Guide to the Secure Configuration of Red Hat Enterprise Linux 6 (PCI-DSS centric)
scap-security-guide
package which is developed at
https://www.open-scap.org/security-policies/scap-security-guide.
Providing system administrators with such guidance informs them how to securely configure systems under their control in a variety of network roles. Policy makers and baseline creators can use this catalog of settings, with its associated references to higher-level security control catalogs, in order to assist them in security baseline creation. This guide is a catalog, not a checklist, and satisfaction of every item is not likely to be possible or sensible in many operational scenarios. However, the XCCDF format enables granular selection and adjustment of settings, and their association with OVAL and OCIL content provides an automated checking capability. Transformations of this document, and its associated automated checking content, are capable of providing baselines that meet a diverse set of policy objectives. Some example XCCDF Profiles, which are selections of items that form checklists and can be used as baselines, are available with this guide. They can be processed, in an automated fashion, with tools that support the Security Content Automation Protocol (SCAP). The DISA STIG for Red Hat Enterprise Linux 6, which provides required settings for US Department of Defense systems, is one example of a baseline created from this guidance.
This benchmark is a direct port of a SCAP Security Guide benchmark developed for Red Hat Enterprise Linux. It has been modified through an automated process to remove specific dependencies on Red Hat Enterprise Linux and to function with CentOS. The result is a generally useful SCAP Security Guide benchmark with the following caveats:
- CentOS is not an exact copy of Red Hat Enterprise Linux. There may be configuration differences that produce false positives and/or false negatives. If this occurs please file a bug report.
- CentOS has its own build system, compiler options, patchsets, and is a community supported, non-commercial operating system. CentOS does not inherit certifications or evaluations from Red Hat Enterprise Linux. As such, some configuration rules (such as those requiring FIPS 140-2 encryption) will continue to fail on CentOS.
Members of the CentOS community are invited to participate in OpenSCAP and SCAP Security Guide development. Bug reports and patches can be sent to GitHub: https://github.com/OpenSCAP/scap-security-guide. The mailing list is at https://fedorahosted.org/mailman/listinfo/scap-security-guide.
Profile ID | (default) |
---|
Revision History
Current version: 0.1.36
- draft (as of 2018-04-13)
Platforms
- cpe:/o:redhat:enterprise_linux:6
- cpe:/o:centos:centos:6
- cpe:/o:redhat:enterprise_linux:6::client
- cpe:/o:redhat:enterprise_linux:6::computenode
Table of Contents
Checklist
2. [ref]groupDo not use vendor-supplied defaults for system passwords and other |
2.1 [ref]groupAlways change vendor-supplied |
2.1.1 [ref]groupFor wireless environments |
2.1.1.a [ref]groupInterview responsible personnel and examine |
2.1.1.b [ref]groupInterview personnel and examine policies and |
2.1.1.c [ref]groupExamine vendor documentation and login to |
2.1.1.d [ref]groupExamine vendor documentation and observe |
2.1.1.e [ref]groupExamine vendor documentation and observe |
2.1.a [ref]groupChoose a sample of system components, and attempt |
2.1.b [ref]groupFor the sample of system components, verify that all |
2.1.c [ref]groupInterview personnel and examine supporting |
2.2 [ref]groupDevelop configuration standards for |
2.2.1 [ref]groupImplement only one primary |
2.2.1.a [ref]groupSelect a sample of system components and |
