RHEL-06-000020 - The system must use a Linux Security Module configured to enforce limits on system services.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Setting the SELinux state to enforcing ensures SELinux is able to confine potentially compromised processes to the security policy, which is designed to prevent them from causing damage to the system or further elevating their privileges.

Per OPORD 16-0080, the preferred intrusion detection system is McAfee Host Intrusion Prevention System (HIPS) in conjunction with SELinux. However, McAfee Endpoint Security for Linux (ENSL) is an approved alternative to both McAfee Virus Scan Enterprise (VSE) and HIPS. In either scenario, SELinux is interoperable with the McAfee products and SELinux is still required.

Solution

The SELinux state should be set to 'enforcing' at system boot time. In the file '/etc/selinux/config', add or correct the following line to configure the system to boot into enforcing mode:

SELINUX=enforcing

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3(3), CAT|II, CCI|CCI-002165, CCI|CCI-002235, Rule-ID|SV-217861r505923_rule, STIG-ID|RHEL-06-000020, STIG-Legacy|SV-65573, STIG-Legacy|V-51363, Vuln-ID|V-217861

Plugin: Unix

Control ID: ae813aed4bff790dd2dc0398a72ce7d31cee8bac985155b1b04436b3d204a3da