Skip to content

NIST National Checklist Program Security Guide

Rules and Groups employed by this XCCDF Profile

  • SELinux - Booleans

    Enable or Disable runtime customization of SELinux system policies without having to reload or recompile the SELinux policy.
    Group
  • Disable the abrt_anon_write SELinux Boolean

    By default, the SELinux boolean <code>abrt_anon_write</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>...
    Rule Medium Severity
  • Disable the abrt_handle_event SELinux Boolean

    By default, the SELinux boolean <code>abrt_handle_event</code> is disabled. If this setting is enabled, it should be disabled. To disable the <cod...
    Rule Medium Severity
  • Disable the abrt_upload_watch_anon_write SELinux Boolean

    By default, the SELinux boolean <code>abrt_upload_watch_anon_write</code> is enabled. This setting should be disabled as it allows the Automatic Bu...
    Rule Medium Severity
  • Enable the auditadm_exec_content SELinux Boolean

    By default, the SELinux boolean <code>auditadm_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <c...
    Rule Medium Severity
  • Disable the cron_can_relabel SELinux Boolean

    By default, the SELinux boolean <code>cron_can_relabel</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the cron_system_cronjob_use_shares SELinux Boolean

    By default, the SELinux boolean <code>cron_system_cronjob_use_shares</code> is disabled. If this setting is enabled, it should be disabled. To dis...
    Rule Medium Severity
  • Enable the cron_userdomain_transition SELinux Boolean

    By default, the SELinux boolean <code>cron_userdomain_transition</code> is enabled. This setting should be enabled as end user cron jobs run in the...
    Rule Medium Severity
  • Disable the daemons_dump_core SELinux Boolean

    By default, the SELinux boolean <code>daemons_dump_core</code> is disabled. If this setting is enabled, it should be disabled. To disable the <cod...
    Rule Medium Severity
  • Disable the daemons_use_tcp_wrapper SELinux Boolean

    By default, the SELinux boolean <code>daemons_use_tcp_wrapper</code> is disabled. If this setting is enabled, it should be disabled. To disable th...
    Rule Medium Severity
  • Disable the daemons_use_tty SELinux Boolean

    By default, the SELinux boolean <code>daemons_use_tty</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>...
    Rule Medium Severity
  • Configure the deny_execmem SELinux Boolean

    By default, the SELinux boolean <code>deny_execmem</code> is disabled. This setting should be configured to <xccdf-1.2:sub idref="xccdf_org.ssgproj...
    Rule Medium Severity
  • Disable the deny_ptrace SELinux Boolean

    By default, the SELinux boolean <code>deny_ptrace</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>deny...
    Rule Medium Severity
  • Enable the domain_fd_use SELinux Boolean

    By default, the SELinux boolean <code>domain_fd_use</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>doma...
    Rule Medium Severity
  • Disable the domain_kernel_load_modules SELinux Boolean

    By default, the SELinux boolean <code>domain_kernel_load_modules</code> is disabled. If this setting is enabled, it should be disabled. To disable...
    Rule Medium Severity
  • Enable the fips_mode SELinux Boolean

    By default, the SELinux boolean <code>fips_mode</code> is enabled. This allows all SELinux domains to execute in <code>fips_mode</code>. If this se...
    Rule Medium Severity
  • Disable the gpg_web_anon_write SELinux Boolean

    By default, the SELinux boolean <code>gpg_web_anon_write</code> is disabled. If this setting is enabled, it should be disabled. To disable the <co...
    Rule Medium Severity
  • Disable the guest_exec_content SELinux Boolean

    By default, the SELinux boolean <code>guest_exec_content</code> is enabled. This setting should be disabled as no guest accounts should be used. T...
    Rule Medium Severity
  • Enable the kerberos_enabled SELinux Boolean

    By default, the SELinux boolean <code>kerberos_enabled</code> is enabled. If this setting is disabled, it should be enabled to allow confined appli...
    Rule Medium Severity
  • Enable the logadm_exec_content SELinux Boolean

    By default, the SELinux boolean <code>logadm_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <cod...
    Rule Medium Severity
  • Disable the logging_syslogd_can_sendmail SELinux Boolean

    By default, the SELinux boolean <code>logging_syslogd_can_sendmail</code> is disabled. If this setting is enabled, it should be disabled. To disab...
    Rule Medium Severity
  • Enable the logging_syslogd_use_tty SELinux Boolean

    By default, the SELinux boolean <code>logging_syslogd_use_tty</code> is enabled. If this setting is disabled, it should be enabled as it allows <co...
    Rule Medium Severity
  • Enable the login_console_enabled SELinux Boolean

