Step 3: Load and apply hardening profile
Risk of operating trouble!
The following rules, when applied, carry some risks with system operation under specific operating conditions and might be rolled back to default by the operator after thorough assessment:
• CCE-83700-5: Configure auditd admin_space_left Action on Low Disk Space
• CCE-83701-3: Configure auditd max_log_file_action Upon Reaching Maximum Log Size
• CCE-83703-9: Configure auditd space_left Action on Low Disk Space
→ They will affect the following settings when applied (comparison of applied and default):
• CCE-83450-7: Configure System Cryptography Policy (disable-SHA1)
→ can affect secure communication to FOX61x nodes which are provisioned with existing public keys.
→ In case communication is lost, enable ssh_rsa public keys by running
/opt/nem/bin/private/reconfigure_nem and select option 2 when prompted:
2) Change ESW support: to LEGACY.
Risk of operating trouble!
The following rule(s), when applied, will lock user accounts when the CIS scan is run after FOXMAN-UN installation:
• CCE-86113-8: xccdf_org.ssgproject.content_rule_no_password_auth_for_systemaccounts
As nemadm and dirac have user IDs less than 1000 (i.e., 199 and 200, respectively), these users will be locked if the scan is run after FOXMAN-UN installation.
→ If this rule is applied, only run the scan before installing FOXMAN-UN.
• CCE-83627-0 Set Account Expiration Following Inactivity
→ Before applying hardening, change the root password.
This Step 3 is supported by loading an RPM (ssg-rhel9-ds-hitachienergy-nms-customizations-17.1.1-1.noarch.rpm), which includes a FOXMAN-UN adapted CIS profile.
This profile defines a baseline that aligns to the “Level 2 - Server” configuration from the Center for Internet Security® Red Hat Enterprise Linux 9 CIS Benchmarks™, v2.0.0, released 2024-06-24, for the following rules which are not applied:
• For FOXMAN-UN, DIRAC, and Quantis crypto key generator:
− CCE-83543-9 Ensure Users Re-Authenticate for Privilege Escalation - sudo
− CCE-83623-9 Ensure that System Accounts Do Not Run a Shell Upon Login
− CCE-83689-0 Ensure System Log Files Have Correct Permissions
− CCE-83946-4 Ensure Log Files Are Owned By Appropriate User
− CCE-83834-2 Ensure Log Files Are Owned By Appropriate Group
− CCE-83895-3 Verify that All World-Writable Directories Have Sticky Bits Set
− CCE-84104-9 Remove the X Windows Package Group
− CCE-84105-6 Disable X Windows Startup By Setting Default TargeT
− CCE-90828-5 Ensure the Default Umask is Set Correctly in /etc/profile
− CCE-83644-5 Ensure the Default Bash Umask is Set Correctly
− CCE-83851-6 Disable Modprobe Loading of USB Storage Driver
− CCE-83549-6 Remove the GDM Package Group
Preconditions for loading and applying the hardening profile:
• Server / VM set up and loaded & updated with the RHEL 9.6.
• Disk partition and mountpoints according to the previous chapter.
• Admin & root accounts and privileges given.
• Customized profile RPM available on the system.
The hardening procedure is done according to the official RedHat hardening guide: