1.7.1.5 Ensure no unconfined services exist

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Unconfined processes run in unconfined domains For unconfined processes, SELinux policy rules are applied, but policy rules exist that allow processes running in unconfined domains almost all access. Processes running in unconfined domains fall back to using DAC rules exclusively. If an unconfined process is compromised, SELinux does not prevent an attacker from gaining access to system resources and data, but of course, DAC rules are still used. SELinux is a security enhancement on top of DAC rules – it does not replace them

Solution

Investigate any unconfined processes found during the audit action. They may need to have an existing security context assigned to them or a policy built for them.

See Also

https://workbench.cisecurity.org/files/2521

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3, CSCv7|9.2

Plugin: Unix

Control ID: 254a464a161e217f74b8d3817093440238582f7ceada588d3e11e2c5c992fc8b