RHEL-07-040810 - The Red Hat Enterprise Linux operating system access control program must be configured to grant or deny system access to specific hosts and services.

Information

If the systems access control program is not configured with appropriate rules for allowing and denying access to system network resources, services may be accessible to unauthorized hosts.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

If 'firewalld' is installed and active on the system, configure rules for allowing specific services and hosts.

If 'firewalld' is not 'active', enable 'tcpwrappers' by configuring '/etc/hosts.allow' and '/etc/hosts.deny' to allow or deny access to specific hosts.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_7_V3R15_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-204628r991589_rule, STIG-ID|RHEL-07-040810, STIG-Legacy|SV-86939, STIG-Legacy|V-72315, Vuln-ID|V-204628

Plugin: Unix

Control ID: 64887c64fa8a34053dc6f8d05934bf920a6ec0d2fa3e54e8fe438510b4a8e5a4