RHV hardening based on STIG for Red Hat Enterprise Linux 7
Rules and Groups employed by this XCCDF Profile
-
Configure the polyinstantiation_enabled SELinux Boolean
By default, the SELinux boolean <code>polyinstantiation_enabled</code> is disabled. This setting should be configured to <xccdf-1.2:sub idref="xccd...Rule Medium Severity -
Enable the secadm_exec_content SELinux Boolean
By default, the SELinux boolean <code>secadm_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <cod...Rule Medium Severity -
Disable the secure_mode SELinux Boolean
By default, the SELinux boolean <code>secure_mode</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>secu...Rule Medium Severity -
Configure the secure_mode_insmod SELinux Boolean
By default, the SELinux boolean <code>secure_mode_insmod</code> is disabled. This setting should be configured to <xccdf-1.2:sub idref="xccdf_org.s...Rule Medium Severity -
Disable the secure_mode_policyload SELinux Boolean
By default, the SELinux boolean <code>secure_mode_policyload</code> is disabled. If this setting is enabled, it should be disabled. To disable the...Rule Medium Severity -
Configure the selinuxuser_direct_dri_enabled SELinux Boolean
By default, the SELinux boolean <code>selinuxuser_direct_dri_enabled</code> is enabled. If XWindows is not installed or used on the system, this se...Rule Medium Severity -
Disable the selinuxuser_execheap SELinux Boolean
By default, the SELinux boolean <code>selinuxuser_execheap</code> is disabled. When enabled this boolean is enabled it allows selinuxusers to execu...Rule Medium Severity -
Enable the selinuxuser_execmod SELinux Boolean
By default, the SELinux boolean <code>selinuxuser_execmod</code> is enabled. If this setting is disabled, it should be enabled. To enable the <cod...Rule Medium Severity -
Disable the selinuxuser_execstack SELinux Boolean
By default, the SELinux boolean <code>selinuxuser_execstack</code> is enabled. This setting should be disabled as unconfined executables should not...Rule Medium Severity -
Disable the selinuxuser_mysql_connect_enabled SELinux Boolean
By default, the SELinux boolean <code>selinuxuser_mysql_connect_enabled</code> is disabled. If this setting is enabled, it should be disabled. To ...Rule Medium Severity -
Enable the selinuxuser_ping SELinux Boolean
By default, the SELinux boolean <code>selinuxuser_ping</code> is enabled. If this setting is disabled, it should be enabled as it allows confined u...Rule Medium Severity -
Disable the selinuxuser_postgresql_connect_enabled SELinux Boolean
By default, the SELinux boolean <code>selinuxuser_postgresql_connect_enabled</code> is disabled. If this setting is enabled, it should be disabled....Rule Medium Severity -
Disable the selinuxuser_rw_noexattrfile SELinux Boolean
By default, the SELinux boolean <code>selinuxuser_rw_noexattrfile</code> is enabled. This setting should be disabled as users should not be able to...Rule Medium Severity -
Disable the selinuxuser_share_music SELinux Boolean
By default, the SELinux boolean <code>selinuxuser_share_music</code> is disabled. If this setting is enabled, it should be disabled. To disable th...Rule Medium Severity -
Disable the selinuxuser_tcp_server SELinux Boolean
By default, the SELinux boolean <code>selinuxuser_tcp_server</code> is disabled. If this setting is enabled, it should be disabled. To disable the...Rule Medium Severity -
Disable the selinuxuser_udp_server SELinux Boolean
By default, the SELinux boolean <code>selinuxuser_udp_server</code> is disabled. If this setting is enabled, it should be disabled. To disable the...Rule Medium Severity -
Disable the selinuxuser_use_ssh_chroot SELinux Boolean
By default, the SELinux boolean <code>selinuxuser_use_ssh_chroot</code> is disabled. If this setting is enabled, it should be disabled. To disable...Rule Medium Severity -
Disable the ssh_chroot_rw_homedirs SELinux Boolean
By default, the SELinux boolean <code>ssh_chroot_rw_homedirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the...Rule Medium Severity -
Disable the ssh_keysign SELinux Boolean
By default, the SELinux boolean <code>ssh_keysign</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>ssh_...Rule Medium Severity -
Disable the ssh_sysadm_login SELinux Boolean
By default, the SELinux boolean <code>ssh_sysadm_login</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...Rule Medium Severity -
Enable the staff_exec_content SELinux Boolean
By default, the SELinux boolean <code>staff_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code...Rule Medium Severity -
Enable the sysadm_exec_content SELinux Boolean
By default, the SELinux boolean <code>sysadm_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <cod...Rule Medium Severity -
Enable the unconfined_login SELinux Boolean
By default, the SELinux boolean <code>unconfined_login</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>u...Rule Medium Severity -
Disable the use_ecryptfs_home_dirs SELinux Boolean
By default, the SELinux boolean <code>use_ecryptfs_home_dirs</code> is disabled. If this setting is enabled, it should be disabled. To disable the...Rule Medium Severity -
