Guide to the Secure Configuration of Red Hat Enterprise Linux 9
with profile CIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - ServerThis profile defines a baseline that aligns to the "Level 2 - Server" configuration from the Center for Internet Security® Red Hat Enterprise Linux 9 Benchmark™, v1.0.0, released 2022-11-28. This profile includes Center for Internet Security® Red Hat Enterprise Linux 9 CIS Benchmarks™ content.
https://www.open-scap.org/security-policies/scap-security-guide
scap-security-guide
package which is developed at
https://www.open-scap.org/security-policies/scap-security-guide.
Providing system administrators with such guidance informs them how to securely configure systems under their control in a variety of network roles. Policy makers and baseline creators can use this catalog of settings, with its associated references to higher-level security control catalogs, in order to assist them in security baseline creation. This guide is a catalog, not a checklist, and satisfaction of every item is not likely to be possible or sensible in many operational scenarios. However, the XCCDF format enables granular selection and adjustment of settings, and their association with OVAL and OCIL content provides an automated checking capability. Transformations of this document, and its associated automated checking content, are capable of providing baselines that meet a diverse set of policy objectives. Some example XCCDF Profiles, which are selections of items that form checklists and can be used as baselines, are available with this guide. They can be processed, in an automated fashion, with tools that support the Security Content Automation Protocol (SCAP). The DISA STIG, which provides required settings for US Department of Defense systems, is one example of a baseline created from this guidance.
Evaluation Characteristics
Evaluation target | 6bd1fded-7e25-496f-862d-895caa20a385.testing-farm.us-east-1.aws.redhat.com |
---|---|
Benchmark URL | #scap_org.open-scap_comp_ssg-rhel9-xccdf.xml |
Benchmark ID | xccdf_org.ssgproject.content_benchmark_RHEL-9 |
Benchmark version | 0.1.69 |
Profile ID | xccdf_org.ssgproject.content_profile_cis |
Started at | 2024-03-08T16:34:42-05:00 |
Finished at | 2024-03-08T16:35:12-05:00 |
Performed by | root |
Test system | cpe:/a:redhat:openscap:1.3.8 |
CPE Platforms
- cpe:/o:redhat:enterprise_linux:9
Addresses
- IPv4 127.0.0.1
- IPv4 10.31.42.34
- IPv6 0:0:0:0:0:0:0:1
- IPv6 fe80:0:0:0:c3e:e8ff:feaa:30e1
- MAC 00:00:00:00:00:00
- MAC 0E:3E:E8:AA:30:E1
Compliance and Scoring
Rule results
Severity of failed rules
Score
Scoring system | Score | Maximum | Percent |
---|---|---|---|
urn:xccdf:scoring:default | 94.388229 | 100.000000 |
Rule Overview
Result Details
Install AIDE
Rule ID | xccdf_org.ssgproject.content_rule_package_aide_installed |
Result | pass |
Multi-check rule | no |
OVAL Definition ID | oval:ssg-package_aide_installed:def:1 |
Time | 2024-03-08T16:34:42-05:00 |
Severity | medium |
Identifiers and References | Identifiers: CCE-90843-4 References: BP28(R51), 1, 11, 12, 13, 14, 15, 16, 2, 3, 5, 7, 8, 9, 5.10.1.3, APO01.06, BAI01.06, BAI02.01, BAI03.05, BAI06.01, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS01.03, DSS03.05, DSS04.07, DSS05.02, DSS05.03, DSS05.05, DSS05.07, DSS06.02, DSS06.06, CCI-002696, CCI-002699, CCI-001744, 4.3.4.3.2, 4.3.4.3.3, 4.3.4.4.4, SR 3.1, SR 3.3, SR 3.4, SR 3.8, SR 4.1, SR 6.2, SR 7.6, 1034, 1288, 1341, 1417, A.11.2.4, A.12.1.2, A.12.2.1, A.12.4.1, A.12.5.1, A.12.6.2, A.14.1.2, A.14.1.3, A.14.2.2, A.14.2.3, A.14.2.4, A.14.2.7, A.15.2.1, A.8.2.3, CM-6(a), DE.CM-1, DE.CM-7, PR.DS-1, PR.DS-6, PR.DS-8, PR.IP-1, PR.IP-3, Req-11.5, 11.5.2, SRG-OS-000445-GPOS-00199, 1.3.1 |
Description | The aide package can be installed with the following command:
$ sudo dnf install aide |
Rationale | The AIDE package must be installed if it is to be available for integrity checking. |
package aide is installed oval:ssg-test_package_aide_installed:tst:1 true
Following items have been found on the system:
Name | Arch | Epoch | Release | Version | Evr | Signature keyid | Extended name |
---|---|---|---|---|---|---|---|
aide | x86_64 | (none) | 100.el9 | 0.16 | 0:0.16-100.el9 | 199e2f91fd431d51 | aide-0:0.16-100.el9.x86_64 |
Build and Test AIDE Database
Rule ID | xccdf_org.ssgproject.content_rule_aide_build_database |
Result | pass |
Multi-check rule | no |
OVAL Definition ID | oval:ssg-aide_build_database:def:1 |
Time | 2024-03-08T16:34:42-05:00 |
Severity | medium |
Identifiers and References | Identifiers: CCE-83438-2 References: BP28(R51), 1, 11, 12, 13, 14, 15, 16, 2, 3, 5, 7, 8, 9, 5.10.1.3, APO01.06, BAI01.06, BAI02.01, BAI03.05, BAI06.01, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS01.03, DSS03.05, DSS04.07, DSS05.02, DSS05.03, DSS05.05, DSS05.07, DSS06.02, DSS06.06, 4.3.4.3.2, 4.3.4.3.3, 4.3.4.4.4, SR 3.1, SR 3.3, SR 3.4, SR 3.8, SR 4.1, SR 6.2, SR 7.6, A.11.2.4, A.12.1.2, A.12.2.1, A.12.4.1, A.12.5.1, A.12.6.2, A.14.1.2, A.14.1.3, A.14.2.2, A.14.2.3, A.14.2.4, A.14.2.7, A.15.2.1, A.8.2.3, CM-6(a), DE.CM-1, DE.CM-7, PR.DS-1, PR.DS-6, PR.DS-8, PR.IP-1, PR.IP-3, Req-11.5, 11.5.2, SRG-OS-000445-GPOS-00199, 1.3.1 |
Description | Run the following command to generate a new database:
$ sudo /usr/sbin/aide --initBy default, the database will be written to the file /var/lib/aide/aide.db.new.gz .
Storing the database, the configuration file /etc/aide.conf , and the binary
/usr/sbin/aide
(or hashes of these files), in a secure location (such as on read-only media) provides additional assurance about their integrity.
The newly-generated database can be installed as follows:
$ sudo cp /var/lib/aide/aide.db.new.gz /var/lib/aide/aide.db.gzTo initiate a manual check, run the following command: $ sudo /usr/sbin/aide --checkIf this check produces any unexpected output, investigate. |
Rationale | For AIDE to be effective, an initial database of "known-good" information about files
must be captured and it should be able to be verified against the installed files. |
package aide is installed oval:ssg-test_package_aide_installed:tst:1 true
Following items have been found on the system:
Name | Arch | Epoch | Release | Version | Evr | Signature keyid | Extended name |
---|---|---|---|---|---|---|---|
aide | x86_64 | (none) | 100.el9 | 0.16 | 0:0.16-100.el9 | 199e2f91fd431d51 | aide-0:0.16-100.el9.x86_64 |
Testing existence of operational aide database file oval:ssg-test_aide_operational_database_absolute_path:tst:1 true
Following items have been found on the system:
Path | Type | UID | GID | Size (B) | Permissions |
---|---|---|---|---|---|
/var/lib/aide/aide.db.gz | regular | 0 | 0 | 2383286 | rw------- |
Configure AIDE to Verify the Audit Tools
Rule ID | xccdf_org.ssgproject.content_rule_aide_check_audit_tools |
Result | pass |
Multi-check rule | no |
OVAL Definition ID | oval:ssg-aide_check_audit_tools:def:1 |
Time | 2024-03-08T16:34:42-05:00 |
Severity | medium |
Identifiers and References | Identifiers: CCE-87757-1 References: CCI-001496, AU-9(3), AU-9(3).1, SRG-OS-000278-GPOS-00108, 1.3.3 |
Description | The operating system file integrity tool must be configured to protect the integrity of the audit tools. |
Rationale | Protecting the integrity of the tools used for auditing purposes is a
critical step toward ensuring the integrity of audit information. Audit
information includes all information (e.g., audit records, audit settings,
and audit reports) needed to successfully audit information system
activity.
Audit tools include but are not limited to vendor-provided and open-source
audit tools needed to successfully view and manipulate audit information
system activity and records. Audit tools include custom queries and report
generators.
It is not uncommon for attackers to replace the audit tools or inject code
into the existing tools to provide the capability to hide or erase system
activity from the audit logs.
To address this risk, audit tools must be cryptographically signed to
provide the capability to identify when the audit tools have been modified,
manipulated, or replaced. An example is a checksum hash of the file or
files. |
package aide is installed oval:ssg-test_package_aide_installed:tst:1 true
Following items have been found on the system:
Name | Arch | Epoch | Release | Version | Evr | Signature keyid | Extended name |
---|---|---|---|---|---|---|---|
aide | x86_64 | (none) | 100.el9 | 0.16 | 0:0.16-100.el9 | 199e2f91fd431d51 | aide-0:0.16-100.el9.x86_64 |
auditctl is checked in /etc/aide.conf oval:ssg-test_aide_verify_auditctl:tst:1 true
Following items have been found on the system:
Path | Content |
---|---|
/etc/aide.conf | /usr/sbin/auditctl p+i+n+u+g+s+b+acl+xattrs+sha512 |
auditd is checked in /etc/aide.conf oval:ssg-test_aide_verify_auditd:tst:1 true
Following items have been found on the system:
Path | Content |
---|---|
/etc/aide.conf | /usr/sbin/auditd p+i+n+u+g+s+b+acl+xattrs+sha512 |
ausearch is checked in /etc/aide.conf oval:ssg-test_aide_verify_ausearch:tst:1 true
Following items have been found on the system:
Path | Content |
---|---|
/etc/aide.conf | /usr/sbin/ausearch p+i+n+u+g+s+b+acl+xattrs+sha512 |
aureport is checked in /etc/aide.conf oval:ssg-test_aide_verify_aureport:tst:1 true
Following items have been found on the system:
Path | Content |
---|---|
/etc/aide.conf | /usr/sbin/aureport p+i+n+u+g+s+b+acl+xattrs+sha512 |
autrace is checked in /etc/aide.conf oval:ssg-test_aide_verify_autrace:tst:1 true
Following items have been found on the system:
Path | Content |
---|---|
/etc/aide.conf | /usr/sbin/autrace p+i+n+u+g+s+b+acl+xattrs+sha512 |
rsyslogd is checked in /etc/aide.conf oval:ssg-test_aide_verify_rsyslogd:tst:1 true
Following items have been found on the system:
Path | Content |
---|---|
/etc/aide.conf | /usr/sbin/rsyslogd p+i+n+u+g+s+b+acl+xattrs+sha512 |
augenrules is checked in /etc/aide.conf oval:ssg-test_aide_verify_augenrules:tst:1 true
Following items have been found on the system:
Path | Content |
---|---|
/etc/aide.conf | /usr/sbin/augenrules p+i+n+u+g+s+b+acl+xattrs+sha512 |
Configure Periodic Execution of AIDE
Rule ID | xccdf_org.ssgproject.content_rule_aide_periodic_cron_checking |
Result | pass |
Multi-check rule | no |
OVAL Definition ID | oval:ssg-aide_periodic_cron_checking:def:1 |
Time | 2024-03-08T16:34:42-05:00 |
Severity | medium |
Identifiers and References | Identifiers: CCE-83437-4 References: BP28(R51), 1, 11, 12, 13, 14, 15, 16, 2, 3, 5, 7, 8, 9, 5.10.1.3, APO01.06, BAI01.06, BAI02.01, BAI03.05, BAI06.01, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS01.03, DSS03.05, DSS04.07, DSS05.02, DSS05.03, DSS05.05, DSS05.07, DSS06.02, DSS06.06, CCI-001744, CCI-002699, CCI-002702, 4.3.4.3.2, 4.3.4.3.3, 4.3.4.4.4, SR 3.1, SR 3.3, SR 3.4, SR 3.8, SR 4.1, SR 6.2, SR 7.6, A.11.2.4, A.12.1.2, A.12.2.1, A.12.4.1, A.12.5.1, A.12.6.2, A.14.1.2, A.14.1.3, A.14.2.2, A.14.2.3, A.14.2.4, A.14.2.7, A.15.2.1, A.8.2.3, SI-7, SI-7(1), CM-6(a), DE.CM-1, DE.CM-7, PR.DS-1, PR.DS-6, PR.DS-8, PR.IP-1, PR.IP-3, Req-11.5, 11.5.2, SRG-OS-000363-GPOS-00150, SRG-OS-000446-GPOS-00200, SRG-OS-000447-GPOS-00201, 1.3.2 |
Description | At a minimum, AIDE should be configured to run a weekly scan.
To implement a daily execution of AIDE at 4:05am using cron, add the following line to /etc/crontab :
05 4 * * * root /usr/sbin/aide --checkTo implement a weekly execution of AIDE at 4:05am using cron, add the following line to /etc/crontab :
05 4 * * 0 root /usr/sbin/aide --checkAIDE can be executed periodically through other means; this is merely one example. The usage of cron's special time codes, such as @daily and
@weekly is acceptable. |
Rationale | By default, AIDE does not install itself for periodic execution. Periodically
running AIDE is necessary to reveal unexpected changes in installed files.
Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized access to the operating system. Changes to operating system configurations can have unintended side effects, some of which may be relevant to security. Detecting such changes and providing an automated response can help avoid unintended, negative consequences that could ultimately affect the security state of the operating system. The operating system's Information Management Officer (IMO)/Information System Security Officer (ISSO) and System Administrators (SAs) must be notified via email and/or monitoring system trap when there is an unauthorized modification of a configuration item. |
package aide is installed oval:ssg-test_package_aide_installed:tst:1 true
Following items have been found on the system:
Name | Arch | Epoch | Release | Version | Evr | Signature keyid | Extended name |
---|---|---|---|---|---|---|---|
aide | x86_64 | (none) | 100.el9 | 0.16 | 0:0.16-100.el9 | 199e2f91fd431d51 | aide-0:0.16-100.el9.x86_64 |
run aide with cron oval:ssg-test_aide_periodic_cron_checking:tst:1 true
Following items have been found on the system:
Path | Content |
---|---|
/etc/crontab | 05 4 * * * root /usr/sbin/aide --check |
run aide with cron oval:ssg-test_aide_crond_checking:tst:1 false
No items have been found conforming to the following objects:
Object oval:ssg-object_test_aide_crond_checking:obj:1 of type textfilecontent54_object
Path | Filename | Pattern | Instance |
---|---|---|---|
/etc/cron.d | ^.*$ | ^(([0-9]*[\s]*[0-9]*[\s]*\*[\s]*\*[\s]*(\*|([0-7]|mon|tue|wed|thu|fri|sat|sun)|[0-7]-[0-7]))|@(hourly|daily|weekly))[\s]*root[\s]*\/usr\/sbin\/aide[\s]*\-\-check.*$ | 1 |
run aide with cron oval:ssg-test_aide_var_cron_checking:tst:1 false
No items have been found conforming to the following objects:
Object oval:ssg-object_aide_var_cron_checking:obj:1 of type textfilecontent54_object
Filepath | Pattern | Instance |
---|---|---|
/var/spool/cron/root | ^(([0-9]*[\s]*[0-9]*[\s]*\*[\s]*\*[\s]*(\*|([0-7]|mon|tue|wed|thu|fri|sat|sun)|[0-7]-[0-7]))|@(hourly|daily|weekly))[\s]*(root)?[\s]*\/usr\/sbin\/aide[\s]*\-\-check.*$ | 1 |
run aide with cron.(daily|weekly) oval:ssg-test_aide_crontabs_checking:tst:1 false
No items have been found conforming to the following objects:
Object oval:ssg-object_aide_crontabs_checking:obj:1 of type textfilecontent54_object
Path | Filename | Pattern | Instance |
---|---|---|---|
^/etc/cron.(daily|weekly)$ | ^.*$ | ^[^#]*\/usr\/sbin\/aide\s+\-\-check\s*$ | 1 |
Configure System Cryptography Policy
Rule ID | xccdf_org.ssgproject.content_rule_configure_crypto_policy |
Result | pass |
Multi-check rule | no |
OVAL Definition ID | oval:ssg-configure_crypto_policy:def:1 |
Time | 2024-03-08T16:34:42-05:00 |
Severity | high |
Identifiers and References | Identifiers: CCE-83450-7 References: A.5.SEC-RHEL4, 164.308(a)(4)(i), 164.308(b)(1), 164.308(b)(3), 164.312(e)(1), 164.312(e)(2)(ii), 1446, CIP-003-8 R4.2, CIP-007-3 R5.1, CIP-007-3 R7.1, AC-17(a), AC-17(2), CM-6(a), MA-4(6), SC-13, SC-12(2), SC-12(3), FCS_COP.1(1), FCS_COP.1(2), FCS_COP.1(3), FCS_COP.1(4), FCS_CKM.1, FCS_CKM.2, FCS_TLSC_EXT.1, SRG-OS-000396-GPOS-00176, SRG-OS-000393-GPOS-00173, SRG-OS-000394-GPOS-00174, 1.10 |
Description | To configure the system cryptography policy to use ciphers only from the DEFAULT
policy, run the following command:
$ sudo update-crypto-policies --set DEFAULTThe rule checks if settings for selected crypto policy are configured as expected. Configuration files in the /etc/crypto-policies/back-ends are either symlinks to correct files provided by Crypto-policies package or they are regular files in case crypto policy customizations are applied.
Crypto policies may be customized by crypto policy modules, in which case it is delimited from the base policy using a colon. |
Rationale | Centralized cryptographic policies simplify applying secure ciphers across an operating system and
the applications that run on that operating system. Use of weak or untested encryption algorithms
undermines the purposes of utilizing encryption to protect data. |
Warnings | warning
The system needs to be rebooted for these changes to take effect. warning
System Crypto Modules must be provided by a vendor that undergoes
FIPS-140 certifications.
FIPS-140 is applicable to all Federal agencies that use
cryptographic-based security systems to protect sensitive information
in computer and telecommunication systems (including voice systems) as
defined in Section 5131 of the Information Technology Management Reform
Act of 1996, Public Law 104-106. This standard shall be used in
designing and implementing cryptographic modules that Federal
departments and agencies operate or are operated for them under
contract. See https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-2.pdf
To meet this, the system has to have cryptographic software provided by
a vendor that has undergone this certification. This means providing
documentation, test results, design information, and independent third
party review by an accredited lab. While open source software is
capable of meeting this, it does not meet FIPS-140 unless the vendor
submits to this process. |
check for crypto policy correctly configured in /etc/crypto-policies/config oval:ssg-test_configure_crypto_policy:tst:1 true
Following items have been found on the system:
Path | Content |
---|---|
/etc/crypto-policies/config | DEFAULT |
check for crypto policy correctly configured in /etc/crypto-policies/state/current oval:ssg-test_configure_crypto_policy_current:tst:1 true
Following items have been found on the system:
Path | Content |
---|---|
/etc/crypto-policies/state/current | DEFAULT |
Check if update-crypto-policies has been run oval:ssg-test_crypto_policies_updated:tst:1 true
Following items have been found on the system:
Var ref | Value |
---|---|
oval:ssg-variable_crypto_policies_config_file_timestamp:var:1 | 1709801564 |
Check if /etc/crypto-policies/back-ends/nss.config exists oval:ssg-test_crypto_policy_nss_config:tst:1 true
Following items have been found on the system:
Path | Type | UID | GID | Size (B) | Permissions |
---|---|---|---|---|---|
/etc/crypto-policies/back-ends/nss.config | symbolic link | 0 | 0 | 42 | rwxrwxrwx |
Configure SSH to use System Crypto Policy
Rule ID | xccdf_org.ssgproject.content_rule_configure_ssh_crypto_policy |
Result | pass |
Multi-check rule | no |
OVAL Definition ID | oval:ssg-configure_ssh_crypto_policy:def:1 |
Time | 2024-03-08T16:34:42-05:00 |
Severity | medium |
Identifiers and References | Identifiers: CCE-83445-7 References: A.5.SEC-RHEL6, A.11.SEC-RHEL6, CCI-001453, 164.308(a)(4)(i), 164.308(b)(1), 164.308(b)(3), 164.312(e)(1), 164.312(e)(2)(ii), CIP-003-8 R4.2, CIP-007-3 R5.1, CIP-007-3 R7.1, AC-17(a), AC-17(2), CM-6(a), MA-4(6), SC-13, FCS_SSH_EXT.1, FCS_SSHS_EXT.1, FCS_SSHC_EXT.1, Req-2.2, 2.2, SRG-OS-000250-GPOS-00093, 5.2.14 |
Description | Crypto Policies provide a centralized control over crypto algorithms usage of many packages.
SSH is supported by crypto policy, but the SSH configuration may be
set up to ignore it.
To check that Crypto Policies settings are configured correctly, ensure that
the CRYPTO_POLICY variable is either commented or not set at all
in the /etc/sysconfig/sshd . |
Rationale | Overriding the system crypto policy makes the behavior of the SSH service violate expectations,
and makes system configuration more fragmented. |
Check that the SSH configuration mandates usage of system-wide crypto policies. oval:ssg-test_configure_ssh_crypto_policy:tst:1 true
No items have been found conforming to the following objects:
Object oval:ssg-object_configure_ssh_crypto_policy:obj:1 of type textfilecontent54_object
Filepath | Pattern | Instance |
---|---|---|
/etc/sysconfig/sshd | ^\s*(?i)CRYPTO_POLICY\s*=.*$ | 1 |
Ensure /dev/shm is configured
Rule ID | xccdf_org.ssgproject.content_rule_partition_for_dev_shm |
Result | pass |
Multi-check rule | no |
OVAL Definition ID | oval:ssg-partition_for_dev_shm:def:1 |
Time | 2024-03-08T16:34:42-05:00 |
Severity | low |
Identifiers and References | Identifiers: CCE-86283-9 References: 1.1.8.1 |
Description | The /dev/shm is a traditional shared memory concept.
One program will create a memory portion, which other processes
(if permitted) can access. If /dev/shm is not configured,
tmpfs will be mounted to /dev/shm by systemd. |
Rationale | Any user can upload and execute files inside the /dev/shm similar to
the /tmp partition. Configuring /dev/shm allows an administrator
to set the noexec option on the mount, making /dev/shm useless for an attacker to
install executable code. It would also prevent an attacker from establishing a
hardlink to a system setuid program and wait for it to be updated. Once the program
was updated, the hardlink would be broken and the attacker would have his own copy
of the program. If the program happened to have a security vulnerability, the attacker
could continue to exploit the known flaw. |
/dev/shm on own partition oval:ssg-testdev_shm_partition:tst:1 true
Following items have been found on the system:
Mount point | Device | Uuid | Fs type | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Total space | Space used | Space left |
---|---|---|---|---|---|---|---|---|---|---|---|---|
/dev/shm | tmpfs | tmpfs | rw | seclabel | nosuid | nodev | noexec | inode64 | 450753 | 0 | 450753 |
Ensure /home Located On Separate Partition
Rule ID | xccdf_org.ssgproject.content_rule_partition_for_home |
Result | pass |
Multi-check rule | no |
OVAL Definition ID | oval:ssg-partition_for_home:def:1 |
Time | 2024-03-08T16:34:42-05:00 |
Severity | low |
Identifiers and References | Identifiers: CCE-83468-9 References: BP28(R12), 12, 15, 8, APO13.01, DSS05.02, CCI-000366, CCI-001208, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 7.1, SR 7.6, A.13.1.1, A.13.2.1, A.14.1.3, CM-6(a), SC-5(2), PR.PT-4, SRG-OS-000480-GPOS-00227, 1.1.7.1 |
Description | If user home directories will be stored locally, create a separate partition
for /home at installation time (or migrate it later using LVM). If
/home will be mounted from another system such as an NFS server, then
creating a separate partition is not necessary at installation time, and the
mountpoint can instead be configured later. |
Rationale | Ensuring that /home is mounted on its own partition enables the
setting of more restrictive mount options, and also helps ensure that
users cannot trivially fill partitions used for log or audit data storage. |
/home on own partition oval:ssg-testhome_partition:tst:1 true
Following items have been found on the system:
Mount point | Device | Uuid | Fs type | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Total space | Space used | Space left |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
/home | /dev/mapper/rootvg-homelv | b0d67ecb-7668-482f-8df5-5f82c446a486 | xfs | rw | seclabel | nosuid | nodev | relatime | attr2 | inode64 | logbufs=8 | logbsize=32k | noquota | bind | 245760 | 9989 | 235771 |
Ensure /tmp Located On Separate Partition
Rule ID | xccdf_org.ssgproject.content_rule_partition_for_tmp |
Result | pass |
Multi-check rule | no |
OVAL Definition ID | oval:ssg-partition_for_tmp:def:1 |
Time | 2024-03-08T16:34:42-05:00 |
Severity | low |
Identifiers and References | Identifiers: CCE-90845-9 References: BP28(R12), 12, 15, 8, APO13.01, DSS05.02, CCI-000366, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 7.1, SR 7.6, A.13.1.1, A.13.2.1, A.14.1.3, CM-6(a), SC-5(2), PR.PT-4, SRG-OS-000480-GPOS-00227, 1.1.2.1 |
Description | The /tmp directory is a world-writable directory used
for temporary file storage. Ensure it has its own partition or
logical volume at installation time, or migrate it using LVM. |
Rationale | The /tmp partition is used as temporary storage by many programs.
Placing /tmp in its own partition enables the setting of more
restrictive mount options, which can help protect programs which use it. |
/tmp on own partition oval:ssg-testtmp_partition:tst:1 true
Following items have been found on the system:
Mount point | Device | Uuid | Fs type | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Mount options | Total space | Space used | Space left |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
/tmp | /dev/mapper/rootvg-tmplv | 9005a527-1e18-4ac1-9a7c-acc64406fe43 | xfs | rw | seclabel | nosuid | nodev | noexec | relatime | attr2 | inode64 | logbufs=8 | logbsize=32k | noquota | bind | 245760 | 10002 | 235758 |
Ensure /var Located On Separate Partition
Rule ID | xccdf_org.ssgproject.content_rule_partition_for_var |
Result | pass |
Multi-check rule | no |
OVAL Definition ID | oval:ssg-partition_for_var:def:1 |
Time | 2024-03 |