Definition of Security Profile Application Guide for Oracle Linux 9 for ol9

based on https://www.ccn-cert.cni.es/es/guias-de-acceso-publico-ccn-stic/6669-ccn-stic-620-guia-de-aplicaciones-de-perfilado-de-seguridad-para-oracle-linux/file.html

reload_dconf_db: Reload Dconf Database

Description: None

Levels:

Automated: yes

Selections:

enable_authselect: Enable Authselect

Description: None

Levels:

Automated: yes

Selections:

A.3.SEC-OL1: Session Initiation is Audited

Description: None

Levels:

Automated: yes

Selections:

A.3.SEC-OL2: Control Who Can Access Security and Audit Logs

Description: None

Levels:

Automated: yes

Selections:

A.3.SEC-OL3: System Time Change is Controlled

Description: None

Levels:

Automated: yes

Selections:

A.3.SEC-OL4: Control Who Can Generate or Modify Audit Rules

Description: None

Levels:

Automated: yes

Selections:

A.3.SEC-OL5: A Detailed Audit Has Been Implemented Based on Subcategories

Description: None

Levels:

Automated: no

No rules selected

A.3.SEC-OL6: At Least 90 Days of Activity Logs Are Guaranteed

Description: None

Levels:

Automated: yes

Selections:

A.3.SEC-OL7: Modifications to the Sudoers File Are Audited, As Are Changes to Permissions, Users, Groups, and Passwords

Description: None

Levels:

Automated: yes

Selections:

A.3.SEC-OL8: Changes to Cron Settings and Scheduled Tasks Including Startup Scripts Are Audited

Description: None

Levels:

Automated: no

No rules selected

A.3.SEC-OL9: Attempts to Access Critical Items Are Audited

Description: None

Levels:

Automated: yes

Selections:

A.3.SEC-OL10: All Mount Operations on the System and Changes to the Swap Are Audited

Description: None

Levels:

Automated: no

Selections:

A.3.SEC-OL11: Modifications in PAM Files Are Audited

Description: None

Levels:

Automated: no

No rules selected

A.4.SEC-OL1: Common Users Do Dot Have Local Administrator Permissions and Are Not Included in a Sudo Group

Description: None

Levels:

Automated: no

No rules selected

A.4.SEC-OL2: The System Has an Updated Antivirus

Description: None

Levels:

Automated: no

No rules selected

A.4.SEC-OL3: Permissions by Partitions Are Modified

Description: None

Levels:

Automated: no

No rules selected

A.5.SEC-OL1: Login and Impersonation Permissions Are Controlled

Description: None

Levels:

Automated: yes

Selections:

A.5.SEC-OL2: Elevation Attempts Are Controlled by Defining Users and Sudoer Groups

Description: None

Levels:

Automated: yes

Selections:

A.5.SEC-OL3: Access to Encryption Keys is Controlled

Description: None

Levels:

Automated: no

No rules selected

A.5.SEC-OL4: Disable Insecure Encryption Algorithms

Description: None

Levels:

Automated: yes

Selections:

A.5.SEC-OL5: Recurring Password Change is Required

Description: None

Levels:

Automated: yes

Selections:

A.5.SEC-OL6: Secure Protocols Are Used For the Network Authentication Processes

Description: None

Levels:

Automated: yes

Selections:

A.5.SEC-OL7: Network Session Inactivity is Controlled

Description: None

Levels:

Automated: yes

Selections:

A.5.SEC-OL8: Local and Remote Console Inactivity is Controlled

Description: None

Levels:

Automated: yes

Selections:

A.6.SEC-OL1: The Security of Sensitive System Objects is Reinforced

Description: None

Levels:

Automated: yes

Selections:

A.6.SEC-OL2: Access in Recovery Mode Including Grub Boot Modification Mode is Restricted

Description: None

Levels:

Automated: yes

Selections:

A.6.SEC-OL3: Service Users Shell is Limited to "/bin/false"

Description: None

Levels:

Automated: yes

Selections:

A.6.SEC-OL4: The Use of Sessions With the "root" User is Restricted

Description: None

Levels:

Automated: yes

Selections:

A.6.SEC-OL5: The Global System Mask is Modified To Be More Restrictive

Description: None

Levels:

Automated: yes

Selections:

