UCF STIG Viewer Logo

The system must use a Linux Security Module configured to limit the privileges of system services.


Finding ID Version Rule ID IA Controls Severity
V-217863 RHEL-06-000023 SV-217863r505923_rule Low
Setting the SELinux policy to "targeted" or a more specialized policy ensures the system will confine processes that are likely to be targeted for exploitation, such as network or system services.
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2020-09-03


Check Text ( C-19344r376604_chk )
Check the file "/etc/selinux/config" and ensure the following line appears:


If it does not, this is a finding.
Fix Text (F-19342r376605_fix)
The SELinux "targeted" policy is appropriate for general-purpose desktops and servers, as well as systems in many other roles. To configure the system to use this policy, add or correct the following line in "/etc/selinux/config":


Other policies, such as "mls", provide additional security labeling and greater confinement but are not compatible with many general-purpose use cases.