Guide to the Secure Configuration of Red Hat Enterprise Linux 7
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Verify Group Ownership of /etc/hosts.allow
To properly set the group owner of/etc/hosts.allow
, run the command:$ sudo chgrp root /etc/hosts.allow
Rule Medium Severity -
Verify Group Ownership of /etc/hosts.deny
To properly set the group owner of/etc/hosts.deny
, run the command:$ sudo chgrp root /etc/hosts.deny
Rule Medium Severity -
Verify Ownership of /etc/hosts.allow
To properly set the owner of/etc/hosts.allow
, run the command:$ sudo chown root /etc/hosts.allow
Rule Medium Severity -
Verify Ownership of /etc/hosts.deny
To properly set the owner of/etc/hosts.deny
, run the command:$ sudo chown root /etc/hosts.deny
Rule Medium Severity -
Verify Permissions on /etc/hosts.allow
To properly set the permissions of/etc/hosts.allow
, run the command:$ sudo chmod 0644 /etc/hosts.allow
Rule Medium Severity -
Verify Permissions on /etc/hosts.deny
To properly set the permissions of/etc/hosts.deny
, run the command:$ sudo chmod 0644 /etc/hosts.deny
Rule Medium Severity -
NIS
The Network Information Service (NIS), also known as 'Yellow Pages' (YP), and its successor NIS+ have been made obsolete by Kerberos, LDAP, and oth...Group -
Remove NIS Client
The Network Information Service (NIS), formerly known as Yellow Pages, is a client-server directory service protocol used to distribute system conf...Rule Unknown Severity -
Uninstall ypserv Package
Theypserv
package can be removed with the following command:$ sudo yum erase ypserv
Rule High Severity -
Disable ypbind Service
The <code>ypbind</code> service, which allows the system to act as a client in a NIS or NIS+ domain, should be disabled. The <code>ypbind</code> s...Rule Medium Severity -
Rlogin, Rsh, and Rexec
The Berkeley r-commands are legacy services which allow cleartext remote access and have an insecure trust model.Group -
Telnet
The telnet protocol does not provide confidentiality or integrity for information transmitted on the network. This includes authentication informat...Group -
Uninstall rsh-server Package
Thersh-server
package can be removed with the following command:$ sudo yum erase rsh-server
Rule High Severity -
Uninstall rsh Package
Thersh
package contains the client commands for the rsh servicesRule Unknown Severity -
Disable rexec Service
The <code>rexec</code> service, which is available with the <code>rsh-server</code> package and runs as a service through xinetd or separately as a...Rule High Severity -
Disable rlogin Service
The <code>rlogin</code> service, which is available with the <code>rsh-server</code> package and runs as a service through xinetd or separately as ...Rule High Severity -
Disable rsh Service
The <code>rsh</code> service, which is available with the <code>rsh-server</code> package and runs as a service through xinetd or separately as a s...Rule High Severity -
Remove Host-Based Authentication Files
The <code>shosts.equiv</code> file lists remote hosts and users that are trusted by the local system. To remove these files, run the following comm...Rule High Severity -
Remove Rsh Trust Files
The files <code>/etc/hosts.equiv</code> and <code>~/.rhosts</code> (in each user's home directory) list remote hosts and users that are trusted by ...Rule High Severity -
Remove User Host-Based Authentication Files
The <code>~/.shosts</code> (in each user's home directory) files list remote hosts and users that are trusted by the local system. To remove these ...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.