Definition of Security Profile Application Guide for Oracle Linux 9 for ol9
based on https://www.ccn-cert.cni.es/es/guias-de-acceso-publico-ccn-stic/6669-ccn-stic-620-guia-de-aplicaciones-de-perfilado-de-seguridad-para-oracle-linux/file.html
reload_dconf_db: Reload Dconf Database
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
- dconf_db_up_to_date: Make sure that the dconf databases are up-to-date with regards to respective keyfiles
enable_authselect: Enable Authselect
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.3.SEC-OL1: Session Initiation is Audited
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.3.SEC-OL2: Control Who Can Access Security and Audit Logs
Description: None
Levels:
Automated: yes
Selections:
A.3.SEC-OL3: System Time Change is Controlled
Description: None
Levels:
Automated: yes
Selections:
A.3.SEC-OL4: Control Who Can Generate or Modify Audit Rules
Description: None
Levels:
Automated: yes
Selections:
A.3.SEC-OL5: A Detailed Audit Has Been Implemented Based on Subcategories
Description: None
Levels:
Automated: no
No rules selected
A.3.SEC-OL6: At Least 90 Days of Activity Logs Are Guaranteed
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.3.SEC-OL7: Modifications to the Sudoers File Are Audited, As Are Changes to Permissions, Users, Groups, and Passwords
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.3.SEC-OL8: Changes to Cron Settings and Scheduled Tasks Including Startup Scripts Are Audited
Description: None
Levels:
Automated: no
No rules selected
A.3.SEC-OL9: Attempts to Access Critical Items Are Audited
Description: None
Levels:
Automated: yes
Selections:
A.3.SEC-OL10: All Mount Operations on the System and Changes to the Swap Are Audited
Description: None
Levels:
Automated: no
Selections:
A.3.SEC-OL11: Modifications in PAM Files Are Audited
Description: None
Levels:
Automated: no
No rules selected
A.4.SEC-OL1: Common Users Do Dot Have Local Administrator Permissions and Are Not Included in a Sudo Group
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.4.SEC-OL2: The System Has an Updated Antivirus
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.4.SEC-OL3: Permissions by Partitions Are Modified
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.5.SEC-OL1: Login and Impersonation Permissions Are Controlled
Description: None
Levels:
Automated: yes
Selections:
A.5.SEC-OL2: Elevation Attempts Are Controlled by Defining Users and Sudoer Groups
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.5.SEC-OL3: Access to Encryption Keys is Controlled
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.5.SEC-OL4: Disable Insecure Encryption Algorithms
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.5.SEC-OL5: Recurring Password Change is Required
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.5.SEC-OL6: Secure Protocols Are Used For the Network Authentication Processes
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.5.SEC-OL7: Network Session Inactivity is Controlled
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.5.SEC-OL8: Local and Remote Console Inactivity is Controlled
Description: None
Levels:
Automated: yes
Selections:
A.6.SEC-OL1: The Security of Sensitive System Objects is Reinforced
Description: None
Levels:
Automated: yes
Selections:
A.6.SEC-OL2: Access in Recovery Mode Including Grub Boot Modification Mode is Restricted
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.6.SEC-OL3: Service Users Shell is Limited to "/bin/false"
Description: None
Levels:
Automated: yes
Selections:
A.6.SEC-OL4: The Use of Sessions With the "root" User is Restricted
Description: None
Levels:
Automated: yes
Selections:
A.6.SEC-OL5: The Global System Mask is Modified To Be More Restrictive
Description: None
Levels:
Automated: yes
Selections:
A.6.SEC-OL6: Unnecessary Groups and Users are Removed From the System
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.8.SEC-OL1: Control Who Can Install Software on the System
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.8.SEC-OL2: The Operating System is Updated
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.8.SEC-OL3: The System Has an Activated Local Firewall
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.8.SEC-OL4: Unnecessary Services are Disabled, Reducing the Attack Surface
Description: None
Levels:
Automated: yes
Selections:
A.8.SEC-OL5: Application Execution is Controlled
Description: None
Levels:
Automated: no
No rules selected
A.8.SEC-OL6: Anti-Ransomware Measures are Enabled
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
Selections:
A.8.SEC-OL7: Password Encrypted Boot That Prevents Modification is Enabled (Protected GRUB)
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.8.SEC-OL8: File Download is Audited
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.8.SEC-OL9: System Compilers are Disabled
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.11.SEC-OL1: Local Log On To the System is Controlled
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.11.SEC-OL2: The Security of the SSH Protocol is Strengthened
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.11.SEC-OL3: A Robust Credential Policy is In Place
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.11.SEC-OL4: During Login, the System Displays a Text in Compliance With the Organization's Standards or Directives
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.11.SEC-OL5: Network Acess to the System is Controlled
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.11.SEC-OL6: Only Strong Encryption Algorithms are Allowed in Accesses to the System
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
No rules selected
A.11.SEC-OL7: GUI Idle Time is Limited
Description: None
Levels:
Automated: yes
Selections:
A.11.SEC-OL8: A Dissuasive Banner is Displayed
Description: None
Levels:
Automated: no
No rules selected
A.11.SEC-OL9: The User List is Disabled
Description: None
Levels:
Automated: yes
Selections:
A.11.SEC-OL10: File History is Disabled
Description: None
Levels:
Automated: no
No rules selected
A.11.SEC-OL11: Key Combination to Launch GTK Inspector is Disabled
Description: None
Levels:
Automated: no
No rules selected
A.11.SEC-OL12: Auto-Mounting of Removable Devices on the System is Disabled
Description: None
Levels:
Automated: yes
Selections:
A.15.SEC-OL1: The Use of Removable Storage Media is Controlled
Description: None
Levels:
Automated: yes
Selections:
A.19.SEC-OL1: Access to the Folder and File Tree is Controlled
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.19.SEC-OL2: Measures Are Applied to Protect Accounts
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.19.SEC-OL3: A Robust Algorithm and Password Complexity Are Enabled
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.23.SEC-OL1: The Installation And Use of Any Device Connected to the Equipment is Controlled
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: yes
Selections:
A.23.SEC-OL2: The Dynamic Mounting and Unmounting of File Systems is Restricted
Description: None
Levels:
- basic
- intermediate
- advanced
Automated: no
No rules selected
A.24.SEC-OL1: Privileges That Affect System Performance Are Controlled
Description: None
Levels:
Automated: no
No rules selected
A.24.SEC-OL2: Control Who Can Turn Off the System
Description: None
Levels:
Automated: no
No rules selected
A.25.SEC-OL1: System Disk is Encrypted
Description: None
Levels:
Automated: yes
Selections:
A.25.SEC-OL2: The Data Disk is Encrypted
Description: None
Levels:
Automated: yes
No rules selected
A.30.SEC-OL1: There Is an Account Lockout Policy for Incorrect Logins
Description: None
Levels:
Automated: yes
Selections: