Information
To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restrict unused or unnecessary physical and logical ports/protocols on information systems.
Additionally, operating system remote access functionality must have the capability to immediately disconnect current users remotely accessing the information system and/or disable further remote access. The speed of disconnect or disablement varies based on the criticality of mission functions and the need to eliminate immediate or future remote access to organizational information systems.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Configure SLEM 5 is configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments.
Add/modify /etc/firewalld configuration files to comply with the PPSM CAL.
Enable and start the "firewalld.service" by running the following command:
> sudo systemctl enable firewalld.service --now
To immediately disable remote access and disconnect all current remote connections, the firewall needs to be set into panic mode.
> sudo firewall-cmd --panic-on
To allow remote access, panic mode needs to be disabled.
> sudo firewall-cmd --panic-off
Item Details
Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT
References: 800-53|AC-17(1), 800-53|AC-17(9), 800-53|CM-6b., 800-53|CM-7b., CAT|II, CCI|CCI-000366, CCI|CCI-000382, CCI|CCI-002314, CCI|CCI-002322, Rule-ID|SV-261310r996401_rule, STIG-ID|SLEM-05-251010, Vuln-ID|V-261310
Control ID: d6edcad1f20283a8fc3d7a09743122f7f339bece353cc2827e8cf964524e3f2d