Guide to the Secure Configuration of Red Hat Enterprise Linux 7
scap-security-guide
package which is developed at
https://www.open-scap.org/security-policies/scap-security-guide.
Providing system administrators with such guidance informs them how to securely configure systems under their control in a variety of network roles. Policy makers and baseline creators can use this catalog of settings, with its associated references to higher-level security control catalogs, in order to assist them in security baseline creation. This guide is a catalog, not a checklist, and satisfaction of every item is not likely to be possible or sensible in many operational scenarios. However, the XCCDF format enables granular selection and adjustment of settings, and their association with OVAL and OCIL content provides an automated checking capability. Transformations of this document, and its associated automated checking content, are capable of providing baselines that meet a diverse set of policy objectives. Some example XCCDF Profiles, which are selections of items that form checklists and can be used as baselines, are available with this guide. They can be processed, in an automated fashion, with tools that support the Security Content Automation Protocol (SCAP). The DISA STIG for Red Hat Enterprise Linux 7, which provides required settings for US Department of Defense systems, is one example of a baseline created from this guidance.
This benchmark is a direct port of a SCAP Security Guide benchmark developed for Red Hat Enterprise Linux. It has been modified through an automated process to remove specific dependencies on Red Hat Enterprise Linux and to function with CentOS. The result is a generally useful SCAP Security Guide benchmark with the following caveats:
- CentOS is not an exact copy of Red Hat Enterprise Linux. There may be configuration differences that produce false positives and/or false negatives. If this occurs please file a bug report.
- CentOS has its own build system, compiler options, patchsets, and is a community supported, non-commercial operating system. CentOS does not inherit certifications or evaluations from Red Hat Enterprise Linux. As such, some configuration rules (such as those requiring FIPS 140-2 encryption) will continue to fail on CentOS.
Members of the CentOS community are invited to participate in OpenSCAP and SCAP Security Guide development. Bug reports and patches can be sent to GitHub: https://github.com/OpenSCAP/scap-security-guide. The mailing list is at https://fedorahosted.org/mailman/listinfo/scap-security-guide.
Profile ID | (default) |
---|
Revision History
Current version: 0.1.31
- draft (as of 2016-11-28)
Platforms
- cpe:/o:redhat:enterprise_linux:7
- cpe:/o:centos:centos:7
- cpe:/o:redhat:enterprise_linux:7::client
- cpe:/o:redhat:enterprise_linux:7::computenode
Table of Contents
Checklist
2.groupDo not use vendor-supplied defaults for system passwords and other |
2.1groupAlways change vendor-supplied |
2.1.1groupFor wireless environments |
2.1.1.agroupInterview responsible personnel and examine |
2.1.1.bgroupInterview personnel and examine policies and |
2.1.1.cgroupExamine vendor documentation and login to |
2.1.1.dgroupExamine vendor documentation and observe |
2.1.1.egroupExamine vendor documentation and observe |
2.1.agroupChoose a sample of system components, and attempt |
2.1.bgroupFor the sample of system components, verify that all |
2.1.cgroupInterview personnel and examine supporting |
2.2groupDevelop configuration standards for |
2.2.1groupImplement only one primary |
2.2.1.agroupSelect a sample of system components and |
2.2.1.bgroupIf virtualization technologies are used, inspect the |
2.2.2groupEnable only necessary services, |
2.2.2.agroupSelect a sample of system components and |
2.2.2.bgroupIdentify any enabled insecure services, daemons, |
2.2.3groupImplement additional security |
2.2.3.agroupInspect configuration settings to verify that security |
2.2.4groupConfigure system security |
2.2.4.agroupInterview system administrators and/or security |
