extracting security profile specific files RHEL CentOS Announcing the arrival of Valued...
What are 'alternative tunings' of a guitar and why would you use them? Doesn't it make it more difficult to play?
If Jon Snow became King of the Seven Kingdoms what would his regnal number be?
Why was the term "discrete" used in discrete logarithm?
How do I mention the quality of my school without bragging
Disable hyphenation for an entire paragraph
Did Kevin spill real chili?
3 doors, three guards, one stone
What LEGO pieces have "real-world" functionality?
Using et al. for a last / senior author rather than for a first author
What causes the vertical darker bands in my photo?
What is this single-engine low-wing propeller plane?
Antler Helmet: Can it work?
Determinant is linear as a function of each of the rows of the matrix.
How to do this path/lattice with tikz
Output the ŋarâþ crîþ alphabet song without using (m)any letters
Do you forfeit tax refunds/credits if you aren't required to and don't file by April 15?
When -s is used with third person singular. What's its use in this context?
Do I really need recursive chmod to restrict access to a folder?
Does surprise arrest existing movement?
Proof involving the spectral radius and the Jordan canonical form
Why did the IBM 650 use bi-quinary?
Is it true that "carbohydrates are of no use for the basal metabolic need"?
How to bypass password on Windows XP account?
How can players work together to take actions that are otherwise impossible?
extracting security profile specific files RHEL CentOS
Announcing the arrival of Valued Associate #679: Cesar Manara
Planned maintenance scheduled April 17/18, 2019 at 00:00UTC (8:00pm US/Eastern)
2019 Community Moderator Election Results
Why I closed the “Why is Kali so hard” questionFiles associated with Thunderbird - Security mechanism for local storageWill I receive critical security updates if I lock CentOS yum to a specific repo version?blocking all but specific ips from specific services in CentOS 7RHEL 7 (CentOS 7) security / ssh / sshd_config advise requestedHow many check points in RHEL/CentOS to make sure no one have sudo/root accessLooking for a tool similar to the Security Advisor plugin for WHM that can run on CentOS 7 without WHMSearch all xml files recursively in directory for a specific tag and grep the tag's valueCentOS 6 local update repository and security updatesFind XML files with specific valuesYama LSM seems to do nothing. RHEL/Centos 7.5
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ margin-bottom:0;
}
during the install of RHEL 7.x or CentOS one can choose (or not choose) to apply one of these security profiles these are from 7.6:
- United States Government Configuration Baseline
- Standard System Security Profile for RHEL 7
- Criminal Justice Information Services (CJIS)
- C2S for RHEL 7 {Commercial Cloud Services}
- HIPPA
- Unclassified Information in non-federal Information System Organizations (NIST 800-171)
- DISA stig for RHEL 7
- OSPP v4.2
- PCI-DSS v3 control baseline for RHEL 7
- Red Hat Corporate profile for certified cloud providers (RHCCP)
In choosing one it changes a myriad of configuration files. which ones? I wouldn't mind knowing, but
I want to know if it's possible to extract, simply the /etc/ssh/sshd_config file that gets used for a given security profile from an already running RHEL or CentOS system not having that profile applied at system creation; I do not want to spend the time installing RHEL/CentOS on a new system disk (10 times) with a profile applied to then extract and save said file(s) to a usb stick for comparison and understanding.
ssh security xml anaconda scap
add a comment |
during the install of RHEL 7.x or CentOS one can choose (or not choose) to apply one of these security profiles these are from 7.6:
- United States Government Configuration Baseline
- Standard System Security Profile for RHEL 7
- Criminal Justice Information Services (CJIS)
- C2S for RHEL 7 {Commercial Cloud Services}
- HIPPA
- Unclassified Information in non-federal Information System Organizations (NIST 800-171)
- DISA stig for RHEL 7
- OSPP v4.2
- PCI-DSS v3 control baseline for RHEL 7
- Red Hat Corporate profile for certified cloud providers (RHCCP)
In choosing one it changes a myriad of configuration files. which ones? I wouldn't mind knowing, but
I want to know if it's possible to extract, simply the /etc/ssh/sshd_config file that gets used for a given security profile from an already running RHEL or CentOS system not having that profile applied at system creation; I do not want to spend the time installing RHEL/CentOS on a new system disk (10 times) with a profile applied to then extract and save said file(s) to a usb stick for comparison and understanding.
ssh security xml anaconda scap
add a comment |
during the install of RHEL 7.x or CentOS one can choose (or not choose) to apply one of these security profiles these are from 7.6:
- United States Government Configuration Baseline
- Standard System Security Profile for RHEL 7
- Criminal Justice Information Services (CJIS)
- C2S for RHEL 7 {Commercial Cloud Services}
- HIPPA
- Unclassified Information in non-federal Information System Organizations (NIST 800-171)
- DISA stig for RHEL 7
- OSPP v4.2
- PCI-DSS v3 control baseline for RHEL 7
- Red Hat Corporate profile for certified cloud providers (RHCCP)
In choosing one it changes a myriad of configuration files. which ones? I wouldn't mind knowing, but
I want to know if it's possible to extract, simply the /etc/ssh/sshd_config file that gets used for a given security profile from an already running RHEL or CentOS system not having that profile applied at system creation; I do not want to spend the time installing RHEL/CentOS on a new system disk (10 times) with a profile applied to then extract and save said file(s) to a usb stick for comparison and understanding.
ssh security xml anaconda scap
during the install of RHEL 7.x or CentOS one can choose (or not choose) to apply one of these security profiles these are from 7.6:
- United States Government Configuration Baseline
- Standard System Security Profile for RHEL 7
- Criminal Justice Information Services (CJIS)
- C2S for RHEL 7 {Commercial Cloud Services}
- HIPPA
- Unclassified Information in non-federal Information System Organizations (NIST 800-171)
- DISA stig for RHEL 7
- OSPP v4.2
- PCI-DSS v3 control baseline for RHEL 7
- Red Hat Corporate profile for certified cloud providers (RHCCP)
In choosing one it changes a myriad of configuration files. which ones? I wouldn't mind knowing, but
I want to know if it's possible to extract, simply the /etc/ssh/sshd_config file that gets used for a given security profile from an already running RHEL or CentOS system not having that profile applied at system creation; I do not want to spend the time installing RHEL/CentOS on a new system disk (10 times) with a profile applied to then extract and save said file(s) to a usb stick for comparison and understanding.
ssh security xml anaconda scap
ssh security xml anaconda scap
edited 1 hour ago
ron
asked 3 hours ago
ronron
1,1822819
1,1822819
add a comment |
add a comment |
0
active
oldest
votes
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "106"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f512682%2fextracting-security-profile-specific-files-rhel-centos%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
0
active
oldest
votes
0
active
oldest
votes
active
oldest
votes
active
oldest
votes
Thanks for contributing an answer to Unix & Linux Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f512682%2fextracting-security-profile-specific-files-rhel-centos%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown