Skip to content

DRAFT - DISA STIG for Red Hat Virtualization Host (RHVH)

Rules and Groups employed by this XCCDF Profile

  • Enable the kerberos_enabled SELinux Boolean

    By default, the SELinux boolean <code>kerberos_enabled</code> is enabled. If this setting is disabled, it should be enabled to allow confined applications to run with Kerberos. To enable the <code...
    Rule Medium Severity
  • Enable the logadm_exec_content SELinux Boolean

    By default, the SELinux boolean <code>logadm_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>logadm_exec_content</code> SELinux boolean, run ...
    Rule Medium Severity
  • Disable the logging_syslogd_can_sendmail SELinux Boolean

    By default, the SELinux boolean <code>logging_syslogd_can_sendmail</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>logging_syslogd_can_sendmail</code> S...
    Rule Medium Severity
  • Enable the logging_syslogd_use_tty SELinux Boolean

    By default, the SELinux boolean <code>logging_syslogd_use_tty</code> is enabled. If this setting is disabled, it should be enabled as it allows <code>syslog</code> the ability to read/write to term...
    Rule Medium Severity
  • Enable the login_console_enabled SELinux Boolean

    By default, the SELinux boolean <code>login_console_enabled</code> is enabled. If this setting is disabled, it should be enabled as it allows login from <code>/dev/console</code> to a console sessi...
    Rule Medium Severity
  • Disable the mmap_low_allowed SELinux Boolean

    By default, the SELinux boolean <code>mmap_low_allowed</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>mmap_low_allowed</code> SELinux boolean, run the ...
    Rule Medium Severity
  • Disable the mock_enable_homedirs SELinux Boolean

    By default, the SELinux boolean <code>mock_enable_homedirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>mock_enable_homedirs</code> SELinux boolean, ...
    Rule Medium Severity
  • Enable the mount_anyfile SELinux Boolean

    By default, the SELinux boolean <code>mount_anyfile</code> is enabled. If this setting is disabled, it should be enabled to allow any file or directory to be mounted. To enable the <code>mount_any...
    Rule Medium Severity
  • Configure the polyinstantiation_enabled SELinux Boolean

    By default, the SELinux boolean <code>polyinstantiation_enabled</code> is disabled. This setting should be configured to <xccdf-1.2:sub idref="xccdf_org.ssgproject.content_value_var_polyinstantiati...
    Rule Medium Severity
  • Enable the secadm_exec_content SELinux Boolean

    By default, the SELinux boolean <code>secadm_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>secadm_exec_content</code> SELinux boolean, run ...
    Rule Medium Severity
  • Disable the secure_mode SELinux Boolean

    By default, the SELinux boolean <code>secure_mode</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>secure_mode</code> SELinux boolean, run the following ...
    Rule Medium Severity
  • Configure the secure_mode_insmod SELinux Boolean

    By default, the SELinux boolean <code>secure_mode_insmod</code> is disabled. This setting should be configured to <xccdf-1.2:sub idref="xccdf_org.ssgproject.content_value_var_secure_mode_insmod" us...
    Rule Medium Severity
  • Disable the secure_mode_policyload SELinux Boolean

    By default, the SELinux boolean <code>secure_mode_policyload</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>secure_mode_policyload</code> SELinux boole...
    Rule Medium Severity
  • Configure the selinuxuser_direct_dri_enabled SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_direct_dri_enabled</code> is enabled. If XWindows is not installed or used on the system, this setting should be disabled. Otherwise, enable it. T...
    Rule Medium Severity
  • Disable the selinuxuser_execheap SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_execheap</code> is disabled. When enabled this boolean is enabled it allows selinuxusers to execute code from the heap. If this setting is enabled,...
    Rule Medium Severity
  • Enable the selinuxuser_execmod SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_execmod</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>selinuxuser_execmod</code> SELinux boolean, run ...
    Rule Medium Severity
  • Disable the selinuxuser_execstack SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_execstack</code> is enabled. This setting should be disabled as unconfined executables should not be able to make their stack executable. To disab...
    Rule Medium Severity
  • Disable the selinuxuser_mysql_connect_enabled SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_mysql_connect_enabled</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>selinuxuser_mysql_connect_enable...
    Rule Medium Severity
  • Enable the selinuxuser_ping SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_ping</code> is enabled. If this setting is disabled, it should be enabled as it allows confined users to use ping and traceroute which is helpful f...
    Rule Medium Severity
  • Disable the selinuxuser_postgresql_connect_enabled SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_postgresql_connect_enabled</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>selinuxuser_postgresql_conn...
    Rule Medium Severity
  • Disable the selinuxuser_rw_noexattrfile SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_rw_noexattrfile</code> is enabled. This setting should be disabled as users should not be able to read/write files on filesystems that do not have ...
    Rule Medium Severity
  • Disable the selinuxuser_share_music SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_share_music</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>selinuxuser_share_music</code> SELinux boo...
    Rule Medium Severity
  • Disable the selinuxuser_tcp_server SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_tcp_server</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>selinuxuser_tcp_server</code> SELinux boole...
    Rule Medium Severity
  • Disable the selinuxuser_udp_server SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_udp_server</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>selinuxuser_udp_server</code> SELinux boole...
    Rule Medium Severity
  • Disable the selinuxuser_use_ssh_chroot SELinux Boolean

    By default, the SELinux boolean <code>selinuxuser_use_ssh_chroot</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>selinuxuser_use_ssh_chroot</code> SELin...
    Rule Medium Severity
  • Disable the ssh_chroot_rw_homedirs SELinux Boolean

    By default, the SELinux boolean <code>ssh_chroot_rw_homedirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>ssh_chroot_rw_homedirs</code> SELinux boole...
    Rule Medium Severity
  • Disable the ssh_keysign SELinux Boolean

    By default, the SELinux boolean <code>ssh_keysign</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>ssh_keysign</code> SELinux boolean, run the following ...
    Rule Medium Severity
  • Disable the ssh_sysadm_login SELinux Boolean

    By default, the SELinux boolean <code>ssh_sysadm_login</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>ssh_sysadm_login</code> SELinux boolean, run the ...
    Rule Medium Severity
  • Enable the staff_exec_content SELinux Boolean

    By default, the SELinux boolean <code>staff_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>staff_exec_content</code> SELinux boolean, run th...
    Rule Medium Severity
  • Enable the sysadm_exec_content SELinux Boolean

    By default, the SELinux boolean <code>sysadm_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>sysadm_exec_content</code> SELinux boolean, run ...
    Rule Medium Severity
  • Enable the unconfined_login SELinux Boolean

    By default, the SELinux boolean <code>unconfined_login</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>unconfined_login</code> SELinux boolean, run the fo...
    Rule Medium Severity
  • Disable the use_ecryptfs_home_dirs SELinux Boolean

    By default, the SELinux boolean <code>use_ecryptfs_home_dirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>use_ecryptfs_home_dirs</code> SELinux boole...
    Rule Medium Severity
  • Enable the user_exec_content SELinux Boolean

    By default, the SELinux boolean <code>user_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>user_exec_content</code> SELinux boolean, run the ...
    Rule Medium Severity
  • Disable the xdm_bind_vnc_tcp_port SELinux Boolean

    By default, the SELinux boolean <code>xdm_bind_vnc_tcp_port</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>xdm_bind_vnc_tcp_port</code> SELinux boolean...
    Rule Medium Severity
  • Disable the xdm_exec_bootloader SELinux Boolean

    By default, the SELinux boolean <code>xdm_exec_bootloader</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>xdm_exec_bootloader</code> SELinux boolean, ru...
    Rule Medium Severity
  • Disable the xdm_sysadm_login SELinux Boolean

    By default, the SELinux boolean <code>xdm_sysadm_login</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>xdm_sysadm_login</code> SELinux boolean, run the ...
    Rule Medium Severity
  • Disable the xdm_write_home SELinux Boolean

    By default, the SELinux boolean <code>xdm_write_home</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>xdm_write_home</code> SELinux boolean, run the foll...
    Rule Medium Severity
  • Disable the xguest_connect_network SELinux Boolean

    By default, the SELinux boolean <code>xguest_connect_network</code> is enabled. This setting should be disabled as guest users should not be able to configure <code>NetworkManager</code>. To disab...
    Rule Medium Severity
  • Disable the xguest_exec_content SELinux Boolean

    By default, the SELinux boolean <code>xguest_exec_content</code> is enabled. This setting should be disabled as guest users should not be able to run executables. To disable the <code>xguest_exec_...
    Rule Medium Severity
  • Disable the xguest_mount_media SELinux Boolean

    By default, the SELinux boolean <code>xguest_mount_media</code> is enabled. This setting should be disabled as guest users should not be able to mount any media. To disable the <code>xguest_mount_...
    Rule Medium Severity
  • Disable the xguest_use_bluetooth SELinux Boolean

    By default, the SELinux boolean <code>xguest_use_bluetooth</code> is enabled. This setting should be disabled as guests users should not be able to access or use bluetooth. To disable the <code>xg...
    Rule Medium Severity
  • Disable the xserver_clients_write_xshm SELinux Boolean

    By default, the SELinux boolean <code>xserver_clients_write_xshm</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>xserver_clients_write_xshm</code> SELin...
    Rule Medium Severity
  • Disable the xserver_execmem SELinux Boolean

    By default, the SELinux boolean <code>xserver_execmem</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>xserver_execmem</code> SELinux boolean, run the fo...
    Rule Medium Severity
  • Disable the xserver_object_manager SELinux Boolean

    By default, the SELinux boolean <code>xserver_object_manager</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>xserver_object_manager</code> SELinux boole...
    Rule Medium Severity
  • Services

    The best protection against vulnerable software is running less software. This section describes how to review the software which Red Hat Virtualization 4 installs on a system and disable software ...
    Group
  • Base Services

    This section addresses the base services that are installed on a Red Hat Virtualization 4 default installation which are not covered in other sections. Some of these services listen on the network ...
    Group
  • Disable KDump Kernel Crash Analyzer (kdump)

    The <code>kdump</code> service provides a kernel crash dump analyzer. It uses the <code>kexec</code> system call to boot a secondary kernel ("capture" kernel) following a system crash, which can lo...
    Rule Medium Severity
  • Cron and At Daemons

    The cron and at services are used to allow commands to be executed at a later time. The cron service is required by almost all systems to perform necessary maintenance tasks, while at may or may no...
    Group
  • Enable cron Service

    The <code>crond</code> service is used to execute commands at preconfigured times. It is required by almost all systems to perform necessary maintenance tasks, such as notifying root of system acti...
    Rule Medium Severity
  • Restrict at and cron to Authorized Users if Necessary

    The <code>/etc/cron.allow</code> and <code>/etc/at.allow</code> files contain lists of users who are allowed to use <code>cron</code> and at to delay execution of processes. If these files exist an...
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules