Ensure AppArmor is Active and Configured
An XCCDF Rule
Description
Verify that the Apparmor tool is configured to
control whitelisted applications and user home directory access
control.
The apparmor
service can be enabled with the following command:
$ sudo systemctl enable apparmor.service
Rationale
Using a whitelist provides a configuration management method for allowing
the execution of only authorized software. Using only authorized software
decreases risk by limiting the number of potential vulnerabilities.
The organization must identify authorized software programs and permit
execution of authorized software by adding each authorized program to the
"pam_apparmor" exception policy. The process used to identify software
programs that are authorized to execute on organizational information
systems is commonly referred to as whitelisting.
Verification of whitelisted software occurs prior to execution or at system
startup.
Users' home directories/folders may contain information of a sensitive
nature. Nonprivileged users should coordinate any sharing of information
with a System Administrator (SA) through shared resources.
Apparmor can confine users to their home directory, not allowing them to
make any changes outside of their own home directories. Confining users to
their home directory will minimize the risk of sharing information.
- ID
- xccdf_org.ssgproject.content_rule_apparmor_configured
- Severity
- Medium
- References
- Updated
Remediation - OS Build Blueprint
[customizations.services]
enabled = ["apparmor"]
Remediation - Ansible
- name: Start apparmor.service
systemd:
name: apparmor.service
state: started
enabled: true
when: ansible_virtualization_type not in ["docker", "lxc", "openvz", "podman", "container"]
Remediation - Puppet
include enable_apparmor
class enable_apparmor {
service {'apparmor':
enable => true,
ensure => 'running',
Remediation - Shell Script
# Remediation is applicable only in certain platforms
if [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ]; then
# Enable apparmor
/usr/bin/systemctl enable "apparmor"
/usr/bin/systemctl start "apparmor"