Check: RHEL-06-000020
Red Hat Enterprise Linux 6 STIG:
RHEL-06-000020
(in versions v2 r2 through v1 r25)
Title
The system must use a Linux Security Module configured to enforce limits on system services. (Cat II impact)
Discussion
Setting the SELinux state to enforcing ensures SELinux is able to confine potentially compromised processes to the security policy, which is designed to prevent them from causing damage to the system or further elevating their privileges. Per OPORD 16-0080, the preferred intrusion detection system is McAfee Host Intrusion Prevention System (HIPS) in conjunction with SELinux. However, McAfee Endpoint Security for Linux (ENSL) is an approved alternative to both McAfee Virus Scan Enterprise (VSE) and HIPS. In either scenario, SELinux is interoperable with the McAfee products and SELinux is still required.
Check Content
If an HBSS or HIPS is active on the system, this is Not Applicable. Check the file "/etc/selinux/config" and ensure the following line appears: SELINUX=enforcing If SELINUX is not set to enforcing, this is a finding.
Fix Text
The SELinux state should be set to "enforcing" at system boot time. In the file "/etc/selinux/config", add or correct the following line to configure the system to boot into enforcing mode: SELINUX=enforcing
Additional Identifiers
Rule ID: SV-217861r603264_rule
Vulnerability ID: V-217861
Group Title: SRG-OS-000324
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
Implement the security configuration settings. |
CCI-002165 |
Enforce organization-defined discretionary access control policies over defined subjects and objects. |
CCI-002235 |
Prevent non-privileged users from executing privileged functions. |