UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must use a Linux Security Module at boot time.


Overview

Finding ID Version Rule ID IA Controls Severity
RHEL-06-000018 RHEL-06-000018 RHEL-06-000018_rule Medium
Description
Disabling a major host protection feature, such as SELinux, at boot time prevents it from confining system services at boot time. Further, it increases the chances that it will remain off during system operation.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2013-02-05

Details

Check Text ( C-RHEL-06-000018_chk )
If the system is a cross-domain system, this is not applicable.

Inspect "/etc/grub.conf" for any instances of "selinux=0" in the kernel boot arguments. Presence of "selinux=0" indicates that SELinux is disabled at boot time.
If SELinux is disabled at boot time, this is a finding.
Fix Text (F-RHEL-06-000018_fix)
SELinux can be disabled at boot time by an argument in "/etc/grub.conf". Remove any instances of "selinux=0" from the kernel arguments in that file to prevent SELinux from being disabled at boot.