RHEL-10-200562 - RHEL 10 must block unauthorized peripherals before establishing a connection.

Information

The USBGuard-daemon is the main component of the USBGuard software framework. It runs as a service in the background and enforces the USB device authorization policy for all USB devices. The policy is defined by a set of rules using a rule language described in the "usbguard-rules.conf" file. The policy and the authorization state of USB devices can be modified during runtime using the usbguard tool.

The system administrator (SA) must work with the site information system security officer (ISSO) to determine a list of authorized peripherals and establish rules within the USBGuard software framework to allow only authorized devices.

Solution

Configure RHEL 10 to enable the blocking of unauthorized peripherals with the following command:

Note: This command must be run from a root shell and will create an allowlist for any USB devices currently connected to the system.

# usbguard generate-policy --no-hash > /etc/usbguard/rules.conf

Note: Enabling and starting usbguard without properly configuring it for an individual system will immediately prevent any access over a USB device such as a keyboard or mouse.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_10_V1R1_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-3, CAT|II, CCI|CCI-001958, Rule-ID|SV-280964r1165247_rule, STIG-ID|RHEL-10-200562, Vuln-ID|V-280964

Plugin: Unix

Control ID: 6a5164ccbfceac653c9195e183e6625d0ef8506ec30b6af984ec758dc4d6c8ef