File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (43 lines) | stat: -rw-r--r-- 1,359 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
documentation_complete: true

title: 'Disable Recovery Booting'

description: |-
    {{{ full_name }}} systems support an "recovery boot" option that can be used
    to prevent services from being started. The <tt>GRUB_DISABLE_RECOVERY</tt>
    configuration option in <tt>/etc/default/grub</tt> should be set to
    <tt>true</tt> to disable the generation of recovery mode menu entries. It is
    also required to change the runtime configuration, run:
    <pre>$ sudo {{{ grub_command("update") }}}</pre>

rationale: |-
    Using recovery boot, the console user could disable auditing, firewalls,
    or other services, weakening system security.

severity: medium

identifiers:
    cce@rhel8: CCE-86006-4
    cce@rhel9: CCE-85986-8
    cce@rhel10: CCE-87007-1

references:
    ospp: FIA_UAU.1

ocil_clause: 'GRUB_DISABLE_RECOVERY is not set to true or is missing'

ocil: |-
    Verify that <tt>GRUB_DISABLE_RECOVERY</tt> is set to </tt>true</tt> in <tt>/etc/default/grub</tt> to disable recovery boot.
    Run the following command:

    $ sudo grep GRUB_DISABLE_RECOVERY /etc/default/grub

fixtext: |-
    Configure the GRUB 2 boot loader to disable recovery mode boot loader entries.
    Add or edit the following line in /etc/default/grub:

    GRUB_DISABLE_RECOVERY=true

    Then, run the following command:

    $ sudo {{{ grub_command("update") }}}