Guide to the Secure Configuration of Red Hat Enterprise Linux 8
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Disable TIPC Support
The Transparent Inter-Process Communication (TIPC) protocol is designed to provide communications between nodes in a cluster. To configure the sys...Rule Low Severity -
Wireless Networking
Wireless networking, such as 802.11 (WiFi) and Bluetooth, can present a security risk to sensitive or classified systems and networks. Wireless net...Group -
Disable Wireless Through Software Configuration
If it is impossible to remove the wireless hardware from the device in question, disable as much of it as possible through software. The following ...Group -
Disable Bluetooth Service
The <code>bluetooth</code> service can be disabled with the following command: <pre>$ sudo systemctl mask --now bluetooth.service</pre> <pre>$ sud...Rule Medium Severity -
Disable Bluetooth Kernel Module
The kernel's module loading system can be configured to prevent loading of the Bluetooth module. Add the following to the appropriate <code>/etc/mo...Rule Medium Severity -
Disable Kernel cfg80211 Module
To configure the system to prevent the <code>cfg80211</code> kernel module from being loaded, add the following line to the file <code>/etc/modpro...Rule Medium Severity -
Disable Kernel iwlmvm Module
To configure the system to prevent the <code>iwlmvm</code> kernel module from being loaded, add the following line to the file <code>/etc/modprobe...Rule Medium Severity -
Disable Kernel iwlwifi Module
To configure the system to prevent the <code>iwlwifi</code> kernel module from being loaded, add the following line to the file <code>/etc/modprob...Rule Medium Severity -
Disable Kernel mac80211 Module
To configure the system to prevent the <code>mac80211</code> kernel module from being loaded, add the following line to the file <code>/etc/modpro...Rule Medium Severity -
Disable WiFi or Bluetooth in BIOS
Some machines that include built-in wireless support offer the ability to disable the device through the BIOS. This is hardware-specific; consult y...Rule Unknown Severity -
Deactivate Wireless Network Interfaces
Deactivating wireless network interfaces should prevent normal usage of the wireless capability. <br><br> Configure the system to disable all wire...Rule Medium Severity -
Disable Unused Interfaces
Network interfaces expand the attack surface of the system. Unused interfaces are not monitored or controlled, and should be disabled. <br><br> If...Group -
Transport Layer Security Support
Support for Transport Layer Security (TLS), and its predecessor, the Secure Sockets Layer (SSL), is included in Red Hat Enterprise Linux in the Ope...Group -
File Permissions and Masks
Traditional Unix security relies heavily on file and directory permissions to prevent unauthorized users from reading or modifying files to which t...Group -
Verify Permissions on Important Files and Directories
Permissions for many files on a system must be set restrictively to ensure sensitive information is properly protected. This section discusses impo...Group -
Ensure All World-Writable Directories Are Owned by root User
All directories in local partitions which are world-writable should be owned by root. If any world-writable directories are not owned by root, this...Rule Medium Severity -
Ensure All World-Writable Directories Are Owned by a System Account
All directories in local partitions which are world-writable should be owned by root or another system account. If any world-writable directories a...Rule Medium Severity -
Ensure All World-Writable Directories Are Group Owned by a System Account
All directories in local partitions which are world-writable should be group owned by root or another system account. If any world-writable directo...Rule Medium Severity -
Verify Permissions on /etc/audit/auditd.conf
To properly set the permissions of/etc/audit/auditd.conf
, run the command:$ sudo chmod 0640 /etc/audit/auditd.conf
Rule Medium Severity -
Verify Permissions on /etc/audit/rules.d/*.rules
To properly set the permissions of/etc/audit/rules.d/*.rules
, run the command:$ sudo chmod 0640 /etc/audit/rules.d/*.rules
Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.