CIS Red Hat Enterprise Linux 5 Benchmark
137 pages
English

CIS Red Hat Enterprise Linux 5 Benchmark

-

Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres
137 pages
English
Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres

Description

CIS Red Hat Enterprise Linux Benchmark, v1.1 (2008/04) Red Hat Enterprise Linux 5 (RHEL5) CIS Benchmark Version 1.1 April 2008 Copyright 2001-2008, The Center for Internet Security http://cisecurity.org Editor: Joe Wulf, ProSync Technology cis-feedback@cisecurity.org 1 of 137 CIS Red Hat Enterprise Linux Benchmark, v1.1 (2008/04) THIS PAGE INTENTIONALLY LEFT BLANK 2 of 137 CIS Red Hat Enterprise Linux Benchmark, v1.1 (2008/04) [CIS RHEL5 Benchmark] Table of Contents 1 CIS RED HAT ENTERPRISE LINUX 5 BENCHMARK ........................................................... 11 Introduction....................................................................................................................... 11 Feedback is welcome ........................................ 11 Applying CIS Benchmark Recommendations .. 11 Audience ........................................................... 12 Applicability ..................................................................................................................... 12 Precedence of Benchmark-Compliance Audit .................................. 12 Partitioning Considerations .............................. 13 Software Package Removal ................................................................................................ 14 Backup Key Files ..................................................................................... ...

Informations

Publié par
Nombre de lectures 112
Langue English

Extrait

CIS Red Hat Enterprise Linux Benchmark, v1.1 (2008/04)










Red Hat Enterprise Linux 5 (RHEL5)

CIS Benchmark Version 1.1

April 2008







Copyright 2001-2008, The Center for Internet Security
http://cisecurity.org






Editor: Joe Wulf, ProSync Technology
cis-feedback@cisecurity.org







1 of 137 CIS Red Hat Enterprise Linux Benchmark, v1.1 (2008/04)
THIS PAGE INTENTIONALLY LEFT BLANK

2 of 137 CIS Red Hat Enterprise Linux Benchmark, v1.1 (2008/04)

