Skip to content

Guide to the Secure Configuration of Red Hat Enterprise Linux 9

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Disable the squid_connect_any SELinux Boolean

    By default, the SELinux boolean <code>squid_connect_any</code> is enabled. This setting should be disabled as squid should only connect on specifie...
    Rule Medium Severity
  • Disable the squid_use_tproxy SELinux Boolean

    By default, the SELinux boolean <code>squid_use_tproxy</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the ssh_chroot_rw_homedirs SELinux Boolean

    By default, the SELinux boolean <code>ssh_chroot_rw_homedirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the ssh_keysign SELinux Boolean

    By default, the SELinux boolean <code>ssh_keysign</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>ssh_...
    Rule Medium Severity
  • Disable the ssh_sysadm_login SELinux Boolean

    By default, the SELinux boolean <code>ssh_sysadm_login</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Enable the staff_exec_content SELinux Boolean

    By default, the SELinux boolean <code>staff_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code...
    Rule Medium Severity
  • Disable the staff_use_svirt SELinux Boolean

    By default, the SELinux boolean <code>staff_use_svirt</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>...
    Rule Medium Severity
  • Disable the swift_can_network SELinux Boolean

    By default, the SELinux boolean <code>swift_can_network</code> is disabled. If this setting is enabled, it should be disabled. To disable the <cod...
    Rule Medium Severity
  • Enable the sysadm_exec_content SELinux Boolean

    By default, the SELinux boolean <code>sysadm_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <cod...
    Rule Medium Severity
  • Disable the telepathy_connect_all_ports SELinux Boolean

    By default, the SELinux boolean <code>telepathy_connect_all_ports</code> is disabled. If this setting is enabled, it should be disabled. To disabl...
    Rule Medium Severity
  • Disable the telepathy_tcp_connect_generic_network_ports SELinux Boolean

    By default, the SELinux boolean <code>telepathy_tcp_connect_generic_network_ports</code> is enabled. This setting should be disabled as <code>telep...
    Rule Medium Severity
  • Disable the tftp_anon_write SELinux Boolean

    By default, the SELinux boolean <code>tftp_anon_write</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>...
    Rule Medium Severity
  • Disable the tftp_home_dir SELinux Boolean

    By default, the SELinux boolean <code>tftp_home_dir</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>tf...
    Rule Medium Severity
  • Disable the tmpreaper_use_nfs SELinux Boolean

    By default, the SELinux boolean <code>tmpreaper_use_nfs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <cod...
    Rule Medium Severity
  • Disable the tmpreaper_use_samba SELinux Boolean

    By default, the SELinux boolean <code>tmpreaper_use_samba</code> is disabled. If this setting is enabled, it should be disabled. To disable the <c...
    Rule Medium Severity
  • Disable the tor_bind_all_unreserved_ports SELinux Boolean

    By default, the SELinux boolean <code>tor_bind_all_unreserved_ports</code> is disabled. If this setting is enabled, it should be disabled. To disa...
    Rule Medium Severity
  • Disable the tor_can_network_relay SELinux Boolean

    By default, the SELinux boolean <code>tor_can_network_relay</code> is disabled. If this setting is enabled, it should be disabled. To disable the ...
    Rule Medium Severity
  • Enable the unconfined_chrome_sandbox_transition SELinux Boolean

    By default, the SELinux boolean <code>unconfined_chrome_sandbox_transition</code> is enabled. If this setting is disabled, it should be enabled. T...
    Rule Medium Severity
  • Enable the unconfined_login SELinux Boolean

    By default, the SELinux boolean <code>unconfined_login</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>u...
    Rule Medium Severity
  • Enable the unconfined_mozilla_plugin_transition SELinux Boolean

    By default, the SELinux boolean <code>unconfined_mozilla_plugin_transition</code> is enabled. If this setting is disabled, it should be enabled. T...
    Rule Medium Severity
  • Disable the unprivuser_use_svirt SELinux Boolean

    By default, the SELinux boolean <code>unprivuser_use_svirt</code> is disabled. If this setting is enabled, it should be disabled. To disable the <...
    Rule Medium Severity
  • Disable the use_ecryptfs_home_dirs SELinux Boolean

    By default, the SELinux boolean <code>use_ecryptfs_home_dirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the use_fusefs_home_dirs SELinux Boolean

    By default, the SELinux boolean <code>use_fusefs_home_dirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <...
    Rule Medium Severity
  • Disable the use_lpd_server SELinux Boolean

    By default, the SELinux boolean <code>use_lpd_server</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>u...
    Rule Medium Severity
  • Disable the use_nfs_home_dirs SELinux Boolean

    By default, the SELinux boolean <code>use_nfs_home_dirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <cod...
    Rule Medium Severity
  • Disable the use_samba_home_dirs SELinux Boolean

    By default, the SELinux boolean <code>use_samba_home_dirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <c...
    Rule Medium Severity
  • Disable Avahi Server if Possible

    Because the Avahi daemon service keeps an open network port, it is subject to network attacks. Disabling it can reduce the system's vulnerability t...
    Group
  • Enable the user_exec_content SELinux Boolean

    By default, the SELinux boolean <code>user_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>...
    Rule Medium Severity
  • Disable the varnishd_connect_any SELinux Boolean

    By default, the SELinux boolean <code>varnishd_connect_any</code> is disabled. If this setting is enabled, it should be disabled. To disable the <...
    Rule Medium Severity
  • Disable the virt_read_qemu_ga_data SELinux Boolean

    By default, the SELinux boolean <code>virt_read_qemu_ga_data</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the virt_rw_qemu_ga_data SELinux Boolean

    By default, the SELinux boolean <code>virt_rw_qemu_ga_data</code> is disabled. If this setting is enabled, it should be disabled. To disable the <...
    Rule Medium Severity
  • Disable the virt_sandbox_use_all_caps SELinux Boolean

    By default, the SELinux boolean <code>virt_sandbox_use_all_caps</code> is enabled. This setting is disabled as containers should not run with privi...
    Rule Medium Severity
  • Enable the virt_sandbox_use_audit SELinux Boolean

    By default, the SELinux boolean <code>virt_sandbox_use_audit</code> is enabled. If this setting is disabled, it should be enabled to allow sandboxe...
    Rule Medium Severity
  • Disable the virt_sandbox_use_mknod SELinux Boolean

    By default, the SELinux boolean <code>virt_sandbox_use_mknod</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the virt_sandbox_use_netlink SELinux Boolean

    By default, the SELinux boolean <code>virt_sandbox_use_netlink</code> is disabled. If this setting is enabled, it should be disabled. To disable t...
    Rule Medium Severity
  • Disable the virt_sandbox_use_sys_admin SELinux Boolean

    By default, the SELinux boolean <code>virt_sandbox_use_sys_admin</code> is disabled. If this setting is enabled, it should be disabled. To disable...
    Rule Medium Severity
  • Disable the virt_transition_userdomain SELinux Boolean

    By default, the SELinux boolean <code>virt_transition_userdomain</code> is disabled. If this setting is enabled, it should be disabled. To disable...
    Rule Medium Severity
  • Disable the virt_use_comm SELinux Boolean

    By default, the SELinux boolean <code>virt_use_comm</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>vi...
    Rule Medium Severity
  • Disable the virt_use_execmem SELinux Boolean

    By default, the SELinux boolean <code>virt_use_execmem</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the virt_use_fusefs SELinux Boolean

    By default, the SELinux boolean <code>virt_use_fusefs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>...
    Rule Medium Severity
  • Disable the virt_use_nfs SELinux Boolean

    By default, the SELinux boolean <code>virt_use_nfs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>vir...
    Rule Medium Severity
  • Disable the virt_use_rawip SELinux Boolean

    By default, the SELinux boolean <code>virt_use_rawip</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>v...
    Rule Medium Severity
  • Disable the CUPS Service

    The cups service can be disabled with the following command:
    $ sudo systemctl mask --now cups.service
    Rule Unknown Severity
  • Disable the virt_use_samba SELinux Boolean

    By default, the SELinux boolean <code>virt_use_samba</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>v...
    Rule Medium Severity
  • Disable the virt_use_sanlock SELinux Boolean

    By default, the SELinux boolean <code>virt_use_sanlock</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the virt_use_usb SELinux Boolean

    By default, the SELinux boolean <code>virt_use_usb</code> is enabled. This setting should be disabled. To disable the <code>virt_use_usb</code> SE...
    Rule Medium Severity
  • Disable the virt_use_xserver SELinux Boolean

    By default, the SELinux boolean <code>virt_use_xserver</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the webadm_manage_user_files SELinux Boolean

    By default, the SELinux boolean <code>webadm_manage_user_files</code> is disabled. If this setting is enabled, it should be disabled. To disable t...
    Rule Medium Severity
  • Disable the webadm_read_user_files SELinux Boolean

    By default, the SELinux boolean <code>webadm_read_user_files</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the wine_mmap_zero_ignore SELinux Boolean

    By default, the SELinux boolean <code>wine_mmap_zero_ignore</code> is disabled. If this setting is enabled, it should be disabled. To disable the ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules