Guide to the Secure Configuration of Red Hat Enterprise Linux 8
Rules, Groups, and Values defined within the XCCDF Benchmark
-
UEFI Boot Loader Is Not Installed On Removeable Media
The system must not allow removable media to be used as the boot loader. Remove alternate methods of booting the system from removable media. <code...Rule Medium Severity -
zIPL bootloader configuration
During the boot process, the bootloader is responsible for starting the execution of the kernel and passing options to it. The default Red Hat Ente...Group -
Enable Auditing to Start Prior to the Audit Daemon in zIPL
To ensure all processes can be audited, even those which start prior to the audit daemon, check that all boot entries in <code>/boot/loader/entries...Rule Medium Severity -
Extend Audit Backlog Limit for the Audit Daemon in zIPL
To improve the kernel capacity to queue all log events, even those which start prior to the audit daemon, check that all boot entries in <code>/boo...Rule Medium Severity -
Ensure all zIPL boot entries are BLS compliant
Ensure that zIPL boot entries fully adheres to Boot Loader Specification (BLS) by checking that <code>/etc/zipl.conf</code> doesn't contain <code>i...Rule Medium Severity -
Ensure zIPL bootmap is up to date
Make sure that <code>/boot/bootmap</code> is up to date.<br> Every time a boot entry or zIPL configuration is changed <code>/boot/bootmap</code> ne...Rule Medium Severity -
Ensure SELinux Not Disabled in zIPL
To ensure SELinux is not disabled at boot time, check that no boot entry in <code>/boot/loader/entries/*.conf</code> has <code>selinux=0</code> inc...Rule Medium Severity -
Enable page allocator poisoning in zIPL
To enable poisoning of free pages, check that all boot entries in <code>/boot/loader/entries/*.conf</code> have <code>page_poison=1</code> included...Rule Medium Severity -
Enable SLUB/SLAB allocator poisoning in zIPL
To enable poisoning of SLUB/SLAB objects, check that all boot entries in <code>/boot/loader/entries/*.conf</code> have <code>slub_debug=P</code> in...Rule Medium Severity -
Ensure debug-shell service is not enabled in zIPL
systemd's <code>debug-shell</code> service is intended to diagnose systemd related boot issues with various <code>systemctl</code> commands. Once e...Rule Medium Severity -
net.ipv4.icmp_ignore_bogus_error_responses
Enable to prevent unnecessary loggingValue -
Ensure Solid State Drives Do Not Contribute To Random-Number Entropy Pool
For each solid-state drive on the system, run:# echo 0 > /sys/block/DRIVE/queue/add_random
Rule Medium Severity -
Kernel Configuration
Contains rules that check the kernel configuration that was used to build it.Group -
Hash function for kernel module signing
The hash function to use when signing modules during kernel build process.Value -
Key and certificate for kernel module signing
The private key and certificate to use when signing modules during kernel build process. On systems where the OpenSSL ENGINE_pkcs11 is functional —...Value -
Kernel panic timeout
The time, in seconds, to wait until a reboot occurs. If the value is <code>0</code> the system never reboots. If the value is less than <code>0</co...Value -
Do not allow ACPI methods to be inserted/replaced at run time
This debug facility allows ACPI AML methods to be inserted and/or replaced without rebooting the system. This configuration is available from kerne...Rule Low Severity -
Emulate Privileged Access Never (PAN)
Enabling this option prevents the kernel from accessing user-space memory directly by pointing TTBR0_EL1 to a reserved zeroed area and reserved ASI...Rule Medium Severity -
Disable kernel support for MISC binaries
Enabling <code>CONFIG_BINFMT_MISC</code> makes it possible to plug wrapper-driven binary formats into the kernel. This is specially useful for prog...Rule Medium Severity -
Enable support for BUG()
Disabling this option eliminates support for BUG and WARN, reducing the size of your kernel image and potentially quietly ignoring numerous fatal c...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.