Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
Guide to the Secure Configuration of Red Hat Enterprise Linux CoreOS 4
Services
Kerberos
Kerberos
An XCCDF Group - A logical subset of the XCCDF Benchmark
Details
Profiles
Prose
Kerberos
1 Rule
The Kerberos protocol is used for authentication across non-secure network. Authentication can happen between various types of principals -- users, service, or hosts. Their identity and encryption keys can be stored in keytab files.
Disable Kerberos by removing host keytab
Medium Severity
Kerberos is not an approved key distribution method for Common Criteria. To prevent using Kerberos by system daemons, remove the Kerberos keytab files, especially
/etc/krb5.keytab
.