Skip to content

Guide to the Secure Configuration of Red Hat Enterprise Linux 7

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Disable the virt_rw_qemu_ga_data SELinux Boolean

    By default, the SELinux boolean <code>virt_rw_qemu_ga_data</code> is disabled. If this setting is enabled, it should be disabled. To disable the <...
    Rule Medium Severity
  • Disable the virt_sandbox_use_all_caps SELinux Boolean

    By default, the SELinux boolean <code>virt_sandbox_use_all_caps</code> is enabled. This setting is disabled as containers should not run with privi...
    Rule Medium Severity
  • Enable the virt_sandbox_use_audit SELinux Boolean

    By default, the SELinux boolean <code>virt_sandbox_use_audit</code> is enabled. If this setting is disabled, it should be enabled to allow sandboxe...
    Rule Medium Severity
  • Disable the virt_sandbox_use_mknod SELinux Boolean

    By default, the SELinux boolean <code>virt_sandbox_use_mknod</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the virt_sandbox_use_netlink SELinux Boolean

    By default, the SELinux boolean <code>virt_sandbox_use_netlink</code> is disabled. If this setting is enabled, it should be disabled. To disable t...
    Rule Medium Severity
  • Disable the virt_sandbox_use_sys_admin SELinux Boolean

    By default, the SELinux boolean <code>virt_sandbox_use_sys_admin</code> is disabled. If this setting is enabled, it should be disabled. To disable...
    Rule Medium Severity
  • Disable the virt_transition_userdomain SELinux Boolean

    By default, the SELinux boolean <code>virt_transition_userdomain</code> is disabled. If this setting is enabled, it should be disabled. To disable...
    Rule Medium Severity
  • Disable the virt_use_comm SELinux Boolean

    By default, the SELinux boolean <code>virt_use_comm</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>vi...
    Rule Medium Severity
  • Disable the virt_use_execmem SELinux Boolean

    By default, the SELinux boolean <code>virt_use_execmem</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the virt_use_fusefs SELinux Boolean

    By default, the SELinux boolean <code>virt_use_fusefs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>...
    Rule Medium Severity
  • Disable the virt_use_nfs SELinux Boolean

    By default, the SELinux boolean <code>virt_use_nfs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>vir...
    Rule Medium Severity
  • Disable the virt_use_rawip SELinux Boolean

    By default, the SELinux boolean <code>virt_use_rawip</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>v...
    Rule Medium Severity
  • Disable the virt_use_samba SELinux Boolean

    By default, the SELinux boolean <code>virt_use_samba</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>v...
    Rule Medium Severity
  • Disable the virt_use_sanlock SELinux Boolean

    By default, the SELinux boolean <code>virt_use_sanlock</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the virt_use_usb SELinux Boolean

    By default, the SELinux boolean <code>virt_use_usb</code> is enabled. This setting should be disabled. To disable the <code>virt_use_usb</code> SE...
    Rule Medium Severity
  • Disable the virt_use_xserver SELinux Boolean

    By default, the SELinux boolean <code>virt_use_xserver</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the webadm_manage_user_files SELinux Boolean

    By default, the SELinux boolean <code>webadm_manage_user_files</code> is disabled. If this setting is enabled, it should be disabled. To disable t...
    Rule Medium Severity
  • Disable the webadm_read_user_files SELinux Boolean

    By default, the SELinux boolean <code>webadm_read_user_files</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the wine_mmap_zero_ignore SELinux Boolean

    By default, the SELinux boolean <code>wine_mmap_zero_ignore</code> is disabled. If this setting is enabled, it should be disabled. To disable the ...
    Rule Medium Severity
  • Disable the xdm_bind_vnc_tcp_port SELinux Boolean

    By default, the SELinux boolean <code>xdm_bind_vnc_tcp_port</code> is disabled. If this setting is enabled, it should be disabled. To disable the ...
    Rule Medium Severity
  • Disable the xdm_exec_bootloader SELinux Boolean

    By default, the SELinux boolean <code>xdm_exec_bootloader</code> is disabled. If this setting is enabled, it should be disabled. To disable the <c...
    Rule Medium Severity
  • Disable the xdm_sysadm_login SELinux Boolean

    By default, the SELinux boolean <code>xdm_sysadm_login</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the xdm_write_home SELinux Boolean

    By default, the SELinux boolean <code>xdm_write_home</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>x...
    Rule Medium Severity
  • Disable the xen_use_nfs SELinux Boolean

    By default, the SELinux boolean <code>xen_use_nfs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>xen_...
    Rule Medium Severity
  • Enable the xend_run_blktap SELinux Boolean

    By default, the SELinux boolean <code>xend_run_blktap</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>xe...
    Rule Medium Severity
  • Enable the xend_run_qemu SELinux Boolean

    By default, the SELinux boolean <code>xend_run_qemu</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>xend...
    Rule Medium Severity
  • Disable the xguest_connect_network SELinux Boolean

    By default, the SELinux boolean <code>xguest_connect_network</code> is enabled. This setting should be disabled as guest users should not be able t...
    Rule Medium Severity
  • Disable the xguest_exec_content SELinux Boolean

    By default, the SELinux boolean <code>xguest_exec_content</code> is enabled. This setting should be disabled as guest users should not be able to r...
    Rule Medium Severity
  • Disable the xguest_mount_media SELinux Boolean

    By default, the SELinux boolean <code>xguest_mount_media</code> is enabled. This setting should be disabled as guest users should not be able to mo...
    Rule Medium Severity
  • Disable the xguest_use_bluetooth SELinux Boolean

    By default, the SELinux boolean <code>xguest_use_bluetooth</code> is enabled. This setting should be disabled as guests users should not be able to...
    Rule Medium Severity
  • Disable the xserver_clients_write_xshm SELinux Boolean

    By default, the SELinux boolean <code>xserver_clients_write_xshm</code> is disabled. If this setting is enabled, it should be disabled. To disable...
    Rule Medium Severity
  • Disable the xserver_execmem SELinux Boolean

    By default, the SELinux boolean <code>xserver_execmem</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>...
    Rule Medium Severity
  • Disable the xserver_object_manager SELinux Boolean

    By default, the SELinux boolean <code>xserver_object_manager</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the zabbix_can_network SELinux Boolean

    By default, the SELinux boolean <code>zabbix_can_network</code> is disabled. If this setting is enabled, it should be disabled. To disable the <co...
    Rule Medium Severity
  • Disable the zarafa_setrlimit SELinux Boolean

    By default, the SELinux boolean <code>zarafa_setrlimit</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the zebra_write_config SELinux Boolean

    By default, the SELinux boolean <code>zebra_write_config</code> is disabled. If this setting is enabled, it should be disabled. To disable the <co...
    Rule Medium Severity
  • Disable the zoneminder_anon_write SELinux Boolean

    By default, the SELinux boolean <code>zoneminder_anon_write</code> is disabled. If this setting is enabled, it should be disabled. To disable the ...
    Rule Medium Severity
  • Disable the zoneminder_run_sudo SELinux Boolean

    By default, the SELinux boolean <code>zoneminder_run_sudo</code> is disabled. If this setting is enabled, it should be disabled. To disable the <c...
    Rule Medium Severity
  • Services

    The best protection against vulnerable software is running less software. This section describes how to review the software which Red Hat Enterpris...
    Group
  • Apport Service

    The Apport service provides debugging and crash reporting features on Ubuntu distributions.
    Group
  • APT service configuration

    The apt service manage the package management and update of the whole system. Its configuration need to be properly defined to ensure efficient sec...
    Group
  • Avahi Server

    The Avahi daemon implements the DNS Service Discovery and Multicast DNS protocols, which provide service and host discovery on a network. It allows...
    Group
  • Configure Avahi if Necessary

    If your system requires the Avahi daemon, its configuration can be restricted to improve security. The Avahi daemon configuration file is <code>/et...
    Group
  • Check Avahi Responses' TTL Field

    To make Avahi ignore packets unless the TTL field is 255, edit <code>/etc/avahi/avahi-daemon.conf</code> and ensure the following line appears in t...
    Rule Low Severity
  • Disable Avahi Publishing

    To prevent Avahi from publishing its records, edit <code>/etc/avahi/avahi-daemon.conf</code> and ensure the following line appears in the <code>[pu...
    Rule Low Severity
  • Serve Avahi Only via Required Protocol

    If you are using only IPv4, edit <code>/etc/avahi/avahi-daemon.conf</code> and ensure the following line exists in the <code>[server]</code> sectio...
    Rule Low Severity
  • Prevent Other Programs from Using Avahi's Port

    To prevent other mDNS stacks from running, edit <code>/etc/avahi/avahi-daemon.conf</code> and ensure the following line appears in the <code>[serve...
    Rule Medium Severity
  • Disable Advanced Configuration and Power Interface (acpid)

    The Advanced Configuration and Power Interface Daemon (<code>acpid</code>) dispatches ACPI events (such as power/reset button depressed) to userspa...
    Rule Medium Severity
  • Restrict Information Published by Avahi

    If it is necessary to publish some information to the network, it should not be joined by any extraneous information, or by information supplied by...
    Rule Low Severity
  • Disable Avahi Server if Possible

    Because the Avahi daemon service keeps an open network port, it is subject to network attacks. Disabling it can reduce the system's vulnerability t...
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules