1.6.1.4 Ensure no unconfined daemons exist

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Daemons that are not defined in SELinux policy will inherit the security context of their parent process.
Rationale:
Since daemons are launched and descend from the initprocess, they will inherit the security context label initrc_t. This could cause the unintended consequence of giving the process more permission than it requires.

Solution

Investigate any unconfined daemons found during the audit action. They may need to have an existing security context assigned to them or a policy built for them.
Notes:
Occasionally certain daemons such as backup or centralized management software may require running unconfined. Any such software should be carefully analyzed and documented before such an exception is made.

See Also

https://workbench.cisecurity.org/files/2429