RHEL-06-000023 - The system must use a Linux Security Module configured to limit the privileges of system services.

Information

Setting the SELinux policy to 'targeted' or a more specialized policy ensures the system will confine processes that are likely to be targeted for exploitation, such as network or system services.

Solution

The SELinux 'targeted' policy is appropriate for general-purpose desktops and servers, as well as systems in many other roles. To configure the system to use this policy, add or correct the following line in '/etc/selinux/config':

SELINUXTYPE=targeted

Other policies, such as 'mls', provide additional security labeling and greater confinement but are not compatible with many general-purpose use cases.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R2_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3(4), 800-53|AC-6(10), CAT|III, CCI|CCI-002165, CCI|CCI-002235, Rule-ID|SV-217863r603264_rule, STIG-ID|RHEL-06-000023, STIG-Legacy|SV-65579, STIG-Legacy|V-51369, Vuln-ID|V-217863

Plugin: Unix

Control ID: 572f477ae981c5ac166945dfef00d4e1dee99223c1b348e42f9c52100704f4db