2.2.4.bgroupExamine the system configuration standards to |
2.2.4.cgroupSelect a sample of system components and |
2.2.5groupRemove all unnecessary |
2.2.5.agroupSelect a sample of system components and |
2.2.5.bgroup. Examine the documentation and security |
2.2.5.cgroup. Examine the documentation and security |
2.2.agroup |
2.2.bgroupExamine policies and interview personnel to |
2.2.cgroupExamine policies and interview personnel to |
2.2.dgroupVerify that system configuration standards include the |
2.3groupEncrypt all non-console |
2.3.agroupObserve an administrator log on to each system and |
2.3.bgroupReview services and parameter files on systems to |
2.3.cgroupObserve an administrator log on to each system to |
2.3.dgroupExamine vendor documentation and interview |
2.4groupMaintain an inventory of system |
2.4.agroupExamine system inventory to verify that a list of |
2.4.bgroupInterview personnel to verify the documented inventory |
2.5groupEnsure that security policies and |
2.6groupShared hosting providers must |
3.groupProtect stored cardholder data |
3.1groupKeep cardholder data storage to a |
3.1.agroupExamine the data retention and disposal policies, |
3.1.bgroupInterview personnel to verify that: |
3.1.cgroupFor a sample of system components that store cardholder |
3.2groupDo not store sensitive authentication |
3.2.1groupDo not store the full contents of |
3.2.2groupDo not store the card verification |
3.2.3groupDo not store the personal |
3.2.agroupFor issuers and/or companies that support issuing |
3.2.bgroupFor issuers and/or companies that support issuing |
3.2.cgroupFor all other entities, if sensitive authentication data is |
3.2.dgroupFor all other entities, if sensitive authentication data is |
3.3groupMask PAN when displayed (the first |
3.3.agroupExamine written policies and procedures for masking the |
3.3.bgroupExamine system configurations to verify that full PAN is |
3.3.cgroupExamine displays of PAN (for example, on screen, on |
3.4groupRender PAN unreadable anywhere it |
3.4.1groupIf disk encryption is used (rather |
3.4.1.agroupIf disk encryption is used, inspect the configuration |
3.4.1.bgroupObserve processes and interview personnel to verify |
3.4.1.cgroupExamine the configurations and observe the |
3.4.agroupExamine documentation about the system used to protect |
3.4.bgroupExamine several tables or files from a sample of data |
3.4.cgroupExamine a sample of removable media (for example, |
3.4.dgroupExamine a sample of audit logs to confirm that the PAN is |
3.4.egroupIf |
3.5groupDocument and implement |
3.5.1groupRestrict access to cryptographic |
3.5.2groupStore secret and private keys |
3.5.2.agroupExamine documented procedures to verify that |
3.5.2.bgroupExamine system configurations and key storage |
3.5.2.cgroupWherever key-encrypting keys are used, examine |
3.5.3groupStore cryptographic keys in the |
3.6groupFully document and implement all |
3.6.1groupGeneration of strong |
3.6.1.agroupVerify that key-management procedures specify how |
3.6.1.bgroupObserve the method for generating keys to verify that |
3.6.2groupSecure cryptographic key |
3.6.2.agroupVerify that key-management procedures specify how |
3.6.2.bgroupObserve the method for distributing keys to verify that |
3.6.3groupSecure cryptographic key storage |
3.6.3.agroupVerify that key-management procedures specify how |
3.6.3.bgroupObserve the method for storing keys to verify that |
3.6.4groupCryptographic key changes for |
3.6.4.agroupVerify that key-management procedures include a |
3.6.4.bgroupInterview personnel to verify that keys are changed at |
3.6.5groupRetirement or replacement (for |
3.6.5.agroupVerify that key-management procedures specify |
3.6.5.bgroupInterview personnel to verify the following processes |
3.6.6groupIf manual clear-text cryptographic |
3.6.6.agroupVerify that manual clear-text key-management |
3.6.7groupPrevention of unauthorized |
3.6.7.agroupVerify that key-management procedures specify |
3.6.7.bgroupInterview personnel and/or observe processes to |
3.6.8groupRequirement for cryptographic |
