6 Host Compliance Standards

These are the compliance rules for the Host compliance standards

6.1 Configuration Monitoring For Core Linux Packages

The compliance rules for the Configuration Monitoring For Core Linux Packages standard follow.

6.1.1 Monitor Configuration Files For Os Booting Packages

Description: Monitors configuration files for OS booting/startup related packages that come with Linux.

Severity: Critical

Rationale: When file changes occur to the configuration files of booting/startup related packages on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.1.2 Monitor Configuration Files For Core Os Packages

Description: Monitors configuration files for core OS packages that come with Linux. These packages include Kernel-related elements and core commands.

Severity: Critical

Rationale: When file changes occur to the configuration files of core OS related packages on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.2 Configuration Monitoring For Exadata Compute Node

The compliance rules for the Configuration Monitoring For Exadata Compute Node standard follow.

6.2.1 Monitor Configuration Files For Exadata Compute Node Cell Os

Description: Monitors configuration files that are part of the Exadata compute node's Cell OS. This rule is monitoring configuration files that are related to basic cell operations.

Severity: Critical

Rationale: When a configuration file changes occurs, the modification can lead to serious service disruptions and or security vulnerabilities.

6.2.2 Monitor Configuration Files For Exadata Compute Node Database

Description: Monitors configuration files that are part of the Exadata compute node's bundled Oracle Database. This rule is monitoring configuration files that are related to the Database, Clusterware, Storage Management, and Cluster Verification utility

Severity: Critical

Rationale: When a configuration file changes occurs, the modification can lead to serious service disruptions and or security vulnerabilities. These configuration files may impact the functioning of the bundled database on this Exadata compute node or the Database cluster this node belongs to.

6.2.3 Monitor Configuration Files For Exadata Compute Node Megaraid

Description: Monitors configuration files that are part of the Exadata compute node's LSI MegaRAID support. This rule is monitoring configuration files that are related to the MegaRAID Storage Manager and MegaRAID XTools.

Severity: Critical

Rationale: When a configuration file changes occurs, the modification can lead to serious service disruptions and or security vulnerabilities. These configuration files may impact the functioning of the RAID storage functionality on this node.

6.2.4 Monitor Configuration Files For Exadata Compute Node Management And Diagnostics Systems

Description: Monitors configuration files that are part of the Exadata compute node elements for changes to the files. This rule specifically is monitoring the configuration files for the various tools and systems that are part of the Compute Node used for management or diagnostics.

Severity: Critical

Rationale: When a configuration file changes occurs, the modification can lead to serious service disruptions and or security vulnerabilities. These configuration files may impact the functioning of a management or monitoring tool that could be used to report other issues.

6.2.5 Monitor Host-Specific Configuration Files For Exadata Compute Node Management And Diagnostics Systems

Description: Monitors configuration files that are part of the Exadata compute node elements for changes to the files. This rule specifically is monitoring the configuration files for the various tools and systems that are part of the Compute Node used for management or diagnostics that are specific for the given host. The facets being monitored include the hostname in the path and must be configured per host target association for the rule to function.

Severity: Critical

Rationale: When a configuration file changes occurs, the modification can lead to serious service disruptions and or security vulnerabilities. These configuration files may impact the functioning of a management or monitoring tool that could be used to report other issues.

6.3 Configuration Monitoring For Exadata Compute Node Networking

The compliance rules for the Configuration Monitoring For Exadata Compute Node Networking standard follow.

6.3.1 Monitor Configuration Files For Exadata Compute Node Cell Os Networking

Description: Monitors configuration files that are part of the Exadata compute node's Cell OS. This rule is monitoring configuration files that are related to the Cell's networking configuration

Severity: Critical

Rationale: When a configuration file changes occurs, the modification can lead to serious service disruptions and or security vulnerabilities. Unintended modification of these configuration files can lead to components in an Exadata rack being unreachable.

6.3.2 Monitor Configuration Files For Exadata Compute Node Infiniband

Description: Monitors configuration files that are part of the Exadata compute node Infiniband support. This rule is monitoring Open Infiniband configuration files and Infiniband Diagnostics Tools.

Severity: Critical

Rationale: When a configuration file changes occurs, the modification can lead to serious service disruptions and or security vulnerabilities. These configuration files may impact the functioning of the Exadata component communications.

6.4 Configuration Monitoring For Exadata Compute Node Time

The compliance rules for the Configuration Monitoring For Exadata Compute Node Time standard follow.

6.4.1 Monitor Configuration Files For Exadata Compute Node Cell Os Time

Description: Monitors configuration files that are part of the Exadata compute node's Cell OS. This rule is monitoring configuration files related to clock synchronization for the Cell.

Severity: Critical

Rationale: When a configuration file changes occurs, the modification can lead to serious service disruptions and or security vulnerabilities. Time synchronization is very important in complex systems. Clock out of sync issues caused by misconfigured network time daemon can lead to failures and system downtime.

6.5 Configuration Monitoring For Network Time Linux Packages

The compliance rules for the Configuration Monitoring For Network Time Linux Packages standard follow.

6.5.1 Monitor Configuration Files For Network Time Packages

Description: Monitors configuration files for network time related packages that come with Linux such as FTP. These packages ensure your clocks are in sync.

Severity: Critical

Rationale: When file changes occur to the configuration files of a network time related package on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities. Most distributed software programs depend on the host clocks being in sync.

6.6 Configuration Monitoring For Networking Linux Packages

The compliance rules for the Configuration Monitoring For Networking Linux Packages standard follow.

6.6.1 Monitor Configuration Files For File Transfer Packages

Description: Monitors configuration files for file transfer related packages that come with Linux such as FTP.

Severity: Critical

Rationale: When file changes occur to the configuration files of a file transfer related package on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.6.2 Monitor Configuration Files For Networking Packages

Description: Monitors configuration files for networking related packages that come with Linux.

Severity: Critical

Rationale: When file changes occur to the configuration files of a networking related package on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.7 Configuration Monitoring For Security Linux Packages

The compliance rules for the Configuration Monitoring For Security Linux Packages standard follow.

6.7.1 Monitor Configuration Files For Security Packages

Description: Monitors configuration files for security related packages that come with Linux.

Severity: Critical

Rationale: When file changes occur to the configuration files of security related packages on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.8 Configuration Monitoring For User Access Linux Packages

The compliance rules for the Configuration Monitoring For User Access Linux Packages standard follow.

6.8.1 Monitor Configuration Files For User Access Packages

Description: Monitors configuration files for user access packages that come with Linux. These packages include SUDO as well as user management and configuration packages.

Severity: Critical

Rationale: When file changes occur to the configuration files of user access related packages on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.9 File Integrity Monitoring For Exadata Compute Node

The compliance rules for the File Integrity Monitoring For Exadata Compute Node standard follow.

6.9.1 Monitor Executable Files For Core Exadata Compute Node

Description: Monitors executable files that are part of the Exadata compute node elements for changes to the files. Executable files include binary programs, Shell, Perl, and Python scripts. This rule only covers Exadata specific elements that are on top of any base operating system elements.

Severity: Critical

Rationale: When file changes occur to the executables of a production Exadata Compute Node outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.9.2 Monitor Library Files For Core Exadata Compute Node

Description: Monitors library files that are part of the Exadata compute node elements. Library files include .SO, Java JAR files, Python and Perl library modules. This rule only covers Exadata specific elements that are on top of any base operating system elements.

Severity: Critical

Rationale: When file changes occur to the libraries of a production Exadata Compute Node outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.10 File Integrity Monitoring For Important Linux Packages

The compliance rules for the File Integrity Monitoring For Important Linux Packages standard follow.

6.10.1 Monitor Executable Files For Core Os Packages

Description: Monitors executable files for core OS packages that come with Linux. Executable files include programs, Shell, Python, and Perl scripts. These packages include Kernel-related elements, Boot Loaders and core commands.

Severity: Critical

Rationale: When file changes occur to the executables of core OS related packages on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.10.2 Monitor Executable Files For Networking Packages

Description: Monitors executable files for networking related packages that come with Linux. Executable files include programs, Shell, Python, and Perl scripts.

Severity: Critical

Rationale: When file changes occur to the executables of a networking related package on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.10.3 Monitor Executable Files For Security Packages

Description: Monitors executable files for security related packages that come with Linux. Executable files include programs, Shell, Python, and Perl scripts.

Severity: Critical

Rationale: When file changes occur to the executables of security related packages on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.10.4 Monitor Executable Files For User Access Packages

Description: Monitors executable files for user access packages that come with Linux. Executable files include programs, Shell, Python, and Perl scripts. These packages include SUDO as well as user management and configuration packages.

Severity: Critical

Rationale: When file changes occur to the executables of user access related packages on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.10.5 Monitor Library Files For Core Os Packages

Description: Monitors library files for core OS packages that come with Linux. Library files include .SO, Java JAR files, Python and Perl library modules. These packages include Kernel-related elements, Boot Loaders and core commands.

Severity: Critical

Rationale: When file changes occur to the libraries of core OS packages on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.10.6 Monitor Library Files For Networking Packages

Description: Monitors library files for networking related packages that come with Linux. Library files include .SO, Java JAR files, Python and Perl library modules.

Severity: Critical

Rationale: When file changes occur to the libraries of a networking related packages on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.10.7 Monitor Library Files For Security Packages

Description: Monitors library files for security-related packages that come with Linux. Library files include .SO, Java JAR files, Python and Perl library modules.

Severity: Critical

Rationale: When file changes occur to the libraries of security related packages on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.10.8 Monitor Library Files For User Access Packages

Description: Monitors library files for user access packages that come with Linux. Library files include .SO, Java JAR files, Python and Perl library modules. These packages include SUDO as well as user management and configuration packages.

Severity: Critical

Rationale: When file changes occur to the libraries of user access packages on a Linux host outside of upgrade windows, the modification can lead to serious disruptions and or security vulnerabilities.

6.11 Secure Configuration For Host

The compliance rules for the Secure Configuration For Host standard follow.

6.11.1 Nfts File System

Description: Ensure that the file system on a Windows operating system uses NTFS

Severity: Critical

Rationale: Other than NTFS, file systems on Windows platforms may have serious security risks.

6.11.2 Secure Ports

Description: Ensure that no unintended ports are left open

Severity: Critical

Rationale: Open ports may allow a malicious user to take over the host.

6.11.3 Secure Services

Description: Ensure that there are no insecure services (for example, telnet and ftp) running on the server

Severity: Warning

Rationale: Insecure services may allow a malicious user to take over the host.

6.11.4 Executable Stack Disabled

Description: Ensure that the OS configuration parameter, which enables execution of code on the user stack, is not enabled

Severity: Warning

Rationale: Enabling code execution on the user stack may allow a malicious user to exploit stack buffer overflows. Overflows can cause portions of a system to fail, or even execute arbitrary code.

6.12 Security Recommendations For Oracle Products

The compliance rules for the Security Recommendations For Oracle Products standard follow.

6.12.1 Security Recommendations

Description: Checks targets in your host for missing security patches

Severity: Critical

Rationale: To help ensure a secure and reliable configuration, all relevant and current security patches should be applied.