Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-257788 | RHEL-09-212015 | SV-257788r991589_rule | Medium |
Description |
---|
Using interactive or recovery boot, the console user could disable auditing, firewalls, or other services, weakening system security. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 9 Security Technical Implementation Guide | 2024-06-04 |
Check Text ( C-61529r925349_chk ) |
---|
Verify that GRUB 2 is configured to disable interactive boot. Check that the current GRUB 2 configuration disables the ability of systemd to spawn an interactive boot process with the following command: $ sudo grubby --info=ALL | grep args | grep 'systemd.confirm_spawn' If any output is returned, this is a finding. |
Fix Text (F-61453r925350_fix) |
---|
Configure RHEL 9 to allocate sufficient audit_backlog_limit to disable the ability of systemd to spawn an interactive boot process with the following command: $ sudo grubby --update-kernel=ALL --remove-args="systemd.confirm_spawn" |