Red Hat Enterprise Linux 7 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
Responding to broadcast (ICMP) echoes facilitates network mapping and provides a vector for amplification attacks.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the host's route table and are unauthenticated. An ill...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the host's route table and are unauthenticated. An ill...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages contain information from the system's route table, possibly r...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Network interfaces configured on the Red Hat Enterprise Linux operating system must not be in promiscuous mode.
Network interfaces in promiscuous mode allow for the capture of all network traffic visible to the system. If unauthorized individuals can access these applications, it may allow then to collect in...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must be configured to prevent unrestricted mail relaying.
If unrestricted mail relaying is permitted, unauthorized senders could use this host as a mail relay for the purpose of sending spam or other unauthorized activity.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must not have a File Transfer Protocol (FTP) server package installed unless needed.
The FTP service provides an unencrypted remote access that does not provide for the confidentiality and integrity of user passwords or the remote session. If a privileged user were to log on using ...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must not have the Trivial File Transfer Protocol (TFTP) server package installed if not required for operational support.
If TFTP is required for operational support (such as the transmission of router configurations) its use must be documented with the Information System Security Officer (ISSO), restricted to only au...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must be configured so that if the Trivial File Transfer Protocol (TFTP) server is required, the TFTP daemon is configured to operate in secure mode.
Restricting TFTP to a specific directory prevents remote users from copying, transferring, or overwriting system files.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must not have a graphical display manager installed unless approved.
Internet services that are not required for system or application processes must not be active to decrease the attack surface of the system. Graphical display managers have a long history of securi...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must not be performing packet forwarding unless the system is a router.
Routing protocol daemons are typically used on routers to exchange network topology information with other routers. If this software is used when not required, system network information may be unn...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
When an NFS server is configured to use RPCSEC_SYS, a selected userid and groupid are used to handle requests from the remote user. The userid and groupid could mistakenly or maliciously be set inc...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SNMP community strings on the Red Hat Enterprise Linux operating system must be changed from the default.
Whether active or not, default Simple Network Management Protocol (SNMP) community strings must be changed to maintain security. If the service is running with the default authenticators, anyone ca...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system access control program must be configured to grant or deny system access to specific hosts and services.
If the systems access control program is not configured with appropriate rules for allowing and denying access to system network resources, services may be accessible to unauthorized hosts.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured.
IP tunneling mechanisms can be used to bypass network filtering. If tunneling is required, it must be documented with the Information System Security Officer (ISSO).Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must not forward IPv6 source-routed packets.
Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security me...Rule Medium Severity -
SRG-OS-000375-GPOS-00160
Group -
The Red Hat Enterprise Linux operating system must have the required packages for multifactor authentication installed.
Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the information system is compromised, that compromise will not affect cred...Rule Medium Severity -
SRG-OS-000375-GPOS-00160
Group -
The Red Hat Enterprise Linux operating system must implement multifactor authentication for access to privileged accounts via pluggable authentication modules (PAM).
Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the information system is compromised, that compromise will not affect cred...Rule Medium Severity -
SRG-OS-000375-GPOS-00160
Group -
SRG-OS-000424-GPOS-00188
Group -
The Red Hat Enterprise Linux operating system must be configured so that all wireless network adapters are disabled.
The use of wireless networking can introduce many different attack vectors into the organization's network. Common attack vectors such as malicious association and ad hoc networks will allow an att...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must implement the Endpoint Security for Linux Threat Prevention tool.
Adding endpoint security tools can provide the capability to automatically take actions in response to malicious behavior, which can provide additional agility in reacting to network threats. These...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The Red Hat Enterprise Linux operating system must use a virus scan program.
Virus scanning software can be used to protect a system from penetration from computer viruses and to limit their spread through intermediate systems. The virus scanning software should be confi...Rule High Severity -
SRG-OS-000029-GPOS-00010
Group -
SRG-OS-000114-GPOS-00059
Group -
The Red Hat Enterprise Linux operating system must disable the graphical user interface automounter unless required.
Automatically mounting file systems permits easy introduction of unknown devices, thereby facilitating malicious activity. Satisfies: SRG-OS-000114-GPOS-00059, SRG-OS-000378-GPOS-00163, SRG-OS-000...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.