2.2.1.b [ref]groupIf virtualization technologies are used, inspect the |
2.2.2 [ref]groupEnable only necessary services, |
2.2.2.a [ref]groupSelect a sample of system components and |
2.2.2.b [ref]groupIdentify any enabled insecure services, daemons, |
2.2.3 [ref]groupImplement additional security |
2.2.3.a [ref]groupInspect configuration settings to verify that security |
2.2.4 [ref]groupConfigure system security |
2.2.4.a [ref]groupInterview system administrators and/or security |
2.2.4.b [ref]groupExamine the system configuration standards to |
2.2.4.c [ref]groupSelect a sample of system components and |
2.2.5 [ref]groupRemove all unnecessary |
2.2.5.a [ref]groupSelect a sample of system components and |
2.2.5.b [ref]group. Examine the documentation and security |
2.2.5.c [ref]group. Examine the documentation and security |
2.2.a [ref]group |
2.2.b [ref]groupExamine policies and interview personnel to |
2.2.c [ref]groupExamine policies and interview personnel to |
2.2.d [ref]groupVerify that system configuration standards include the |
2.3 [ref]groupEncrypt all non-console |
2.3.a [ref]groupObserve an administrator log on to each system and |
2.3.b [ref]groupReview services and parameter files on systems to |
2.3.c [ref]groupObserve an administrator log on to each system to |
2.3.d [ref]groupExamine vendor documentation and interview |
2.4 [ref]groupMaintain an inventory of system |
2.4.a [ref]groupExamine system inventory to verify that a list of |
2.4.b [ref]groupInterview personnel to verify the documented inventory |
2.5 [ref]groupEnsure that security policies and |
2.6 [ref]groupShared hosting providers must |
3. [ref]groupProtect stored cardholder data |
3.1 [ref]groupKeep cardholder data storage to a |
3.1.a [ref]groupExamine the data retention and disposal policies, |
3.1.b [ref]groupInterview personnel to verify that: |
3.1.c [ref]groupFor a sample of system components that store cardholder |
3.2 [ref]groupDo not store sensitive authentication |
3.2.1 [ref]groupDo not store the full contents of |
3.2.2 [ref]groupDo not store the card verification |
3.2.3 [ref]groupDo not store the personal |
3.2.a [ref]groupFor issuers and/or companies that support issuing |
3.2.b [ref]groupFor issuers and/or companies that support issuing |
3.2.c [ref]groupFor all other entities, if sensitive authentication data is |
3.2.d [ref]groupFor all other entities, if sensitive authentication data is |
3.3 [ref]groupMask PAN when displayed (the first |
3.3.a [ref]groupExamine written policies and procedures for masking the |
3.3.b [ref]groupExamine system configurations to verify that full PAN is |
3.3.c [ref]groupExamine displays of PAN (for example, on screen, on |
3.4 [ref]groupRender PAN unreadable anywhere it |
3.4.1 [ref]groupIf disk encryption is used (rather |
3.4.1.a [ref]groupIf disk encryption is used, inspect the configuration |
3.4.1.b [ref]groupObserve processes and interview personnel to verify |
3.4.1.c [ref]groupExamine the configurations and observe the |
3.4.a [ref]groupExamine documentation about the system used to protect |
3.4.b [ref]groupExamine several tables or files from a sample of data |
3.4.c [ref]groupExamine a sample of removable media (for example, |
3.4.d [ref]groupExamine a sample of audit logs to confirm that the PAN is |
3.4.e [ref]groupIf |
3.5 [ref]groupDocument and implement |
3.5.1 [ref]groupRestrict access to cryptographic |
3.5.2 [ref]groupStore secret and private keys |
3.5.2.a [ref]groupExamine documented procedures to verify that |
3.5.2.b [ref]groupExamine system configurations and key storage |
3.5.2.c [ref]groupWherever key-encrypting keys are used, examine |
3.5.3 [ref]groupStore cryptographic keys in the |
3.6 [ref]groupFully document and implement all |
