gnome, Bluetooth, and Avahi. Due to these dependencies, ...
    Rule Low Severity
  • Disable Network Console (netconsole)

    The <code>netconsole</code> service is responsible for loading the netconsole kernel module, which logs kernel printk messages over UDP to a syslog...
    Rule Low Severity
  • Disable ntpdate Service (ntpdate)

    The <code>ntpdate</code> service sets the local hardware clock by polling NTP servers when the system boots. It synchronizes to the NTP servers lis...
    Rule Low Severity
  • Disable Odd Job Daemon (oddjobd)

    The <code>oddjobd</code> service exists to provide an interface and access control mechanism through which specified privileged tasks can run tasks...
    Rule Medium Severity
  • Disable Portreserve (portreserve)

    The <code>portreserve</code> service is a TCP port reservation utility that can be used to prevent portmap from binding to well known TCP ports tha...
    Rule Low Severity
  • Disable Apache Qpid (qpidd)

    The <code>qpidd</code> service provides high speed, secure, guaranteed delivery services. It is an implementation of the Advanced Message Queuing ...
    Rule Low Severity
  • Disable named Service

    The named service can be disabled with the following command:
    $ sudo systemctl mask --now named.service
    Rule Medium Severity
  • Disable Quota Netlink (quota_nld)

    The <code>quota_nld</code> service provides notifications to users of disk space quota violations. It listens to the kernel via a netlink socket fo...
    Rule Low Severity
  • Disable Network Router Discovery Daemon (rdisc)

    The <code>rdisc</code> service implements the client side of the ICMP Internet Router Discovery Protocol (IRDP), which allows discovery of routers ...
    Rule Medium Severity
  • Disable Red Hat Network Service (rhnsd)

    The Red Hat Network service automatically queries Red Hat Network servers to determine whether there are any actions that should be executed, such ...
    Rule Low Severity
  • Disable Red Hat Subscription Manager Daemon (rhsmcertd)

    The Red Hat Subscription Manager (rhsmcertd) periodically checks for changes in the entitlement certificates for a registered system and updates it...
    Rule Low Severity
  • Disable Cyrus SASL Authentication Daemon (saslauthd)

    The <code>saslauthd</code> service handles plaintext authentication requests on behalf of the SASL library. The service isolates all code requiring...
    Rule Low Severity
  • Disable SMART Disk Monitoring Service (smartd)

    SMART (Self-Monitoring, Analysis, and Reporting Technology) is a feature of hard drives that allows them to detect symptoms of disk failure and rel...
    Rule Low Severity
  • Disable System Statistics Reset Service (sysstat)

    The <code>sysstat</code> service resets various I/O and CPU performance statistics to zero in order to begin counting from a fresh state at boot ti...
    Rule Low Severity
  • Cron and At Daemons

    The cron and at services are used to allow commands to be executed at a later time. The cron service is required by almost all systems to perform n...
    Group
  • Install the cron service

    The Cron service should be installed.
    Rule Medium Severity
  • Enable cron Service

    The <code>crond</code> service is used to execute commands at preconfigured times. It is required by almost all systems to perform necessary mainte...
    Rule Medium Severity
  • Enable cron Service

    The <code>crond</code> service is used to execute commands at preconfigured times. It is required by almost all systems to perform necessary mainte...
    Rule Medium Severity
  • Disable At Service (atd)

    The <code>at</code> and <code>batch</code> commands can be used to schedule tasks that are meant to be executed only once. This allows delayed exec...
    Rule Medium Severity
  • Disable anacron Service

    The <code>cronie-anacron</code> package, which provides <code>anacron</code> functionality, is installed by default. The <code>cronie-anacron</cod...
    Rule Unknown Severity
  • Verify Group Who Owns cron.d

    To properly set the group owner of /etc/cron.d, run the command:
    $ sudo chgrp root /etc/cron.d
    Rule Medium Severity
  • Verify Group Who Owns cron.daily

    To properly set the group owner of /etc/cron.daily, run the command:
    $ sudo chgrp root /etc/cron.daily
    Rule Medium Severity
  • Verify Group Who Owns cron.hourly

    To properly set the group owner of /etc/cron.hourly, run the command:
    $ sudo chgrp root /etc/cron.hourly
    Rule Medium Severity
  • Verify Group Who Owns cron.monthly

    To properly set the group owner of /etc/cron.monthly, run the command:
    $ sudo chgrp root /etc/cron.monthly
    Rule Medium Severity
  • Verify Group Who Owns cron.weekly

    To properly set the group owner of /etc/cron.weekly, run the command:
    $ sudo chgrp root /etc/cron.weekly
    Rule Medium Severity
  • Verify Group Who Owns Crontab

    To properly set the group owner of /etc/crontab, run the command:
    $ sudo chgrp root /etc/crontab
    Rule Medium Severity
  • Verify Owner on cron.d

    To properly set the owner of /etc/cron.d, run the command:
    $ sudo chown root /etc/cron.d 
    Rule Medium Severity
  • Verify Owner on cron.daily

    To properly set the owner of /etc/cron.daily, run the command:
    $ sudo chown root /etc/cron.daily 
    Rule Medium Severity
  • Verify Owner on cron.hourly

    To properly set the owner of /etc/cron.hourly, run the command:
    $ sudo chown root /etc/cron.hourly 
    Rule Medium Severity
  • Verify Owner on cron.monthly

    To properly set the owner of /etc/cron.monthly, run the command:
    $ sudo chown root /etc/cron.monthly 
    Rule Medium Severity
  • Verify Owner on cron.weekly

    To properly set the owner of /etc/cron.weekly, run the command:
    $ sudo chown root /etc/cron.weekly 
    Rule Medium Severity
  • Verify Owner on crontab

    To properly set the owner of /etc/crontab, run the command:
    $ sudo chown root /etc/crontab 
    Rule Medium Severity
  • Verify Permissions on cron.d

    To properly set the permissions of /etc/cron.d, run the command:
    $ sudo chmod 0700 /etc/cron.d
    Rule Medium Severity
  • Verify Permissions on cron.daily

    To properly set the permissions of /etc/cron.daily, run the command:
    $ sudo chmod 0700 /etc/cron.daily
    Rule Medium Severity
  • Verify Permissions on cron.hourly

    To properly set the permissions of /etc/cron.hourly, run the command:
    $ sudo chmod 0700 /etc/cron.hourly
    Rule Medium Severity
  • Verify Permissions on cron.monthly

    To properly set the permissions of /etc/cron.monthly, run the command:
    $ sudo chmod 0700 /etc/cron.monthly
    Rule Medium Severity
  • Verify Permissions on cron.weekly

    To properly set the permissions of /etc/cron.weekly, run the command:
    $ sudo chmod 0700 /etc/cron.weekly
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules