AlmaLinux OS 9 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.
An XCCDF Rule
Description
Failure to restrict network connectivity only to authorized systems permits inbound connections from malicious systems. It also permits outbound connections that may facilitate exfiltration of DOD data. AlmaLinux OS 9 incorporates the "firewalld" daemon, which allows for many different configurations. One of these configurations is zones. Zones can be used to a deny-all, allow-by-exception approach. The default "drop" zone will drop all incoming network packets unless it is explicitly allowed by the configuration file or is related to an outgoing network connection.
- ID
- SV-269246r1050780_rule
- Version
- ALMA-09-018830
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Configure the "firewalld" daemon to employ a deny-all, allow-by-exception.
Start by adding the exceptions that are required for mission functionality to the "drop" zone. If SSH access on port 22 is needed for example, run the following command:
$ firewall-cmd --permanent --add-service=ssh --zone=drop