3.6.1 [ref]groupGeneration of strong |
3.6.1.a [ref]groupVerify that key-management procedures specify how |
3.6.1.b [ref]groupObserve the method for generating keys to verify that |
3.6.2 [ref]groupSecure cryptographic key |
3.6.2.a [ref]groupVerify that key-management procedures specify how |
3.6.2.b [ref]groupObserve the method for distributing keys to verify that |
3.6.3 [ref]groupSecure cryptographic key storage |
3.6.3.a [ref]groupVerify that key-management procedures specify how |
3.6.3.b [ref]groupObserve the method for storing keys to verify that |
3.6.4 [ref]groupCryptographic key changes for |
3.6.4.a [ref]groupVerify that key-management procedures include a |
3.6.4.b [ref]groupInterview personnel to verify that keys are changed at |
3.6.5 [ref]groupRetirement or replacement (for |
3.6.5.a [ref]groupVerify that key-management procedures specify |
3.6.5.b [ref]groupInterview personnel to verify the following processes |
3.6.6 [ref]groupIf manual clear-text cryptographic |
3.6.6.a [ref]groupVerify that manual clear-text key-management |
3.6.7 [ref]groupPrevention of unauthorized |
3.6.7.a [ref]groupVerify that key-management procedures specify |
3.6.7.b [ref]groupInterview personnel and/or observe processes to |
3.6.8 [ref]groupRequirement for cryptographic |
3.6.8.a [ref]groupVerify that key-management procedures specify |
3.6.8.b [ref]groupObserve documentation or other evidence showing |
3.6.b [ref]groupExamine the key-management procedures and processes |
3.7 [ref]groupEnsure that security policies and |
4. [ref]groupEncrypt transmission of cardholder data across open, public networks |
4.1 [ref]groupUse strong cryptography and security |
4.1.1 [ref]groupEnsure wireless networks transmitting |
4.1.a [ref]groupIdentify all locations where cardholder data is |
4.1.b [ref]groupReview documented policies and procedures to verify |
4.1.c [ref]groupSelect and observe a sample of inbound and outbound |
4.1.d [ref]groupExamine keys and certificates to verify that only |
4.1.e [ref]groupExamine system configurations to verify that the |
4.1.f [ref]groupExamine system configurations to verify that the proper |
4.1.g [ref]groupFor TLS implementations, examine system |
4.2 [ref]groupNever send unprotected PANs by end- |
4.2.a [ref]groupIf end-user messaging technologies are used to send |
4.2.b [ref]groupReview written policies to verify the existence of a |
4.3 [ref]groupEnsure that security policies and |
5. [ref]groupProtect all systems against malware and regularly update anti-virus |
5.1 [ref]groupDeploy anti-virus software on all |
5.1.1 [ref]groupEnsure that anti-virus programs |
5.1.2 [ref]groupFor systems considered to be not |
5.2 [ref]groupEnsure that all anti-virus mechanisms |
5.2.a [ref]groupExamine policies and procedures to verify that anti-virus |
5.2.b [ref]groupExamine anti-virus configurations, including the master |
5.2.c [ref]groupExamine a sample of system components, including all |
5.2.d [ref]groupExamine anti-virus configurations, including the master |
5.3 [ref]groupEnsure that anti-virus mechanisms |
5.3.a [ref]groupExamine anti-virus configurations, including the master |
5.3.b [ref]groupExamine anti-virus configurations, including the master |
5.3.c [ref]groupInterview responsible personnel and observe processes to |
5.4 [ref]groupEnsure that security policies and |
6. [ref]groupDevelop and maintain secure systems and applications |
6.1 [ref]groupEstablish a process to identify security |
6.1.a [ref]groupExamine policies and procedures to verify that |
6.1.b [ref]groupInterview responsible personnel and observe |
6.2 [ref]groupEnsure that all system components and |
6.2.a [ref]groupExamine policies and procedures related to security- |
6.2.b [ref]groupFor a sample of system components and related |
6.3 [ref]groupDevelop internal and external software |
6.3.1 [ref]groupRemove development, test and/or |
6.3.2 [ref]groupReview custom code prior to release |
6.3.2.a [ref]groupExamine written software-development procedures |
6.3.2.b [ref]groupSelect a sample of recent custom application |
6.3.a [ref]groupExamine written software-development processes to |
6.3.b [ref]groupExamine written software-development processes to |
6.3.c [ref]groupExamine written software-development processes to |
6.3.d [ref]groupInterview software developers to verify that written |
6.4 [ref]groupFollow change control processes and |
6.4.1 [ref]groupSeparate development/test |
6.4.1.a [ref]groupExamine network documentation and network |
6.4.1.b [ref]groupExamine access controls settings to verify that |
6.4.2 [ref]groupSeparation of duties between |
6.4.3 [ref]groupProduction data (live PANs) are not |
6.4.3.a [ref]groupObserve testing processes and interview |
6.4.3.b [ref]groupExamine a sample of test data to verify production |
6.4.4 [ref]groupRemoval of test data and accounts |
6.4.4.a [ref]groupObserve testing processes and interview |
6.4.4.b [ref]groupExamine a sample of data and accounts from |
6.4.5 [ref]groupChange control procedures for the |
6.4.5.a [ref]groupExamine documented change control procedures |
6.4.5.b [ref]groupFor a sample of system components, interview |
6.5 [ref]groupAddress common coding vulnerabilities in |
6.5.1 [ref]groupInjection flaws, particularly SQL |
6.5.10 [ref]groupBroken authentication and session |
6.5.2 [ref]groupBuffer overflows |
6.5.3 [ref]groupInsecure cryptographic storage |
6.5.4 [ref]groupInsecure communications |
6.5.5 [ref]groupImproper error handling |
6.5.6 [ref]groupExamine software-development policies and |
6.5.7 [ref]groupCross-site scripting (XSS) |
6.5.8 [ref]groupImproper access control (such as |
6.5.9 [ref]groupCross-site request forgery (CSRF) |
6.5.a [ref]groupExamine software-development policies and |
6.5.b [ref]groupInterview a sample of developers to verify that they are |
6.5.c [ref]groupExamine records of training to verify that software |
6.6 [ref]groupFor public-facing web applications, |
6.7 [ref]groupEnsure that security policies and |
7. [ref]groupRestrict access to cardholder data by business need to know |
7.1 [ref]groupLimit access to system |
7.1.1 [ref]groupDefine access needs for |
7.1.2 [ref]groupRestrict access to privileged |
7.1.2.a [ref]groupInterview personnel responsible for assigning access to |
7.1.2.b [ref]groupSelect a sample of user IDs with privileged access and |
7.1.3 [ref]groupAssign access based on |
7.1.4 [ref]groupRequire documented |
7.2 [ref]groupEstablish an access control |
7.2.1 [ref]groupCoverage of all system |
7.2.2 [ref]groupAssignment of privileges to |
7.2.3 [ref]group |
7.3 [ref]groupEnsure that security policies and |
8. [ref]groupIdentify and authenticate access to system components |
8.1 [ref]groupDefine and implement policies and |
8.1.1 [ref]groupAssign all users a unique ID |
8.1.2 [ref]groupControl addition, deletion, and |
8.1.3 [ref]groupImmediately revoke access for |
8.1.3.a [ref]groupSelect a sample of users terminated in the past six |
8.1.3.b [ref]groupVerify all physical authentication methods |
8.1.4 [ref]groupRemove/disable inactive user |
8.1.5 [ref]groupManage IDs used by vendors to |
8.1.5.a [ref]groupInterview personnel and observe processes for |
8.1.5.b [ref]groupInterview personnel and observe processes to verify |
8.1.6 [ref]groupLimit repeated access attempts |
8.1.6.a [ref]groupFor a sample of system components, inspect system |
8.1.6.b [ref]group |
8.1.7 [ref]groupSet the lockout duration to a |
8.1.8 [ref]groupIf a session has been idle for |
8.1.a [ref]groupReview procedures and confirm they define processes for |
8.1.b [ref]groupVerify that procedures are implemented for user |
8.2 [ref]groupIn addition to assigning a unique ID, |
8.2.1 [ref]groupUsing strong cryptography, |
8.2.1.a [ref]groupExamine vendor documentation and system |
8.2.1.b [ref]groupFor a sample of system components, examine |
8.2.1.c [ref]groupFor a sample of system components, examine data |
8.2.1.d [ref]group |
8.2.2 [ref]groupVerify user identity before |
8.2.3 [ref]groupPasswords/phrases must meet |
8.2.3.a [ref]groupFor a sample of system components, inspect system |
8.2.3.b [ref]group |
8.2.4 [ref]groupChange user |
8.2.4.a [ref]groupFor a sample of system components, inspect system |
8.2.4.b [ref]group |
8.2.5 [ref]groupDo not allow an individual to |
8.2.5.a [ref]groupFor a sample of system components, obtain and |
8.2.5.b [ref]group |
8.2.6 [ref]groupSet passwords/phrases for first- |
8.3 [ref]groupIncorporate two-factor authentication |
8.3.a [ref]groupExamine system configurations for remote access servers |
8.3.b [ref]groupObserve a sample of personnel (for example, users and |
8.4 [ref]groupDocument and communicate |
8.4.a [ref]groupExamine |
8.4.b [ref]groupReview authentication policies and procedures that are |
8.4.c [ref]groupInterview a sample of users to verify that they are familiar |
8.5 [ref]groupDo not use group, shared, or generic |
8.5.1 [ref]group |
8.5.a [ref]groupFor a sample of system components, examine user ID lists |
8.5.b [ref]groupExamine authentication policies and procedures to verify |
8.5.c [ref]groupInterview system administrators to verify that group and |
8.6 [ref]groupWhere other authentication |
8.6.a [ref]groupExamine authentication policies and procedures to verify |
8.6.b [ref]groupInterview security personnel to verify authentication |
8.6.c [ref]groupExamine system configuration settings and/or physical |
8.7 [ref]groupAll access to any database |
8.7.a [ref]groupReview database and application configuration settings |
8.7.b [ref]groupExamine database and application configuration settings to |
8.7.c [ref]groupExamine database access control settings and database |
8.7.d [ref]groupExamine database access control settings, database |
8.8 [ref]groupEnsure that security policies and |
10. [ref]groupTrack and monitor all access to network resources and cardholder data |
10.1 [ref]groupImplement audit trails to link all |
10.2 [ref]groupImplement automated audit trails for |
10.2.1 [ref]groupAll individual user accesses to |
10.2.2 [ref]groupAll actions taken by any |
10.2.3 [ref]groupAccess to all audit trails |
10.2.4 [ref]groupInvalid logical access attempts |
10.2.5 [ref]groupUse of and changes to |
10.2.5.a [ref]groupVerify use of identification and authentication |
10.2.5.b [ref]groupVerify all elevation of privileges is logged. |
10.2.5.c [ref]groupVerify all changes, additions, or deletions to any account |
10.2.6 [ref]groupInitialization, stopping, or |
10.2.7 [ref]groupCreation and deletion of system- |
10.3 [ref]groupRecord at least the following audit |
10.3.1 [ref]groupUser identification |
10.3.2 [ref]groupType of event |
10.3.3 [ref]groupDate and time |
10.3.4 [ref]groupSuccess or failure indication |
10.3.5 [ref]groupOrigination of event |
10.3.6 [ref]groupIdentity or name of affected |
10.4 [ref]groupUsing time-synchronization |
10.4.1 [ref]groupCritical systems have the |
10.4.1.a [ref]groupExamine the process for acquiring, distributing and |
10.4.1.b [ref]groupObserve the time-related system-parameter settings for |
10.4.2 [ref]groupTime data is protected. |
10.4.2.a [ref]groupExamine system configurations and time- |
10.4.2.b [ref]groupExamine system configurations, time synchronization |
