UCF STIG Viewer Logo

The system must use an access control program.


Overview

Finding ID Version Rule ID IA Controls Severity
V-940 GEN006580 SV-37756r1_rule EBRU-1 Medium
Description
Access control programs (such as TCP_WRAPPERS) provide the ability to enhance system security posture.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-36953r1_chk )
The tcp_wrappers package is provided with the RHEL distribution. Other access control programs may be available but will need to be checked manually.

Determine if tcp_wrappers is installed.
# rpm -qa | grep tcp_wrappers
If no package is listed, this is a finding.

Fix Text (F-32218r1_fix)
Install and configure the tcp_wrappers package.