extracting security profile specific files RHEL CentOS Announcing the arrival of Valued...

What are 'alternative tunings' of a guitar and why would you use them? Doesn't it make it more difficult to play?

If Jon Snow became King of the Seven Kingdoms what would his regnal number be?

Why was the term "discrete" used in discrete logarithm?

How do I mention the quality of my school without bragging

Disable hyphenation for an entire paragraph

Did Kevin spill real chili?

3 doors, three guards, one stone

What LEGO pieces have "real-world" functionality?

Using et al. for a last / senior author rather than for a first author

What causes the vertical darker bands in my photo?

What is this single-engine low-wing propeller plane?

Antler Helmet: Can it work?

Determinant is linear as a function of each of the rows of the matrix.

How to do this path/lattice with tikz

Output the ŋarâþ crîþ alphabet song without using (m)any letters

Do you forfeit tax refunds/credits if you aren't required to and don't file by April 15?

When -s is used with third person singular. What's its use in this context?

Do I really need recursive chmod to restrict access to a folder?

Does surprise arrest existing movement?

Proof involving the spectral radius and the Jordan canonical form

Why did the IBM 650 use bi-quinary?

Is it true that "carbohydrates are of no use for the basal metabolic need"?

How to bypass password on Windows XP account?

How can players work together to take actions that are otherwise impossible?



extracting security profile specific files RHEL CentOS



Announcing the arrival of Valued Associate #679: Cesar Manara
Planned maintenance scheduled April 17/18, 2019 at 00:00UTC (8:00pm US/Eastern)
2019 Community Moderator Election Results
Why I closed the “Why is Kali so hard” questionFiles associated with Thunderbird - Security mechanism for local storageWill I receive critical security updates if I lock CentOS yum to a specific repo version?blocking all but specific ips from specific services in CentOS 7RHEL 7 (CentOS 7) security / ssh / sshd_config advise requestedHow many check points in RHEL/CentOS to make sure no one have sudo/root accessLooking for a tool similar to the Security Advisor plugin for WHM that can run on CentOS 7 without WHMSearch all xml files recursively in directory for a specific tag and grep the tag's valueCentOS 6 local update repository and security updatesFind XML files with specific valuesYama LSM seems to do nothing. RHEL/Centos 7.5





.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ margin-bottom:0;
}







0















during the install of RHEL 7.x or CentOS one can choose (or not choose) to apply one of these security profiles these are from 7.6:




  • United States Government Configuration Baseline

  • Standard System Security Profile for RHEL 7

  • Criminal Justice Information Services (CJIS)

  • C2S for RHEL 7 {Commercial Cloud Services}

  • HIPPA

  • Unclassified Information in non-federal Information System Organizations (NIST 800-171)

  • DISA stig for RHEL 7

  • OSPP v4.2

  • PCI-DSS v3 control baseline for RHEL 7

  • Red Hat Corporate profile for certified cloud providers (RHCCP)


In choosing one it changes a myriad of configuration files. which ones? I wouldn't mind knowing, but



I want to know if it's possible to extract, simply the /etc/ssh/sshd_config file that gets used for a given security profile from an already running RHEL or CentOS system not having that profile applied at system creation; I do not want to spend the time installing RHEL/CentOS on a new system disk (10 times) with a profile applied to then extract and save said file(s) to a usb stick for comparison and understanding.










share|improve this question































    0















    during the install of RHEL 7.x or CentOS one can choose (or not choose) to apply one of these security profiles these are from 7.6:




    • United States Government Configuration Baseline

    • Standard System Security Profile for RHEL 7

    • Criminal Justice Information Services (CJIS)

    • C2S for RHEL 7 {Commercial Cloud Services}

    • HIPPA

    • Unclassified Information in non-federal Information System Organizations (NIST 800-171)

    • DISA stig for RHEL 7

    • OSPP v4.2

    • PCI-DSS v3 control baseline for RHEL 7

    • Red Hat Corporate profile for certified cloud providers (RHCCP)


    In choosing one it changes a myriad of configuration files. which ones? I wouldn't mind knowing, but



    I want to know if it's possible to extract, simply the /etc/ssh/sshd_config file that gets used for a given security profile from an already running RHEL or CentOS system not having that profile applied at system creation; I do not want to spend the time installing RHEL/CentOS on a new system disk (10 times) with a profile applied to then extract and save said file(s) to a usb stick for comparison and understanding.










    share|improve this question



























      0












      0








      0








      during the install of RHEL 7.x or CentOS one can choose (or not choose) to apply one of these security profiles these are from 7.6:




      • United States Government Configuration Baseline

      • Standard System Security Profile for RHEL 7

      • Criminal Justice Information Services (CJIS)

      • C2S for RHEL 7 {Commercial Cloud Services}

      • HIPPA

      • Unclassified Information in non-federal Information System Organizations (NIST 800-171)

      • DISA stig for RHEL 7

      • OSPP v4.2

      • PCI-DSS v3 control baseline for RHEL 7

      • Red Hat Corporate profile for certified cloud providers (RHCCP)


      In choosing one it changes a myriad of configuration files. which ones? I wouldn't mind knowing, but



      I want to know if it's possible to extract, simply the /etc/ssh/sshd_config file that gets used for a given security profile from an already running RHEL or CentOS system not having that profile applied at system creation; I do not want to spend the time installing RHEL/CentOS on a new system disk (10 times) with a profile applied to then extract and save said file(s) to a usb stick for comparison and understanding.










      share|improve this question
















      during the install of RHEL 7.x or CentOS one can choose (or not choose) to apply one of these security profiles these are from 7.6:




      • United States Government Configuration Baseline

      • Standard System Security Profile for RHEL 7

      • Criminal Justice Information Services (CJIS)

      • C2S for RHEL 7 {Commercial Cloud Services}

      • HIPPA

      • Unclassified Information in non-federal Information System Organizations (NIST 800-171)

      • DISA stig for RHEL 7

      • OSPP v4.2

      • PCI-DSS v3 control baseline for RHEL 7

      • Red Hat Corporate profile for certified cloud providers (RHCCP)


      In choosing one it changes a myriad of configuration files. which ones? I wouldn't mind knowing, but



      I want to know if it's possible to extract, simply the /etc/ssh/sshd_config file that gets used for a given security profile from an already running RHEL or CentOS system not having that profile applied at system creation; I do not want to spend the time installing RHEL/CentOS on a new system disk (10 times) with a profile applied to then extract and save said file(s) to a usb stick for comparison and understanding.







      ssh security xml anaconda scap






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited 1 hour ago







      ron

















      asked 3 hours ago









      ronron

      1,1822819




      1,1822819






















          0






          active

          oldest

          votes












          Your Answer








          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "106"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: false,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });














          draft saved

          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f512682%2fextracting-security-profile-specific-files-rhel-centos%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown

























          0






          active

          oldest

          votes








          0






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes
















          draft saved

          draft discarded




















































          Thanks for contributing an answer to Unix & Linux Stack Exchange!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f512682%2fextracting-security-profile-specific-files-rhel-centos%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Taj Mahal Inhaltsverzeichnis Aufbau | Geschichte | 350-Jahr-Feier | Heutige Bedeutung | Siehe auch |...

          Baia Sprie Cuprins Etimologie | Istorie | Demografie | Politică și administrație | Arii naturale...

          Nicolae Petrescu-Găină Cuprins Biografie | Opera | In memoriam | Varia | Controverse, incertitudini...