    By default, the SELinux boolean <code>login_console_enabled</code> is enabled. If this setting is disabled, it should be enabled as it allows login...
    Rule Medium Severity
  • Disable the mmap_low_allowed SELinux Boolean

    By default, the SELinux boolean <code>mmap_low_allowed</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Disable the mock_enable_homedirs SELinux Boolean

    By default, the SELinux boolean <code>mock_enable_homedirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <...
    Rule Medium Severity
  • Enable the mount_anyfile SELinux Boolean

    By default, the SELinux boolean <code>mount_anyfile</code> is enabled. If this setting is disabled, it should be enabled to allow any file or direc...
    Rule Medium Severity
  • Configure the polyinstantiation_enabled SELinux Boolean

    By default, the SELinux boolean <code>polyinstantiation_enabled</code> is disabled. This setting should be configured to <xccdf-1.2:sub idref="xccd...
    Rule Medium Severity
  • Enable the secadm_exec_content SELinux Boolean

    By default, the SELinux boolean <code>secadm_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <cod...
    Rule Medium Severity
  • Disable the secure_mode SELinux Boolean

    By default, the SELinux boolean <code>secure_mode</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>secu...
    Rule Medium Severity
  • Configure the secure_mode_insmod SELinux Boolean

    By default, the SELinux boolean <code>secure_mode_insmod</code> is disabled. This setting should be configured to <xccdf-1.2:sub idref="xccdf_org.s...
    Rule Medium Severity
  • Disable the secure_mode_policyload SELinux Boolean

    By default, the SELinux boolean <code>secure_mode_policyload</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Configure the selinuxuser_direct_dri_enabled SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_direct_dri_enabled</code> is enabled. If XWindows is not installed or used on the system, this se...
    Rule Medium Severity
  • Disable the selinuxuser_execheap SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_execheap</code> is disabled. When enabled this boolean is enabled it allows selinuxusers to execu...
    Rule Medium Severity
  • Enable the selinuxuser_execmod SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_execmod</code> is enabled. If this setting is disabled, it should be enabled. To enable the <cod...
    Rule Medium Severity
  • Disable the selinuxuser_execstack SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_execstack</code> is enabled. This setting should be disabled as unconfined executables should not...
    Rule Medium Severity
  • Disable the selinuxuser_mysql_connect_enabled SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_mysql_connect_enabled</code> is disabled. If this setting is enabled, it should be disabled. To ...
    Rule Medium Severity
  • Enable the selinuxuser_ping SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_ping</code> is enabled. If this setting is disabled, it should be enabled as it allows confined u...
    Rule Medium Severity
  • Disable the selinuxuser_postgresql_connect_enabled SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_postgresql_connect_enabled</code> is disabled. If this setting is enabled, it should be disabled....
    Rule Medium Severity
  • Disable the selinuxuser_rw_noexattrfile SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_rw_noexattrfile</code> is enabled. This setting should be disabled as users should not be able to...
    Rule Medium Severity
  • Disable the selinuxuser_share_music SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_share_music</code> is disabled. If this setting is enabled, it should be disabled. To disable th...
    Rule Medium Severity
  • Disable the selinuxuser_tcp_server SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_tcp_server</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the selinuxuser_udp_server SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_udp_server</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the selinuxuser_use_ssh_chroot SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_use_ssh_chroot</code> is disabled. If this setting is enabled, it should be disabled. To disable...
    Rule Medium Severity
  • Disable the ssh_chroot_rw_homedirs SELinux Boolean

    By default, the SELinux boolean <code>ssh_chroot_rw_homedirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity
  • Disable the ssh_keysign SELinux Boolean

    By default, the SELinux boolean <code>ssh_keysign</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>ssh_...
    Rule Medium Severity
  • Disable the ssh_sysadm_login SELinux Boolean

    By default, the SELinux boolean <code>ssh_sysadm_login</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...
    Rule Medium Severity
  • Enable the staff_exec_content SELinux Boolean

    By default, the SELinux boolean <code>staff_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code...
    Rule Medium Severity
  • Enable the sysadm_exec_content SELinux Boolean

    By default, the SELinux boolean <code>sysadm_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <cod...
    Rule Medium Severity
  • Enable the unconfined_login SELinux Boolean

    By default, the SELinux boolean <code>unconfined_login</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>u...
    Rule Medium Severity
  • Disable the use_ecryptfs_home_dirs SELinux Boolean

    By default, the SELinux boolean <code>use_ecryptfs_home_dirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules