Check: OL6-00-000120
Oracle Linux 6 STIG:
OL6-00-000120
(in versions v2 r7 through v1 r9)
Title
The systems local IPv4 firewall must implement a deny-all, allow-by-exception policy for inbound packets. (Cat II impact)
Discussion
In "iptables" the default policy is applied only after all the applicable rules in the table are examined for a match. Setting the default policy to "DROP" implements proper design for a firewall, i.e., any packets which are not explicitly permitted should not be accepted.
Check Content
Inspect the file "/etc/sysconfig/iptables" to determine the default policy for the INPUT chain. It should be set to DROP. # grep ":INPUT" /etc/sysconfig/iptables If the default policy for the INPUT chain is not set to DROP, this is a finding.
Fix Text
To set the default policy to DROP (instead of ACCEPT) for the built-in INPUT chain which processes incoming packets, add or correct the following line in "/etc/sysconfig/iptables": :INPUT DROP [0:0]
Additional Identifiers
Rule ID: SV-219554r793811_rule
Vulnerability ID: V-219554
Group Title: SRG-OS-000480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000066 |
The organization enforces requirements for remote connections to the information system. |
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |