Guide to the Secure Configuration of Red Hat Enterprise Linux 8
with profile DISA STIG for Red Hat Enterprise Linux 8This profile contains configuration checks that align to the DISA STIG for Red Hat Enterprise Linux 8 V1R14. In addition to being applicable to Red Hat Enterprise Linux 8, DISA recognizes this configuration baseline as applicable to the operating system tier of Red Hat technologies that are based on Red Hat Enterprise Linux 8, such as: - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux 8 image
The SCAP Security Guide Project
https://www.open-scap.org/security-policies/scap-security-guide
https://www.open-scap.org/security-policies/scap-security-guide
This guide presents a catalog of security-relevant
configuration settings for Red Hat Enterprise Linux 8. It is a rendering of
content structured in the eXtensible Configuration Checklist Description Format (XCCDF)
in order to support security automation. The SCAP content is
is available in the
Providing system administrators with such guidance informs them how to securely configure systems under their control in a variety of network roles. Policy makers and baseline creators can use this catalog of settings, with its associated references to higher-level security control catalogs, in order to assist them in security baseline creation. This guide is a catalog, not a checklist, and satisfaction of every item is not likely to be possible or sensible in many operational scenarios. However, the XCCDF format enables granular selection and adjustment of settings, and their association with OVAL and OCIL content provides an automated checking capability. Transformations of this document, and its associated automated checking content, are capable of providing baselines that meet a diverse set of policy objectives. Some example XCCDF Profiles, which are selections of items that form checklists and can be used as baselines, are available with this guide. They can be processed, in an automated fashion, with tools that support the Security Content Automation Protocol (SCAP). The DISA STIG, which provides required settings for US Department of Defense systems, is one example of a baseline created from this guidance.
scap-security-guide
package which is developed at
https://www.open-scap.org/security-policies/scap-security-guide.
Providing system administrators with such guidance informs them how to securely configure systems under their control in a variety of network roles. Policy makers and baseline creators can use this catalog of settings, with its associated references to higher-level security control catalogs, in order to assist them in security baseline creation. This guide is a catalog, not a checklist, and satisfaction of every item is not likely to be possible or sensible in many operational scenarios. However, the XCCDF format enables granular selection and adjustment of settings, and their association with OVAL and OCIL content provides an automated checking capability. Transformations of this document, and its associated automated checking content, are capable of providing baselines that meet a diverse set of policy objectives. Some example XCCDF Profiles, which are selections of items that form checklists and can be used as baselines, are available with this guide. They can be processed, in an automated fashion, with tools that support the Security Content Automation Protocol (SCAP). The DISA STIG, which provides required settings for US Department of Defense systems, is one example of a baseline created from this guidance.
Do not attempt to implement any of the settings in
this guide without first testing them in a non-operational environment. The
creators of this guidance assume no responsibility whatsoever for its use by
other parties, and makes no guarantees, expressed or implied, about its
quality, reliability, or any other characteristic.
Evaluation Characteristics
Evaluation target | localhost |
---|---|
Benchmark URL | #scap_org.open-scap_comp_ssg-rhel8-xccdf.xml |
Benchmark ID | xccdf_org.ssgproject.content_benchmark_RHEL-8 |
Benchmark version | 0.1.73 |
Profile ID | xccdf_org.ssgproject.content_profile_stig |
Started at | 2024-08-07T12:37:42-05:00 |
Finished at | 2024-08-07T12:37:42-05:00 |
Performed by | root |
Test system | cpe:/a:redhat:openscap:1.3.10 |
CPE Platforms
- cpe:/o:redhat:enterprise_linux:8.10
- cpe:/o:redhat:enterprise_linux:8
- cpe:/o:redhat:enterprise_linux:8.0
- cpe:/o:redhat:enterprise_linux:8.1
- cpe:/o:redhat:enterprise_linux:8.2
- cpe:/o:redhat:enterprise_linux:8.3
- cpe:/o:redhat:enterprise_linux:8.4
- cpe:/o:redhat:enterprise_linux:8.5
- cpe:/o:redhat:enterprise_linux:8.6
- cpe:/o:redhat:enterprise_linux:8.7
- cpe:/o:redhat:enterprise_linux:8.8
- cpe:/o:redhat:enterprise_linux:8.9
Addresses
- IPv4 127.0.0.1
- IPv4 192.168.86.34
- IPv4 192.168.122.1
- IPv6 0:0:0:0:0:0:0:1
- IPv6 fe80:0:0:0:d4e:ed35:9d32:66af
- MAC 00:00:00:00:00:00
- MAC 52:54:00:5C:13:35
- MAC 52:54:00:68:52:92
Compliance and Scoring
The target system did not satisfy the conditions of 1 rules!
Please review rule results and consider applying remediation.
Rule results
Severity of failed rules
Score
Scoring system | Score | Maximum | Percent |
---|---|---|---|
urn:xccdf:scoring:default | 0.000000 | 100.000000 |
Rule Overview
Title | Severity | Result |
---|---|---|
Guide to the Secure Configuration of Red Hat Enterprise Linux 8 1x fail | ||
System Accounting with auditd 1x fail | ||
Enable Auditing for Processes Which Start Prior to the Audit Daemon | low | fail |
Result Details
Enable Auditing for Processes Which Start Prior to the Audit Daemonxccdf_org.ssgproject.content_rule_grub2_audit_argument lowCCE-80825-3
Enable Auditing for Processes Which Start Prior to the Audit Daemon
Rule ID | xccdf_org.ssgproject.content_rule_grub2_audit_argument | ||||||||||||||||||||||||||||||||||||
Result | fail | ||||||||||||||||||||||||||||||||||||
Multi-check rule | no | ||||||||||||||||||||||||||||||||||||
OVAL Definition ID | oval:ssg-grub2_audit_argument:def:1 | ||||||||||||||||||||||||||||||||||||
Time | 2024-08-07T12:37:42-05:00 | ||||||||||||||||||||||||||||||||||||
Severity | low | ||||||||||||||||||||||||||||||||||||
Identifiers: | CCE-80825-3 | ||||||||||||||||||||||||||||||||||||
References: |
| ||||||||||||||||||||||||||||||||||||
Description | To ensure all processes can be audited, even those which start
prior to the audit daemon, add the argument audit=1 to the default
GRUB 2 command line for the Linux operating system.
To ensure that audit=1 is added as a kernel command line
argument to newly installed kernels, add audit=1 to the
default Grub2 command line for Linux operating systems. Modify the line within
/etc/default/grub as shown below:
GRUB_CMDLINE_LINUX="... audit=1 ..."Run the following command to update command line for already installed kernels: # grubby --update-kernel=ALL --args="audit=1" | ||||||||||||||||||||||||||||||||||||
Rationale | Each process on the system carries an "auditable" flag which indicates whether
its activities can be audited. Although auditd takes care of enabling
this for all processes which launch after it does, adding the kernel argument
ensures it is set for every process during boot. |
OVAL test results details
check for kernel command line parameters audit=1 in /boot/grub2/grubenv for all kernels oval:ssg-test_grub2_audit_argument_grub_env:tst:1 true
Following items have been found on the system:
Result of item-state comparison | Path | Content |
---|---|---|
true | /boot/grub2/grubenv | kernelopts=root=/dev/mapper/rhel-root ro crashkernel=auto resume=/dev/mapper/rhel-swap rd.lvm.lv=rhel/root rd.lvm.lv=rhel/swap rhgb quiet audit=1 |
check for kernel command line parameters audit=1 in /boot/efi/EFI/redhat/grubenv for all kernels oval:ssg-test_grub2_audit_argument_grub_env_uefi:tst:1 false
No items have been found conforming to the following objects:
Object oval:ssg-object_grub2_audit_argument_grub_env_uefi:obj:1 of type textfilecontent54_object
Filepath | Pattern | Instance |
---|---|---|
/boot/efi/EFI/redhat/grubenv | ^kernelopts=(.*)$ | 1 |
check kernel command line parameters for referenced boot entries reference the $kernelopts variable. oval:ssg-test_grub2_entries_reference_kernelopts:tst:1 false
No items have been found conforming to the following objects:
Object oval:ssg-object_grub2_entries_reference_kernelopts:obj:1 of type textfilecontent54_object
Path | Filename | Pattern | Instance |
---|---|---|---|
/boot/loader/entries/ | ^.*\.conf$ | ^options(?:\s+.*)?\s+\$kernelopts\b.*$ | 1 |
check for audit=1 in /etc/default/grub via GRUB_CMDLINE_LINUX oval:ssg-test_grub2_audit_argument:tst:1 true
Following items have been found on the system:
Result of item-state comparison | Path | Content |
---|---|---|
true | /etc/default/grub | GRUB_CMDLINE_LINUX="crashkernel=auto resume=/dev/mapper/rhel-swap rd.lvm.lv=rhel/root rd.lvm.lv=rhel/swap rhgb quiet audit=1" |
check for audit=1 in /etc/default/grub via GRUB_CMDLINE_LINUX_DEFAULT oval:ssg-test_grub2_audit_argument_default:tst:1 false
No items have been found conforming to the following objects:
Object oval:ssg-object_grub2_audit_argument_default:obj:1 of type textfilecontent54_object
Filepath | Pattern | Instance |
---|---|---|
/etc/default/grub | ^\s*GRUB_CMDLINE_LINUX_DEFAULT="(.*)"$ | 1 |
Check for GRUB_DISABLE_RECOVERY=true in /etc/default/grub oval:ssg-test_bootloader_disable_recovery_set_to_true:tst:1 true
Following items have been found on the system:
Result of item-state comparison | Path | Content |
---|---|---|
true | /etc/default/grub | GRUB_DISABLE_RECOVERY="true" |
Red Hat and Red Hat Enterprise Linux are either registered
trademarks or trademarks of Red Hat, Inc. in the United States and other
countries. All other names are registered trademarks or trademarks of their
respective companies.