3.6.8.agroupVerify that key-management procedures specify |
3.6.8.bgroupObserve documentation or other evidence showing |
3.6.bgroupExamine the key-management procedures and processes |
3.7groupEnsure that security policies and |
4.groupEncrypt transmission of cardholder data across open, public networks |
4.1groupUse strong cryptography and security |
4.1.1groupEnsure wireless networks transmitting |
4.1.agroupIdentify all locations where cardholder data is |
4.1.bgroupReview documented policies and procedures to verify |
4.1.cgroupSelect and observe a sample of inbound and outbound |
4.1.dgroupExamine keys and certificates to verify that only |
4.1.egroupExamine system configurations to verify that the |
4.1.fgroupExamine system configurations to verify that the proper |
4.1.ggroupFor TLS implementations, examine system |
4.2groupNever send unprotected PANs by end- |
4.2.agroupIf end-user messaging technologies are used to send |
4.2.bgroupReview written policies to verify the existence of a |
4.3groupEnsure that security policies and |
5.groupProtect all systems against malware and regularly update anti-virus |
5.1groupDeploy anti-virus software on all |
5.1.1groupEnsure that anti-virus programs |
5.1.2groupFor systems considered to be not |
5.2groupEnsure that all anti-virus mechanisms |
5.2.agroupExamine policies and procedures to verify that anti-virus |
5.2.bgroupExamine anti-virus configurations, including the master |
5.2.cgroupExamine a sample of system components, including all |
5.2.dgroupExamine anti-virus configurations, including the master |
5.3groupEnsure that anti-virus mechanisms |
5.3.agroupExamine anti-virus configurations, including the master |
5.3.bgroupExamine anti-virus configurations, including the master |
5.3.cgroupInterview responsible personnel and observe processes to |
5.4groupEnsure that security policies and |
6.groupDevelop and maintain secure systems and applications |
6.1groupEstablish a process to identify security |
6.1.agroupExamine policies and procedures to verify that |
6.1.bgroupInterview responsible personnel and observe |
6.2groupEnsure that all system components and |
6.2.agroupExamine policies and procedures related to security- |
6.2.bgroupFor a sample of system components and related |
6.3groupDevelop internal and external software |
6.3.1groupRemove development, test and/or |
6.3.2groupReview custom code prior to release |
6.3.2.agroupExamine written software-development procedures |
6.3.2.bgroupSelect a sample of recent custom application |
6.3.agroupExamine written software-development processes to |
6.3.bgroupExamine written software-development processes to |
6.3.cgroupExamine written software-development processes to |
6.3.dgroupInterview software developers to verify that written |
6.4groupFollow change control processes and |
6.4.1groupSeparate development/test |
6.4.1.agroupExamine network documentation and network |
6.4.1.bgroupExamine access controls settings to verify that |
6.4.2groupSeparation of duties between |
6.4.3groupProduction data (live PANs) are not |
6.4.3.agroupObserve testing processes and interview |
6.4.3.bgroupExamine a sample of test data to verify production |
6.4.4groupRemoval of test data and accounts |
6.4.4.agroupObserve testing processes and interview |
6.4.4.bgroupExamine a sample of data and accounts from |
6.4.5groupChange control procedures for the |
6.4.5.agroupExamine documented change control procedures |
6.4.5.bgroupFor a sample of system components, interview |
6.5groupAddress common coding vulnerabilities in |
6.5.1groupInjection flaws, particularly SQL |
6.5.10groupBroken authentication and session |
6.5.2groupBuffer overflows |
6.5.3groupInsecure cryptographic storage |
6.5.4groupInsecure communications |
6.5.5groupImproper error handling |
6.5.6groupExamine software-development policies and |
6.5.7groupCross-site scripting (XSS) |
6.5.8groupImproper access control (such as |
6.5.9groupCross-site request forgery (CSRF) |
6.5.agroupExamine software-development policies and |
6.5.bgroupInterview a sample of developers to verify that they are |
