RHEL 10 must enable the SELinux targeted policy.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-281249 | RHEL-10-700400 | SV-281249r1197242_rule | CCI-002696 | medium |
| Description | ||||
| Setting the SELinux policy to "targeted" or a more specialized policy ensures the system will confine processes that are likely to be targeted for exploitation, such as network or system services. Note: During the development or debugging of SELinux modules, it is common to temporarily place nonproduction systems in "permissive" mode. In such temporary cases, SELinux policies should be developed, and once work is completed, the system should be reconfigured to "targeted". | ||||
| STIG | Date | |||
| Red Hat Enterprise Linux 10 Security Technical Implementation Guide | 2026-03-11 | |||
Details
Check Text (C-281249r1197242_chk)
Verify RHEL 10 SELINUX is using the targeted policy with the following command:
$ sestatus | grep policy
Loaded policy name: targeted
If the loaded policy name is not "targeted", this is a finding.
Fix Text (F-85715r1197241_fix)
Configure RHEL 10 to use the targeted SELINUX policy.
Edit the file "/etc/selinux/config" and add or modify the following line:
SELINUXTYPE=targeted
A reboot is required for the changes to take effect.