File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (55 lines) | stat: -rw-r--r-- 1,850 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
documentation_complete: true

title: 'Ensure SELinux is Not Disabled'

description: |-
    The SELinux state should be set to <tt>enforcing</tt> or <tt>permissive</tt> at system boot
    time. In the file <tt>/etc/selinux/config</tt>, add or correct the following line to configure
    the system to boot into enforcing or permissive mode:
    <pre>SELINUX=enforcing</pre>
    OR
    <pre>SELINUX=permissive</pre>
    Ensure that all files have correct SELinux labels by running:
    <pre>fixfiles onboot</pre>
    Then reboot the system.

rationale: |-
    Running SELinux in disabled mode is strongly discouraged. It prevents enforcing the SELinux
    controls without a system reboot. It also avoids labeling any persistent objects such as
    files, making it difficult to enable SELinux in the future.

severity: high

identifiers:
    cce@rhel8: CCE-86151-8
    cce@rhel9: CCE-86152-6
    cce@rhel10: CCE-90205-6

ocil_clause: 'SELinux is disabled'

ocil: |-
    Ensure that {{{ full_name }}} does not disable SELinux.

    Check if "SELinux" is active and in "enforcing" or "permissive" mode with the following command:

    $ sudo getenforce
    Enforcing
    -OR-
    Permissive

fixtext: |-
    Configure {{{ full_name }}} to enable SELinux.

    Edit the file <tt>/etc/selinux/config</tt> and add or modify the following line:
    <pre>SELINUX=enforcing</pre>
    OR
    <pre>SELINUX=permissive</pre>

    A reboot is required for the changes to take effect.

warnings:
    - general: |-
        In case the SELinux is "disabled", the automated remediation will adopt a more
        conservative approach and set it to "permissive" in order to avoid any system disruption
        and give the administrator the opportunity to assess the impact and necessary efforts
        before setting it to "enforcing", which is strongly recommended.