A.6.SEC-OL6: Unnecessary Groups and Users are Removed From the System

Description: None

Levels:

Automated: no

No rules selected

A.8.SEC-OL1: Control Who Can Install Software on the System

Description: None

Levels:

Automated: no

No rules selected

A.8.SEC-OL2: The Operating System is Updated

Description: None

Levels:

Automated: no

No rules selected

A.8.SEC-OL3: The System Has an Activated Local Firewall

Description: None

Levels:

Automated: yes

Selections:

A.8.SEC-OL4: Unnecessary Services are Disabled, Reducing the Attack Surface

Description: None

Levels:

Automated: yes

Selections:

A.8.SEC-OL5: Application Execution is Controlled

Description: None

Levels:

Automated: no

No rules selected

A.8.SEC-OL6: Anti-Ransomware Measures are Enabled

Description: None

Levels:

Automated: no

Selections:

A.8.SEC-OL7: Password Encrypted Boot That Prevents Modification is Enabled (Protected GRUB)

Description: None

Levels:

Automated: yes

Selections:

A.8.SEC-OL8: File Download is Audited

Description: None

Levels:

Automated: no

No rules selected

A.8.SEC-OL9: System Compilers are Disabled

Description: None

Levels:

Automated: no

No rules selected

A.11.SEC-OL1: Local Log On To the System is Controlled

Description: None

Levels:

Automated: no

No rules selected

A.11.SEC-OL2: The Security of the SSH Protocol is Strengthened

Description: None

Levels:

Automated: yes

Selections:

A.11.SEC-OL3: A Robust Credential Policy is In Place

Description: None

Levels:

Automated: yes

Selections:

A.11.SEC-OL4: During Login, the System Displays a Text in Compliance With the Organization's Standards or Directives

Description: None

Levels:

Automated: yes

Selections:

A.11.SEC-OL5: Network Acess to the System is Controlled

Description: None

Levels:

Automated: no

No rules selected

A.11.SEC-OL6: Only Strong Encryption Algorithms are Allowed in Accesses to the System

Description: None

Levels:

Automated: yes

No rules selected

A.11.SEC-OL7: GUI Idle Time is Limited

Description: None

Levels:

Automated: yes

Selections:

A.11.SEC-OL8: A Dissuasive Banner is Displayed

Description: None

Levels:

Automated: no

No rules selected

A.11.SEC-OL9: The User List is Disabled

Description: None

Levels:

Automated: yes

Selections:

A.11.SEC-OL10: File History is Disabled

Description: None

Levels:

Automated: no

No rules selected

A.11.SEC-OL11: Key Combination to Launch GTK Inspector is Disabled

Description: None

Levels:

Automated: no

No rules selected

A.11.SEC-OL12: Auto-Mounting of Removable Devices on the System is Disabled

Description: None

Levels:

Automated: yes

Selections:

A.15.SEC-OL1: The Use of Removable Storage Media is Controlled

Description: None

Levels:

Automated: yes

Selections:

A.19.SEC-OL1: Access to the Folder and File Tree is Controlled

Description: None

Levels:

Automated: no

No rules selected

A.19.SEC-OL2: Measures Are Applied to Protect Accounts

Description: None

Levels:

Automated: no

No rules selected

A.19.SEC-OL3: A Robust Algorithm and Password Complexity Are Enabled

Description: None

Levels:

Automated: yes

Selections:

A.23.SEC-OL1: The Installation And Use of Any Device Connected to the Equipment is Controlled

Description: None

Levels:

Automated: yes

Selections:

A.23.SEC-OL2: The Dynamic Mounting and Unmounting of File Systems is Restricted

Description: None

Levels:

Automated: no

No rules selected

A.24.SEC-OL1: Privileges That Affect System Performance Are Controlled

Description: None

Levels:

Automated: no

No rules selected

A.24.SEC-OL2: Control Who Can Turn Off the System

Description: None

Levels:

Automated: no

No rules selected

A.25.SEC-OL1: System Disk is Encrypted

Description: None

Levels:

Automated: yes

Selections:

A.25.SEC-OL2: The Data Disk is Encrypted

Description: None

Levels:

Automated: yes

No rules selected

A.30.SEC-OL1: There Is an Account Lockout Policy for Incorrect Logins

Description: None

Levels:

Automated: yes

Selections: