Configure SELinux - Part 3

Configure SELinux - Part 3

Ensure SELinux policy is configured

Overview:

Configure SELinux to meet or exceed the default targeted policy, which constrains daemons and system software only.

Why:

Security configuration requirements vary from site to site. Some sites may mandate a policy that is stricter than the default policy, which is perfectly acceptable. This item is intended to ensure that at least the default recommendations are met.

Audit:

Run the following commands and ensure output matches “default” or “mls”:

# grep SELINUXTYPE= /etc/selinux/config 
SELINUXTYPE=default 
# sestatus
Policy from config file: default

Fix:

Edit the /etc/selinux/config file to set the SELINUXTYPE parameter:

SELINUXTYPE=default

Ensure no unconfined daemons exist

Overview:

Daemons that are not defined in SELinux policy will inherit the security context of their parent process.

Why:

Since daemons are launched and descend from the init process, they will inherit the security context label initrc_t. This could cause the unintended consequence of giving the process more permission than it requires.

Audit:

Run the following command and verify not output is produced:

ps -eZ | egrep "initrc" | egrep -vw "tr|ps|egrep|bash|awk" | tr ':' ' ' | awk '{ print $NF }'

Fix:

Investigate any unconfined daemons found during the audit action. They may need to have an existing security context assigned to them or a policy built for them.