Verify that Interactive Boot is Disabled
An XCCDF Rule
Description
SUSE Linux Enterprise 15 systems support an "interactive boot" option that can be used to prevent services from being started. On a SUSE Linux Enterprise 15 system, interactive boot can be enabled by providing a1
,
yes
, true
, or on
value to the
systemd.confirm_spawn
kernel argument in /etc/default/grub
.
Remove any instance of systemd.confirm_spawn=(1|yes|true|on)from the kernel arguments in that file to disable interactive boot. Recovery booting must also be disabled. Confirm that
GRUB_DISABLE_RECOVERY=true
is set in /etc/default/grub
.
It is also required to change the runtime configuration, run:
/usr/bin/grub2-editenv - unset systemd.confirm_spawn>
grub2-mkconfig -o /boot/grub2/grub.cfg
Rationale
Using interactive or recovery boot, the console user could disable auditing, firewalls, or other services, weakening system security.
- ID
- xccdf_org.ssgproject.content_rule_grub2_disable_interactive_boot
- Severity
- Medium
- References
- Updated
Remediation Templates
An Ansible Snippet
- name: Gather the package facts
package_facts:
manager: auto
tags:
- CCE-91152-9
- NIST-800-171-3.1.2
A Shell Script
# Remediation is applicable only in certain platforms
if rpm --quiet -q kernel-default && { rpm --quiet -q grub2; }; then
# Verify that Interactive Boot is Disabled in /etc/default/grub
CONFIRM_SPAWN_YES="systemd.confirm_spawn\(=\(1\|yes\|true\|on\)\|\b\)"
CONFIRM_SPAWN_NO="systemd.confirm_spawn=no"