OL6-00-000023 - The system must use a Linux Security Module configured to limit the privileges of system services.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Setting the SELinux policy to 'targeted' or a more specialized policy ensures the system will confine processes that are likely to be targeted for exploitation, such as network or system services.

Solution

The SELinux 'targeted' policy is appropriate for general-purpose desktops and servers, as well as systems in many other roles. To configure the system to use this policy, add or correct the following line in '/etc/selinux/config':

SELINUXTYPE=targeted

Other policies, such as 'mls', provide additional security labeling and greater confinement but are not compatible with many general-purpose use cases.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V1R18_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3(3), CAT|III, CCI|CCI-000366, Group-ID|V-59369, Rule-ID|SV-208802r603263_rule, STIG-ID|OL6-00-000023, STIG-Legacy|SV-73799, STIG-Legacy|V-59369, Vuln-ID|V-208802

Plugin: Unix

Control ID: 56c1ad86ffda177ac8ed7cb6372d755078ce2bd15f740c9140cc3a5ab5990132