File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (26 lines) | stat: -rw-r--r-- 887 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
documentation_complete: true


title: 'Ensure SELinux Not Disabled in zIPL'

description: |-
    To ensure SELinux is not disabled at boot time,
    check that no boot entry in <tt>/boot/loader/entries/*.conf</tt> has <tt>selinux=0</tt>
    included in its options.<br />

rationale: |-
    Disabling a major host protection feature, such as SELinux, at boot time prevents
    it from confining system services at boot time.  Further, it increases
    the chances that it will remain off during system operation.

severity: medium

ocil_clause: 'SELinux is disabled at boot time'

ocil: |-
    To check that SELinux is not disabled at boot time;
    Check that no boot entry disables selinux:
    <pre>sudo grep -L "^options\s+.*\bselinux=0\b" /boot/loader/entries/*.conf</pre>
    No line should be returned, each line returned is a boot entry that disables SELinux.

platform: machine