[CIS RHEL5 Benchmark]
Table of Contents

1 CIS RED HAT ENTERPRISE LINUX 5 BENCHMARK ........................................................... 11
Introduction....................................................................................................................... 11
Feedback is welcome ........................................ 11
Applying CIS Benchmark Recommendations .. 11
Audience ........................................................... 12
Applicability ..................................................................................................................... 12
Precedence of Benchmark-Compliance Audit .................................. 12
Partitioning Considerations .............................. 13
Software Package Removal ................................................................................................ 14
Backup Key Files .............................................................................................................................................. 14
Executing Actions ............. 15
A Root Shell Environment Is Assumed ............ 16
Software Package Installation ........................................................................................................................... 17
Vulnerabilities................................................... 17
SELinux ............................ 18
About Bastille 18
Reboot Required ............................................................................................................... 18
Housekeeping, prepatory to accomplishing the remainder of the Benchmark: ................ 19
Conventions ...................................................... 19
2 PATCHES, PACKAGES AND INITIAL LOCKDOWN .............................................................. 21
2.1 Apply Latest OS Patches ............................................................................................ 21
2.2 Validate The System Before Making Changes ........................... 22
2.3 Configure SSH ............................................................................................................................................ 22
2.4 Enable System Accounting ......................... 25
3 MINIMIZE XINETD NETWORK SERVICES ............. 27
3.1 Disable Standard Services .......................................................................................................................... 27
3.1t - Table of xinetd services (usage of these are deprecated) ........................................ 27
3.2 Configure TCP Wrappers and Firewall to Limit Access ............................................ 29
3.3 Only Enable telnet, If Absolutely Necessary .............................. 31
3.4 Onlye FTP, If Absolutely Necessary ................................ 32
3.5 Only Enable rlogin/rsh/rcp, If Absolutely Necessary ................................................. 33
3.6 Onlye TFTP Server, If Absolutely Necessary .................................................. 34
3.7 Only Enable cyrus-imapd, If Absolutely Necessary ................... 35
3.8 Onlye dovcot, If Absolutely Necessary ............................................................ 35
4 MINIMIZE BOOT SERVICES ....................................................................................................... 37
4t Table of RHEL5 inetd/boot Services ............ 37
4.1 Set Daemon umask ..................................... 40
4.2 Disable xinetd, If Possible .......................................................................................... 40
4.3 Ensure sendmail is only listening to the localhost, If Possible ................................... 41
4.4 Disable GUI Login, If Possible................................................... 42
4.5 Disable X Font Server, If Possible.............................................. 43
4.6 Disable Standard Boot Services .................................................. 44
4.7 Only Enable SMB (Windows File Sharing) Processes, If Absolutely Necessary ...... 47
3 of 137 CIS Red Hat Enterprise Linux Benchmark, v1.1 (2008/04)
4.8 Only Enable NFS Server Processes, If Absolutely Necessary ................................................................... 48
4.9 Onlye NFS Client Processes, If Absolutely Necessary .... 48
4.10 Only Enable NIS Client Processes, If Absolutely Necessary ... 49
4.11 Onlyle NIS Server Processes, If Absolutely Necessary .. 49
4.12 Only Enable RPC Portmap Process, If Absolutely Necessary ................................................................. 50
4.13 Onlyle netfs Script, If Absolutely Necessary .................................................. 50
4.14 Only Enable Printer Daemon Processes, If Absolutely Necessary ........................... 51
4.15 Onlyle Web Server Processes, If Absolutely Necessary . 52
4.16 Only Enable SNMP Processes, If Absolutely Necessary ......................................................................... 53
4.17 Onlyle DNS Server Process, If Absolutely Necessary .... 53
4.18 Only Enable SQL Server Processes, If Absolutely Necessary . 54
4.19 Onlyle Squid Cache Server, If Absolutely Necessary ..... 55
4.20 Only Enable Kudzu Hardware Detection, If Absolutely Necessary ......................................................... 55
5 SYSTEM NETWORK PARAMETER TUNING ........................................... 57
5.1 Network Parameter Modifications .............................................................................. 57
5.2 Additional Network Parameter Modifications ............................ 59
6 LOGGING .......................................................................... 61
6.1 Capture Messages Sent To syslog AUTHPRIV Facility ............................................ 61
6.2 Turn On Additional Logging For FTP Daemon ......................... 62
6.3 Confirm Permissions On System Log Files ................................................................ 63
6.4 Configure syslogd to Send Logs to a Remote LogHost .............. 66
7 FILE AND DIRECTORY PERMISSIONS/ACCESS ................................... 67
7.1 Add 'nodev' Option To Appropriate Partitions In /etc/fstab ....................................... 67
7.2 Add 'nosuid' and 'nodev' Option For Removable Media In /etc/fstab......................... 68
7.3 Disable User-Mounted Removable File Systems ....................................................................................... 70
7.4 Verify passwd, shadow, and group File Permissions ................. 71
7.5 Ensure World-Writable Directories Have Their Sticky Bit Set .................................. 71
7.6 Find Unauthorized World-Writable Files ................................................................... 72
7.7 Find Unauthorized SUID/SGID System Executables ................................................. 72
7.8 Find All Unowned Directories and Files .... 75
7.9 Disable USB Devices ................................................................. 76
8 SYSTEM ACCESS, AUTHENTICATION, AND AUTHORIZATION ...... 79
8.1 Remove .rhosts Support In PAM Configuration Files ................................................................................ 79
8.2 Create ftpusers Files ................................................................... 80
8.3 Prevent X Server From Listening On Port 6000/tcp ................... 81
8.4 Restrict at/cron To Authorized Users ......... 82
8.5 Restrict Permissions On crontab Files ........................................................................ 82
8.6 Restrict Root Logins To System Console ................................... 83
8.7 Set GRUB Password ................................... 85
8.8 Require Authentication For Single-User Mode .......................................................... 85
8.9 Restrict NFS Client Requests To Privileged Ports ..................................................... 86
8.10 Only Enable syslog To Accept Messages, If Absolutely Necessary ........................ 87
9 USER ACCOUNTS AND ENVIRONMENT .................................................. 89
9.1 Block Login of System Accounts ............................................................................... 89
9.2 Verify That There Are No Accounts With Empty Password Fields ........................... 90
9.3 Set Account Expiration Parameters On Active Accounts ........................................... 90
9.4 Verify No Legacy '+' Entries Exist In passwd, shadow, And group Files .................. 91
9.5 No '.' or Group/World-Writable Directory In Root's $PATH ..................................... 92
4 of 137 CIS Red Hat Enterprise Linux Benchmark, v1.1 (2008/04)
9

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents