1.166 RHEL-09-251035

Information

RHEL 9 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.

GROUP ID: V-257940
RULE ID: SV-257940r958480

To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restrict unused or unnecessary ports, protocols, and services on information systems.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Update the host's firewall settings and/or running services to comply with the PPSM CLSA for the site or program and the PPSM CAL.

Then run the following command to load the newly created rule(s):

$ sudo firewall-cmd --reload

See Also

https://workbench.cisecurity.org/benchmarks/22008

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7, 800-53|CM-7b., CAT|II, CCI|CCI-000382, Rule-ID|SV-257940r958480_rule, STIG-ID|RHEL-09-251035, Vuln-ID|V-257940

Plugin: Unix

Control ID: 75cee728c556689834f6609cc8f457ca8523973fd8b132fda81dfb96715f93a3