1.6.1.3 Ensure SELinux policy is configured

Information

Configure SELinux to meet or exceed the default targeted policy, which constrains daemons and system software only.

Note: If your organization requires stricter policies, ensure that they are set in the /etc/selinux/config file.

Rationale:

Security configuration requirements vary from site to site. Some sites may mandate a policy that is stricter than the default policy, which is perfectly acceptable. This item is intended to ensure that at least the default recommendations are met.

Solution

Edit the /etc/selinux/config file to set the SELINUXTYPE parameter:

SELINUXTYPE=targeted

See Also

https://workbench.cisecurity.org/files/3636

Item Details

Category: ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AC-3(4), 800-53|SI-6a., CCI|CCI-002165, CCI|CCI-002696, CSCv7|14.6, Rule-ID|SV-204454r754748_rule, STIG-ID|RHEL-07-020220

Plugin: Unix

Control ID: 640c8951e44961a06048ef4e801ebdfe70738a0ec416ed4065721a96e927469f