Skip to content

Commit ca3294e

Browse files
authored
Merge pull request #14327 from mrkanon/ol9-update-e8
Update OL9 e8 profile to use control file
2 parents ba8f301 + 6e39875 commit ca3294e

1 file changed

Lines changed: 13 additions & 123 deletions

File tree

products/ol9/profiles/e8.profile

Lines changed: 13 additions & 123 deletions
Original file line numberDiff line numberDiff line change
@@ -14,126 +14,16 @@ description: |-
1414
https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers
1515

1616
selections:
17-
18-
### Remove obsolete packages
19-
- package_telnet_removed
20-
- service_telnet_disabled
21-
- package_telnet-server_removed
22-
- service_avahi-daemon_disabled
23-
- package_squid_removed
24-
- service_squid_disabled
25-
26-
### Software update
27-
- ensure_oracle_gpgkey_installed
28-
- ensure_gpgcheck_never_disabled
29-
- ensure_gpgcheck_local_packages
30-
- ensure_gpgcheck_globally_activated
31-
- security_patches_up_to_date
32-
- dnf-automatic_security_updates_only
33-
34-
### System security settings
35-
- sysctl_kernel_randomize_va_space
36-
- sysctl_kernel_exec_shield
37-
- sysctl_kernel_kptr_restrict
38-
- sysctl_kernel_dmesg_restrict
39-
- sysctl_kernel_kexec_load_disabled
40-
- sysctl_kernel_yama_ptrace_scope
41-
- sysctl_kernel_unprivileged_bpf_disabled
42-
- sysctl_net_core_bpf_jit_harden
43-
44-
### SELinux
45-
- var_selinux_state=enforcing
46-
- selinux_state
47-
- var_selinux_policy_name=targeted
48-
- selinux_policytype
49-
50-
### Filesystem integrity
51-
- rpm_verify_hashes
52-
- rpm_verify_permissions
53-
- rpm_verify_ownership
54-
- file_permissions_unauthorized_sgid
55-
- file_permissions_unauthorized_suid
56-
- file_permissions_unauthorized_world_writable
57-
- dir_perms_world_writable_sticky_bits
58-
- file_permissions_library_dirs
59-
- file_ownership_binary_dirs
60-
- file_permissions_binary_dirs
61-
- file_ownership_library_dirs
62-
63-
### Passwords
64-
- var_authselect_profile=sssd
65-
- enable_authselect
66-
- no_empty_passwords
67-
68-
### Partitioning
69-
- mount_option_dev_shm_nodev
70-
- mount_option_dev_shm_nosuid
71-
- mount_option_dev_shm_noexec
72-
73-
### Network
74-
- package_firewalld_installed
75-
- service_firewalld_enabled
76-
- network_sniffer_disabled
77-
78-
### Admin privileges
79-
- accounts_no_uid_except_zero
80-
- sudo_remove_nopasswd
81-
- sudo_remove_no_authenticate
82-
- sudo_require_authentication
83-
84-
### Audit
85-
- package_rsyslog_installed
86-
- service_rsyslog_enabled
87-
- service_auditd_enabled
88-
- var_auditd_flush=incremental_async
89-
- auditd_data_retention_flush
90-
- auditd_local_events
91-
- auditd_write_logs
92-
- auditd_log_format
93-
- auditd_freq
94-
- auditd_name_format
95-
- audit_rules_login_events_tallylog
96-
- audit_rules_login_events_faillock
97-
- audit_rules_login_events_lastlog
98-
- audit_rules_login_events
99-
- audit_rules_time_adjtimex
100-
- audit_rules_time_clock_settime
101-
- audit_rules_time_watch_localtime
102-
- audit_rules_time_settimeofday
103-
- audit_rules_time_stime
104-
- audit_rules_execution_restorecon
105-
- audit_rules_execution_chcon
106-
- audit_rules_execution_semanage
107-
- audit_rules_execution_setsebool
108-
- audit_rules_execution_setfiles
109-
- audit_rules_execution_seunshare
110-
- audit_rules_sysadmin_actions
111-
- audit_rules_networkconfig_modification
112-
- audit_rules_usergroup_modification
113-
- audit_rules_dac_modification_chmod
114-
- audit_rules_dac_modification_chown
115-
- audit_rules_kernel_module_loading
116-
117-
### Secure access
118-
- sshd_use_directory_configuration
119-
- sshd_disable_root_login
120-
- sshd_disable_gssapi_auth
121-
- sshd_print_last_log
122-
- sshd_do_not_permit_user_env
123-
- sshd_disable_rhosts
124-
- sshd_set_loglevel_info
125-
- sshd_disable_empty_passwords
126-
- sshd_disable_user_known_hosts
127-
- sshd_enable_strictmodes
128-
129-
# See also: https://www.cyber.gov.au/acsc/view-all-content/guidance/asd-approved-cryptographic-algorithms
130-
- var_system_crypto_policy=default_nosha1
131-
- configure_crypto_policy
132-
- configure_ssh_crypto_policy
133-
134-
### Application whitelisting
135-
- package_fapolicyd_installed
136-
- service_fapolicyd_enabled
137-
138-
### Backup
139-
- package_rear_installed
17+
- e8:all
18+
- '!package_ypbind_removed'
19+
- '!package_rsh-server_removed'
20+
- '!package_rsh_removed'
21+
- 'package_rear_installed'
22+
- 'package_audit_installed'
23+
- '!package_sequoia-sq_installed'
24+
- 'ensure_oracle_gpgkey_installed'
25+
26+
# Following rules are not applicable to OL
27+
- '!package_talk_removed'
28+
- '!package_talk-server_removed'
29+
- '!ensure_redhat_gpgkey_installed'

0 commit comments

Comments
 (0)