Guide to the Secure Configuration of Red Hat Enterprise Linux 8
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Disable the zarafa_setrlimit SELinux Boolean
By default, the SELinux boolean <code>zarafa_setrlimit</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...Rule Medium Severity -
Disable the zebra_write_config SELinux Boolean
By default, the SELinux boolean <code>zebra_write_config</code> is disabled. If this setting is enabled, it should be disabled. To disable the <co...Rule Medium Severity -
Disable the zoneminder_anon_write SELinux Boolean
By default, the SELinux boolean <code>zoneminder_anon_write</code> is disabled. If this setting is enabled, it should be disabled. To disable the ...Rule Medium Severity -
Disable the zoneminder_run_sudo SELinux Boolean
By default, the SELinux boolean <code>zoneminder_run_sudo</code> is disabled. If this setting is enabled, it should be disabled. To disable the <c...Rule Medium Severity -
Services
The best protection against vulnerable software is running less software. This section describes how to review the software which Red Hat Enterpris...Group -
Apport Service
The Apport service provides debugging and crash reporting features on Ubuntu distributions.Group -
APT service configuration
The apt service manage the package management and update of the whole system. Its configuration need to be properly defined to ensure efficient sec...Group -
Avahi Server
The Avahi daemon implements the DNS Service Discovery and Multicast DNS protocols, which provide service and host discovery on a network. It allows...Group -
Configure Avahi if Necessary
If your system requires the Avahi daemon, its configuration can be restricted to improve security. The Avahi daemon configuration file is <code>/et...Group -
Check Avahi Responses' TTL Field
To make Avahi ignore packets unless the TTL field is 255, edit <code>/etc/avahi/avahi-daemon.conf</code> and ensure the following line appears in t...Rule Low Severity -
Disable Avahi Publishing
To prevent Avahi from publishing its records, edit <code>/etc/avahi/avahi-daemon.conf</code> and ensure the following line appears in the <code>[pu...Rule Low Severity -
Serve Avahi Only via Required Protocol
If you are using only IPv4, edit <code>/etc/avahi/avahi-daemon.conf</code> and ensure the following line exists in the <code>[server]</code> sectio...Rule Low Severity -
Prevent Other Programs from Using Avahi's Port
To prevent other mDNS stacks from running, edit <code>/etc/avahi/avahi-daemon.conf</code> and ensure the following line appears in the <code>[serve...Rule Medium Severity -
Restrict Information Published by Avahi
If it is necessary to publish some information to the network, it should not be joined by any extraneous information, or by information supplied by...Rule Low Severity -
Disable Avahi Server if Possible
Because the Avahi daemon service keeps an open network port, it is subject to network attacks. Disabling it can reduce the system's vulnerability t...Group -
Uninstall avahi-autoipd Server Package
If the system does not need to have an Avahi server which implements the DNS Service Discovery and Multicast DNS protocols, the avahi-autoipd and ...Rule Medium Severity -
Uninstall avahi Server Package
If the system does not need to have an Avahi server which implements the DNS Service Discovery and Multicast DNS protocols, the avahi-autoipd and a...Rule Medium Severity -
Disable Avahi Server Software
Theavahi-daemon
service can be disabled with the following command:$ sudo systemctl mask --now avahi-daemon.service
Rule Medium Severity -
Base Services
This section addresses the base services that are installed on a Red Hat Enterprise Linux 8 default installation which are not covered in other sec...Group -
Install the psacct package
The process accounting service, <code>psacct</code>, works with programs including <code>acct</code> and <code>ac</code> to allow system administra...Rule Low Severity -
Uninstall Automatic Bug Reporting Tool (abrt)
The Automatic Bug Reporting Tool (<code>abrt</code>) collects and reports crash data when an application crash is detected. Using a variety of plug...Rule Medium Severity -
Enable Process Accounting (psacct)
The process accounting service, <code>psacct</code>, works with programs including <code>acct</code> and <code>ac</code> to allow system administra...Rule Low Severity -
Disable Automatic Bug Reporting Tool (abrtd)
The Automatic Bug Reporting Tool (<code>abrtd</code>) daemon collects and reports crash data when an application crash is detected. Using a variety...Rule Medium Severity -
Disable Advanced Configuration and Power Interface (acpid)
The Advanced Configuration and Power Interface Daemon (<code>acpid</code>) dispatches ACPI events (such as power/reset button depressed) to userspa...Rule Medium Severity -
Disable Certmonger Service (certmonger)
Certmonger is a D-Bus based service that attempts to simplify interaction with certifying authorities on networks which use public-key infrastructu...Rule Low Severity -
Disable Cockpit Management Server
The Cockpit Management Server (<code>cockpit</code>) provides a web based login and management framework. The <code>cockpit</code> service can be ...Rule Medium Severity -
Disable CPU Speed (cpupower)
The <code>cpupower</code> service can adjust the clock speed of supported CPUs based upon the current processing load thereby conserving power and ...Rule Low Severity -
Disable KDump Kernel Crash Analyzer (kdump)
The <code>kdump</code> service provides a kernel crash dump analyzer. It uses the <code>kexec</code> system call to boot a secondary kernel ("captu...Rule Medium Severity -
Disable Software RAID Monitor (mdmonitor)
The <code>mdmonitor</code> service is used for monitoring a software RAID array; hardware RAID setups do not use this service. The <code>mdmonitor...Rule Low Severity -
Disable Network Console (netconsole)
The <code>netconsole</code> service is responsible for loading the netconsole kernel module, which logs kernel printk messages over UDP to a syslog...Rule Low Severity -
Disable ntpdate Service (ntpdate)
The <code>ntpdate</code> service sets the local hardware clock by polling NTP servers when the system boots. It synchronizes to the NTP servers lis...Rule Low Severity -
Disable Odd Job Daemon (oddjobd)
The <code>oddjobd</code> service exists to provide an interface and access control mechanism through which specified privileged tasks can run tasks...Rule Medium Severity -
Disable Portreserve (portreserve)
The <code>portreserve</code> service is a TCP port reservation utility that can be used to prevent portmap from binding to well known TCP ports tha...Rule Low Severity -
Disable Apache Qpid (qpidd)
The <code>qpidd</code> service provides high speed, secure, guaranteed delivery services. It is an implementation of the Advanced Message Queuing ...Rule Low Severity -
Disable Quota Netlink (quota_nld)
The <code>quota_nld</code> service provides notifications to users of disk space quota violations. It listens to the kernel via a netlink socket fo...Rule Low Severity -
Disable Network Router Discovery Daemon (rdisc)
The <code>rdisc</code> service implements the client side of the ICMP Internet Router Discovery Protocol (IRDP), which allows discovery of routers ...Rule Medium Severity -
Disable Red Hat Network Service (rhnsd)
The Red Hat Network service automatically queries Red Hat Network servers to determine whether there are any actions that should be executed, such ...Rule Low Severity -
Disable Red Hat Subscription Manager Daemon (rhsmcertd)
The Red Hat Subscription Manager (rhsmcertd) periodically checks for changes in the entitlement certificates for a registered system and updates it...Rule Low Severity -
Disable Cyrus SASL Authentication Daemon (saslauthd)
The <code>saslauthd</code> service handles plaintext authentication requests on behalf of the SASL library. The service isolates all code requiring...Rule Low Severity -
Disable System Statistics Reset Service (sysstat)
The <code>sysstat</code> service resets various I/O and CPU performance statistics to zero in order to begin counting from a fresh state at boot ti...Rule Low Severity -
Cron and At Daemons
The cron and at services are used to allow commands to be executed at a later time. The cron service is required by almost all systems to perform n...Group -
Install the cron service
The Cron service should be installed.Rule Medium Severity -
Enable cron Service
The <code>crond</code> service is used to execute commands at preconfigured times. It is required by almost all systems to perform necessary mainte...Rule Medium Severity -
Enable cron Service
The <code>crond</code> service is used to execute commands at preconfigured times. It is required by almost all systems to perform necessary mainte...Rule Medium Severity -
Disable At Service (atd)
The <code>at</code> and <code>batch</code> commands can be used to schedule tasks that are meant to be executed only once. This allows delayed exec...Rule Medium Severity -
Disable anacron Service
The <code>cronie-anacron</code> package, which provides <code>anacron</code> functionality, is installed by default. The <code>cronie-anacron</cod...Rule Unknown Severity -
Verify Group Who Owns cron.d
To properly set the group owner of/etc/cron.d
, run the command:$ sudo chgrp root /etc/cron.d
Rule Medium Severity -
Verify Group Who Owns cron.daily
To properly set the group owner of/etc/cron.daily
, run the command:$ sudo chgrp root /etc/cron.daily
Rule Medium Severity -
Verify Group Who Owns cron.hourly
To properly set the group owner of/etc/cron.hourly
, run the command:$ sudo chgrp root /etc/cron.hourly
Rule Medium Severity -
Verify Group Who Owns cron.monthly
To properly set the group owner of/etc/cron.monthly
, run the command:$ sudo chgrp root /etc/cron.monthly
Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.