Veritas NetBackup™ Appliance Security Guide
- About the NetBackup appliance Security Guide
- User authentication
- User authorization
- Intrusion prevention and intrusion detection systems
- Log files
- Operating system security
- Data security
- Web security
- Network security
- Call Home security
- Remote Management Module (RMM) I security
- STIG and FIPS conformance
- Appendix A. Security release content
OS STIG hardening for NetBackup appliances
The Security Technical Implementation Guides (STIGs) provide technical guidance for increasing the security of information systems and software to help prevent malicious computer attacks. This type of security is also referred to as hardening.
Starting with software version 3.1, you can enable OS STIG hardening rules for increased security. These rules are based on the following profile from the Defense Information Systems Agency (DISA):
STIG for Red Hat Enterprise Linux 7 Server - Version 0.1.31
To enable these rules, use the following command:
Main_Menu > Settings > Security > Stig Enable, followed by the maintenance password.
Note the following about enabling STIG:
When the option is enabled, a list of the enforced rules appears. The command output also shows exceptions to any rules that are not enforced.
This command does not allow individual rule control.
For appliances (nodes) in a high availability (HA) setup, this feature must be enabled manually on each node to ensure correct operation after a switchover.
Once the option is enabled, a factory reset is required to disable the associated rules.
If Lightweight Directory Access Protocol (LDAP) is configured, it is recommended that you set it up to use Transport Layer Security (TLS) before you enable the option.
Note:
If you have enabled the STIG feature on an appliance and you need to upgrade it or install an EEB on it, do not plan such installations during the 4:00am - 4:30am time frame. By following this best practice, you can avoid interrupting the automatic update of the AIDE
database and any monitored files, which can cause multiple alert messages from the appliance.
The following describes the hardening rules that are enforced after the option is enabled. Each rule is identified by a Common Configuration Enumerator (CCE) identifier, a short rule description, and a Security Content Automation Protocol (SCAP) scanner severity level. Software version 3.1 addresses rules with high and medium scanner severity levels.
CCE-27127-0: Enable randomized layout of virtual address space.
Scanner severity level: Medium
CCE-26900-1: Disable core dumps for
SUID
programs.Scanner severity level: Low
CCE-27050-4: Restrict access to kernel message buffer.
Scanner severity level: Low
CCE-80258-7: Disable the
kdump
kernel crash analyzer.Scanner severity level: Medium
CCE-27220-3: Build and test
AIDE
database.Scanner severity level: Medium
CCE-26952-2: Configure periodic execution of
AIDE
.Scanner severity level: Medium
CCE-27303-7: Modify the system login banner.
Scanner severity level: Medium
CCE-27082-7: Set SSH client alive account.
Scanner severity level: Medium
CCE-27314-4: Enable SSH warning banner.
Scanner severity level: Medium
CCE-27437-3: Ensure
auditd
collects information on the use of privileged commands.Scanner severity level: Medium
CCE-27309: Set boot loader password.
Scanner severity level: High
CCE-80374-2: Configure notification of
AIDE
scan results.Scanner security level: Medium
CCE-80375-9: Configure AIDE to verify Access Control Lists (ACLs).
Scanner severity level: Medium
CCE-80376-7: Configure AIDE to verify extended attributes.
Scanner severity level: Medium
CCE-27375-5: Configure
auditd_space_left_action
on low disk space.Scanner severity level: Medium
CCE-27341-7: Configure
auditd
to useaudispd_syslog_plugin
.Scanner security level: Medium
CCE-27353-2: Record events that modify the system discretionary access controls (
fremovexattr
).Scanner severity level: Medium
CCE-27410-0: Record events that modify the system discretionary access controls (
lremovexattr
).Scanner severity level: Medium
CCE-27367-2: Record events that modify the system discretionary access controls (
removexattr
).Scanner severity level: Medium
CCE-27204-7: Record attempts to alter the logon and logout events.
Scanner severity level: Medium
CCE-27347-4: Ensure that
auditd
collects unauthorized access attempts to files.Scanner severity level: Medium
CCE-27447-2: Ensure that
auditd
collects information on successful exporting to media.Scanner severity level: Medium
CCE-27206-2: Ensure that
auditd
collects file deletion events by the user.Scanner severity level: Medium
CCE-27129-6: Ensure that
auditd
collects information on kernel module loading and unloading.Scanner severity level: Medium
CCE-27333-4: Set the password rule for maximum consecutive repeating characters.
Scanner severity level: Medium
CCE-27512-3: Set the password rule for maximum consecutive repeating characters from the same character class.
Scanner severity level: Medium
CCE-27214-6: Set the password strength for minimum digit (numeric) characters.
Scanner severity level: Medium
CCE-27293-0: Set the password rule for minimum length.
Scanner severity level: Medium
CCE-27200-5: Set the password strength for minimum uppercase characters.
Scanner severity level: Medium
CCE-27360-7: Set the password strength for minimum special characters.
Scanner severity level: Medium
CCE-27345-8: Set the password strength for minimum lowercase characters.
Scanner severity level: Medium
CCE-26631-2: Set the password strength for minimum different characters.
Scanner severity level: Medium
CCE-27115-5: Disable
modprobe
loading of the USB storage driver.Scanner severity level: Medium
CCE-27350-8: Set the number of failed password attempts to deny access.
Scanner severity level: Medium
CCE-80353-6: Configure the root account for failed password attempts.
Scanner severity level: Medium
CCE-26884-7: Set the lockout time for failed password attempts.
Scanner severity level: Medium
CCE-27297-1: Set the interval for counting failed password attempts.
Scanner severity level: Medium
CCE-27002-5: Set the password minimum age.
Scanner severity level: Medium
CCE-27051-2: Set the password maximum age.
Scanner security level: Medium
CCE-27081-9: Limit the number of concurrent login sessions allowed for each user.
Scanner severity level: Low
The following rules are always enforced and cannot be disabled. Hardening of these rules complies with the specifications described in "NIST Special Publication 800-123". For more information, refer to the following:
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-123.pdf
CCE-80165-4: Configure the kernel parameter to ignore ICMP broadcast echo requests.
Scanner severity level: Medium
CCE-80156-3: Disable the kernel parameter for sending ICMP redirects by default.
Scanner severity level: Medium
CCE-80156-3: Disable the kernel parameter for sending ICMP redirects for all interfaces.
Scanner severity level: Medium
CCE-27212-0: Enable auditing for the processes that start before the audit daemon.
Scanner severity level: Medium
CCE-26957-1: Ensure that the Red Hat GPG key is installed.
Scanner severity level: High
CCE-27096-7: Ensure that the
AIDE
package is installed.Scanner severity level: Medium
CCE-27351-6: Install the
screen
package.Scanner severity level: Medium
CCE-27268-2: Restrict serial port root logins.
Scanner severity level: Low
CCE-27318-5: Restrict virtual console root logins.
Scanner severity level: Medium
CCE-27401-9: Disable
telnet
serviceScanner severity level: High
CCE-27471-2: Disable SSH access without a password.
Scanner severity level: High
CCE-27286-4: Prevent login to accounts without a password.
Scanner severity level: High
CCE-27511-5: Disable Ctrl-Alt-Del reboot activation.
Scanner severity level: High
CCE-27320-1: Allow only SSH protocol version 2.
Scanner severity level: High
CCE-27294-8: Do not allow direct root logins.
Scanner severity level: Medium
CCE-80157-1: Disable the kernel parameter for IP forwarding.
Scanner severity level: Medium
CCE-80158-9: Configure the kernel parameter for accepting ICMP redirects for all interfaces.
Scanner severity level: Medium
CCE-80163-9: Configure the kernel parameter for accepting ICMP redirects by default.
Scanner severity level: Medium
CCE-27327-6: Disable the Bluetooth kernel modules.
Scanner severity level: Medium
CCE-80179-5: Configure the kernel parameter for accepting source-routed packets for all interfaces.
Scanner severity level: Medium
CCE-80220-7: Disable the GSSAPI authentication.
Scanner severity level: Medium
CCE-80221-5: Disable the Kerberos authentication.
Scanner severity level: Medium
CCE-80222-3: Enable the use of strict mode checking.
Scanner severity level: Medium
CCE-80224-9: Disable compression or set compression to delayed.
Scanner severity level: Medium
CCE-27455-5: Use only FIPS approved MACs.
Scanner severity level: Medium
CCE-80378-3: Verify the user that owns
/etc/cron.allow
.Scanner severity level: Medium
CCE-80379-1: Verify the group that owns
/etc/cron.allow
.Scanner severity level: Medium
CCE-80372-6: Disable SSH support for user-known hosts.
Scanner severity level: Medium
CCE-80373-4: Disable SSH support for
rhosts
RSA authentication.Scanner severity level: Medium
CCE-27363-1: Do not allow SSH environment options.
Scanner severity level: Medium
CCE-26989-4: Ensure that gpgcheck is globally activated.
Scanner severity level: High
CCE-80349--4: Ensure installed OS is certified.
Scanner severity level: High
CCE-27175-9: No uid except zero (get a better description).
Scanner severity level: High
CCE-27498-5: Disable the auto-mounter.
Scanner severity level: Medium
CCE-80134-0: No files not owned by user.
Scanner severity level: Medium
CCE-80135-7: No file permissions not owned by group.
Scanner severity level: Medium
CCE-27211-2:
sysctl_kernal_exec_shield
.Scanner severity level: Medium
CCE-27352-4: Verify that all account password hashes are shadowed.
Scanner severity level: Medium
CCE-27104-9: Set the password hashing algorithm
systemauth
.Scanner severity level: Medium
CCE-27124-7: Set the password hashing algorithm
logindefs
.Scanner severity level: Medium
CCE-27053-8: Set the password hashing algorithm
libusercon
.Scanner severity level: Medium
CCE-27078-5: Disable pre-linking software.
Scanner severity level: Low
CCE-27116-3: Install the PAE kernel on supported 32-bit x86 systems.
Scanner severity level: Low
CCE-27503-2: All GIDs referenced in
/etc/password
must be defined in/etc/group
.Scanner severity level: Low
CCE-27160-1: Password pam retry.
Scanner severity level: Low
CCE-27275-7: Display login attempts.
Scanner severity level: Low
CCE-80350-2: Remove
no_authenticate
onsudo
.Scanner severity level: Medium
CCE-26961-3: Ensure SELinux is not disabled in
/etc/default/grub
.Scanner severity level: Medium