10.4.3 [ref]groupTime settings are received from |
10.5 [ref]groupSecure audit trails so they cannot |
10.5.1 [ref]groupLimit viewing of audit trails to |
10.5.2 [ref]groupProtect audit trail files from |
10.5.3 [ref]groupPromptly back up audit trail files |
10.5.4 [ref]groupWrite logs for external-facing |
10.5.5 [ref]groupUse file-integrity monitoring or |
10.6 [ref]groupReview logs and security events for |
10.6.1 [ref]groupReview the following at least |
10.6.1.a [ref]groupExamine security policies and procedures to verify that |
10.6.1.b [ref]groupObserve processes and interview personnel to verify |
10.6.2 [ref]groupReview logs of all other system |
10.6.2.a [ref]groupExamine security policies and procedures to verify that |
10.6.2.b [ref]group |
10.6.3 [ref]groupFollow up exceptions and |
10.6.3.a [ref]groupExamine security policies and procedures to verify that |
10.6.3.b [ref]groupObserve processes and interview personnel to verify |
10.7 [ref]groupRetain audit trail history for at least |
10.7.a [ref]groupExamine security policies and procedures to verify that they |
10.7.b [ref]groupInterview personnel and examine audit logs to verify that |
10.7.c [ref]groupInterview personnel and observe processes to verify that at |
10.8 [ref]groupEnsure that security policies and |
11. [ref]groupRegularly test security systems and processes |
11.1 [ref]groupImplement processes to test for the |
11.1.1 [ref]groupMaintain an inventory of |
11.1.2 [ref]groupImplement incident response |
11.1.2.a [ref]group |
11.1.2.b [ref]groupInterview responsible personnel and/or inspect |
11.1.a [ref]groupExamine policies and procedures to verify processes |
11.1.b [ref]groupVerify that the methodology is adequate to detect and |
11.1.c [ref]groupIf wireless scanning is utilized, examine output from |
11.1.d [ref]groupIf automated monitoring is utilized (for example, |
11.2 [ref]groupRun internal and external network |
11.2.1 [ref]groupPerform quarterly internal |
11.2.1.a [ref]groupReview the scan reports and verify that four |
11.2.1.b [ref]groupReview the scan reports and verify that the scan |
11.2.2 [ref]groupPerform quarterly external |
11.2.2.c [ref]groupReview the scan reports to verify that the scans |
11.2.3 [ref]groupPerform internal and external |
11.2.3.a [ref]groupInspect and correlate change control |
11.2.3.b [ref]groupReview scan reports and verify that the scan |
11.2.3.c [ref]groupValidate that the scan was performed by a qualified |
11.3 [ref]groupImplement a methodology for |
11.3.1 [ref]groupPerform |
11.3.1.a [ref]groupExamine the scope of work and results from the |
11.3.1.b [ref]groupVerify that the test was performed by a qualified |
11.3.2 [ref]groupPerform |
11.3.2.a [ref]groupExamine the scope of work and results from the |
11.3.2.b [ref]groupVerify that the test was performed by a qualified |
11.3.3 [ref]groupExploitable vulnerabilities found |
11.3.4 [ref]groupIf segmentation is used to isolate |
11.3.4.a [ref]groupExamine segmentation controls and review |
11.3.4.b [ref]groupExamine the results from the most recent |
11.4 [ref]groupUse intrusion-detection and/or |
11.4.a [ref]groupExamine system configurations and network diagrams |
11.4.b [ref]groupExamine system configurations and interview |
11.4.c [ref]groupExamine IDS/IPS configurations and vendor |
11.5 [ref]groupDeploy a change-detection |
11.5.1 [ref]groupImplement a process to respond to |
11.5.a [ref]groupVerify the use of a change-detection mechanism within |
11.5.b [ref]groupVerify the mechanism is configured to alert personnel |
11.6 [ref]groupEnsure that security policies and |
Values [ref]groupGroup of values used in PCI-DSS profile |
Non PCI-DSS [ref]groupRules that are not part of PCI-DSS |