Enable the user_exec_content SELinux Boolean
By default, the SELinux boolean <code>user_exec_content</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>...Rule Medium Severity -
Disable the xdm_bind_vnc_tcp_port SELinux Boolean
By default, the SELinux boolean <code>xdm_bind_vnc_tcp_port</code> is disabled. If this setting is enabled, it should be disabled. To disable the ...Rule Medium Severity -
Disable the xdm_exec_bootloader SELinux Boolean
By default, the SELinux boolean <code>xdm_exec_bootloader</code> is disabled. If this setting is enabled, it should be disabled. To disable the <c...Rule Medium Severity -
Disable the xdm_sysadm_login SELinux Boolean
By default, the SELinux boolean <code>xdm_sysadm_login</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...Rule Medium Severity -
Disable the xdm_write_home SELinux Boolean
By default, the SELinux boolean <code>xdm_write_home</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>x...Rule Medium Severity -
Disable the xguest_connect_network SELinux Boolean
By default, the SELinux boolean <code>xguest_connect_network</code> is enabled. This setting should be disabled as guest users should not be able t...Rule Medium Severity -
Disable the xguest_exec_content SELinux Boolean
By default, the SELinux boolean <code>xguest_exec_content</code> is enabled. This setting should be disabled as guest users should not be able to r...Rule Medium Severity -
Disable the xguest_mount_media SELinux Boolean
By default, the SELinux boolean <code>xguest_mount_media</code> is enabled. This setting should be disabled as guest users should not be able to mo...Rule Medium Severity -
Disable the xguest_use_bluetooth SELinux Boolean
By default, the SELinux boolean <code>xguest_use_bluetooth</code> is enabled. This setting should be disabled as guests users should not be able to...Rule Medium Severity -
Disable the xserver_clients_write_xshm SELinux Boolean
By default, the SELinux boolean <code>xserver_clients_write_xshm</code> is disabled. If this setting is enabled, it should be disabled. To disable...Rule Medium Severity -
Disable the xserver_execmem SELinux Boolean
By default, the SELinux boolean <code>xserver_execmem</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>...Rule Medium Severity -
Disable the xserver_object_manager SELinux Boolean
By default, the SELinux boolean <code>xserver_object_manager</code> is disabled. If this setting is enabled, it should be disabled. To disable the...Rule Medium Severity -
Services
The best protection against vulnerable software is running less software. This section describes how to review the software which Red Hat Enterpris...Group -
Base Services
This section addresses the base services that are installed on a Red Hat Enterprise Linux 7 default installation which are not covered in other sec...Group -
Disable KDump Kernel Crash Analyzer (kdump)
The <code>kdump</code> service provides a kernel crash dump analyzer. It uses the <code>kexec</code> system call to boot a secondary kernel ("captu...Rule Medium Severity -
Cron and At Daemons
The cron and at services are used to allow commands to be executed at a later time. The cron service is required by almost all systems to perform n...Group -
Enable cron Service
The <code>crond</code> service is used to execute commands at preconfigured times. It is required by almost all systems to perform necessary mainte...Rule Medium Severity -
Restrict at and cron to Authorized Users if Necessary
The <code>/etc/cron.allow</code> and <code>/etc/at.allow</code> files contain lists of users who are allowed to use <code>cron</code> and at to del...Group -
Verify Group Who Owns /etc/cron.allow file
If <code>/etc/cron.allow</code> exists, it must be group-owned by <code>root</code>. To properly set the group owner of <code>/etc/cron.allow</cod...Rule Medium Severity -
Verify User Who Owns /etc/cron.allow file
If <code>/etc/cron.allow</code> exists, it must be owned by <code>root</code>. To properly set the owner of <code>/etc/cron.allow</code>, run the ...Rule Medium Severity -
FTP Server
FTP is a common method for allowing remote access to files. Like telnet, the FTP protocol is unencrypted, which means that passwords and other data...Group -
Disable vsftpd if Possible
To minimize attack surface, disable vsftpd if at all possible.Group -
Uninstall vsftpd Package
Thevsftpd
package can be removed with the following command:$ sudo yum erase vsftpd
Rule High Severity -
LDAP
LDAP is a popular directory service, that is, a standardized way of looking up information from a central database. Red Hat Enterprise Linux 7 incl...Group -
Configure OpenLDAP Clients
This section provides information on which security settings are important to configure in OpenLDAP clients by manually editing the appropriate con...Group -
Configure LDAP Client to Use TLS For All Transactions
This check verifies cryptography has been implemented to protect the integrity of remote LDAP authentication sessions. <br><br> To determine if LDA...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.