RHEL-07-020021 - The Red Hat Enterprise Linux operating system must confine SELinux users to roles that conform to least privilege.

Information

Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges.

Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Nonprivileged users are individuals who do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from nonprivileged users.

Solution

Configure the operating system to confine SELinux users to roles that conform to least privilege.

Use the following command to map the 'staff_u' SELinux user to the 'staff_r' and 'sysadm_r' roles:

$ sudo semanage user -m staff_u -R staff_r -R sysadm_r

Use the following command to map the 'user_u' SELinux user to the 'user_r' role:

$ sudo semanage -m user_u -R user_r

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_7_V3R14_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3(4), 800-53|AC-6(10), CAT|II, CCI|CCI-002165, CCI|CCI-002235, Rule-ID|SV-250312r928579_rule, STIG-ID|RHEL-07-020021, Vuln-ID|V-250312

Plugin: Unix

Control ID: 9e74c986de8497c3f9c4682cc6702f8339ebdfff3f88414a6d5c1f6c5854d2b8