SLEM-05-251010 - SLEM 5 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.

Information

To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restrict unused or unnecessary physical and logical ports/protocols on information systems.

Additionally, operating system remote access functionality must have the capability to immediately disconnect current users remotely accessing the information system and/or disable further remote access. The speed of disconnect or disablement varies based on the criticality of mission functions and the need to eliminate immediate or future remote access to organizational information systems.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure SLEM 5 is configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments.

Add/modify /etc/firewalld configuration files to comply with the PPSM CAL.

Enable and start the "firewalld.service" by running the following command:

> sudo systemctl enable firewalld.service --now

To immediately disable remote access and disconnect all current remote connections, the firewall needs to be set into panic mode.

> sudo firewall-cmd --panic-on

To allow remote access, panic mode needs to be disabled.

> sudo firewall-cmd --panic-off

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SLEM_5_V1R2_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-17(1), 800-53|AC-17(9), 800-53|CM-6b., 800-53|CM-7b., CAT|II, CCI|CCI-000366, CCI|CCI-000382, CCI|CCI-002314, CCI|CCI-002322, Rule-ID|SV-261310r996401_rule, STIG-ID|SLEM-05-251010, Vuln-ID|V-261310

Plugin: Unix

Control ID: d6edcad1f20283a8fc3d7a09743122f7f339bece353cc2827e8cf964524e3f2d