6.5.cgroupExamine records of training to verify that software |
6.6groupFor public-facing web applications, |
6.7groupEnsure that security policies and |
7.groupRestrict access to cardholder data by business need to know |
7.1groupLimit access to system |
7.1.1groupDefine access needs for |
7.1.2groupRestrict access to privileged |
7.1.2.agroupInterview personnel responsible for assigning access to |
7.1.2.bgroupSelect a sample of user IDs with privileged access and |
7.1.3groupAssign access based on |
7.1.4groupRequire documented |
7.2groupEstablish an access control |
7.2.1groupCoverage of all system |
7.2.2groupAssignment of privileges to |
7.2.3group |
7.3groupEnsure that security policies and |
8.groupIdentify and authenticate access to system components |
8.1groupDefine and implement policies and |
8.1.1groupAssign all users a unique ID |
8.1.2groupControl addition, deletion, and |
8.1.3groupImmediately revoke access for |
8.1.3.agroupSelect a sample of users terminated in the past six |
8.1.3.bgroupVerify all physical authentication methods |
8.1.4groupRemove/disable inactive user |
8.1.5groupManage IDs used by vendors to |
8.1.5.agroupInterview personnel and observe processes for |
8.1.5.bgroupInterview personnel and observe processes to verify |
8.1.6groupLimit repeated access attempts |
8.1.6.agroupFor a sample of system components, inspect system |
8.1.6.bgroup |
8.1.7groupSet the lockout duration to a |
8.1.8groupIf a session has been idle for |
8.1.agroupReview procedures and confirm they define processes for |
8.1.bgroupVerify that procedures are implemented for user |
8.2groupIn addition to assigning a unique ID, |
8.2.1groupUsing strong cryptography, |
8.2.1.agroupExamine vendor documentation and system |
8.2.1.bgroupFor a sample of system components, examine |
8.2.1.cgroupFor a sample of system components, examine data |
8.2.1.dgroup |
8.2.2groupVerify user identity before |
8.2.3groupPasswords/phrases must meet |
8.2.3.agroupFor a sample of system components, inspect system |
8.2.3.bgroup |
8.2.4groupChange user |
8.2.4.agroupFor a sample of system components, inspect system |
8.2.4.bgroup |
8.2.5groupDo not allow an individual to |
8.2.5.agroupFor a sample of system components, obtain and |
8.2.5.bgroup |
8.2.6groupSet passwords/phrases for first- |
8.3groupIncorporate two-factor authentication |
8.3.agroupExamine system configurations for remote access servers |
8.3.bgroupObserve a sample of personnel (for example, users and |
8.4groupDocument and communicate |
8.4.agroupExamine |
8.4.bgroupReview authentication policies and procedures that are |
8.4.cgroupInterview a sample of users to verify that they are familiar |
8.5groupDo not use group, shared, or generic |
8.5.1group |
8.5.agroupFor a sample of system components, examine user ID lists |
8.5.bgroupExamine authentication policies and procedures to verify |
8.5.cgroupInterview system administrators to verify that group and |
8.6groupWhere other authentication |
8.6.agroupExamine authentication policies and procedures to verify |
8.6.bgroupInterview security personnel to verify authentication |
8.6.cgroupExamine system configuration settings and/or physical |
8.7groupAll access to any database |
8.7.agroupReview database and application configuration settings |
8.7.bgroupExamine database and application configuration settings to |
8.7.cgroupExamine database access control settings and database |
8.7.dgroupExamine database access control settings, database |
8.8groupEnsure that security policies and |
10.groupTrack and monitor all access to network resources and cardholder data |
10.1groupImplement audit trails to link all |
10.2groupImplement automated audit trails for |
10.2.1groupAll individual user accesses to |
10.2.2groupAll actions taken by any |
10.2.3groupAccess to all audit trails |
10.2.4groupInvalid logical access attempts |
10.2.5groupUse of and changes to |
10.2.5.agroupVerify use of identification and authentication |
10.2.5.bgroupVerify all elevation of privileges is logged. |
10.2.5.cgroupVerify all changes, additions, or deletions to any account |
10.2.6groupInitialization, stopping, or |
10.2.7groupCreation and deletion of system- |
10.3groupRecord at least the following audit |
10.3.1groupUser identification |
10.3.2groupType of event |
10.3.3groupDate and time |
10.3.4groupSuccess or failure indication |
10.3.5groupOrigination of event |
10.3.6groupIdentity or name of affected |
10.4groupUsing time-synchronization |
10.4.1groupCritical systems have the |
10.4.1.agroupExamine the process for acquiring, distributing and |
10.4.1.bgroupObserve the time-related system-parameter settings for |
10.4.2groupTime data is protected. |
10.4.2.agroupExamine system configurations and time- |
10.4.2.bgroupExamine system configurations, time synchronization |
10.4.3groupTime settings are received from |
10.5groupSecure audit trails so they cannot |
10.5.1groupLimit viewing of audit trails to |
10.5.2groupProtect audit trail files from |
10.5.3groupPromptly back up audit trail files |
10.5.4groupWrite logs for external-facing |
10.5.5groupUse file-integrity monitoring or |
10.6groupReview logs and security events for |
10.6.1groupReview the following at least |
10.6.1.agroupExamine security policies and procedures to verify that |
10.6.1.bgroupObserve processes and interview personnel to verify |
10.6.2groupReview logs of all other system |
10.6.2.agroupExamine security policies and procedures to verify that |
10.6.2.bgroup |
10.6.3groupFollow up exceptions and |
10.6.3.agroupExamine security policies and procedures to verify that |
10.6.3.bgroupObserve processes and interview personnel to verify |
10.7groupRetain audit trail history for at least |
10.7.agroupExamine security policies and procedures to verify that they |
10.7.bgroupInterview personnel and examine audit logs to verify that |
10.7.cgroupInterview personnel and observe processes to verify that at |
10.8groupEnsure that security policies and |
11.groupRegularly test security systems and processes |
11.1groupImplement processes to test for the |
11.1.1groupMaintain an inventory of |
11.1.2groupImplement incident response |
11.1.2.agroup |
11.1.2.bgroupInterview responsible personnel and/or inspect |
11.1.agroupExamine policies and procedures to verify processes |
11.1.bgroupVerify that the methodology is adequate to detect and |
11.1.cgroupIf wireless scanning is utilized, examine output from |
11.1.dgroupIf automated monitoring is utilized (for example, |
11.2groupRun internal and external network |
11.2.1groupPerform quarterly internal |
11.2.1.agroupReview the scan reports and verify that four |
11.2.1.bgroupReview the scan reports and verify that the scan |
11.2.2groupPerform quarterly external |
11.2.2.cgroupReview the scan reports to verify that the scans |
11.2.3groupPerform internal and external |
11.2.3.agroupInspect and correlate change control |
11.2.3.bgroupReview scan reports and verify that the scan |
11.2.3.cgroupValidate that the scan was performed by a qualified |
11.3groupImplement a methodology for |
11.3.1groupPerform |
11.3.1.agroupExamine the scope of work and results from the |
11.3.1.bgroupVerify that the test was performed by a qualified |
11.3.2groupPerform |
11.3.2.agroupExamine the scope of work and results from the |
11.3.2.bgroupVerify that the test was performed by a qualified |
11.3.3groupExploitable vulnerabilities found |
11.3.4groupIf segmentation is used to isolate |
11.3.4.agroupExamine segmentation controls and review |
11.3.4.bgroupExamine the results from the most recent |
11.4groupUse intrusion-detection and/or |
11.4.agroupExamine system configurations and network diagrams |
11.4.bgroupExamine system configurations and interview |
11.4.cgroupExamine IDS/IPS configurations and vendor |
11.5groupDeploy a change-detection |
11.5.1groupImplement a process to respond to |
11.5.agroupVerify the use of a change-detection mechanism within |
11.5.bgroupVerify the mechanism is configured to alert personnel |
11.6groupEnsure that security policies and |
ValuesgroupGroup of values used in PCI-DSS profile |
Non PCI-DSSgroupRules that are not part of PCI-DSS |