Disable ctrl-alt-del key sequence [+Docs]

This patch masks the systemd unit that controls the C-A-D key sequence.

Implements: blueprint security-rhel7-stig
Change-Id: I9bd01641fd8787fab90921e360e5933953871d51
This commit is contained in:
Major Hayden 2016-11-30 12:49:38 -06:00
parent 9880cebafe
commit 40ca9cf990
4 changed files with 37 additions and 2 deletions

View File

@ -505,6 +505,8 @@ security_enable_graphical_login_message_text: >
security_rhel7_disable_autofs: yes # RHEL-07-020161
# Enable virus scanning with clamav
security_enable_virus_scanner: no # RHEL-07-030810
# Disable ctrl-alt-delete key sequence on the console.
security_rhel7_disable_ctrl_alt_delete: yes # RHEL-07-020220
## Packages (packages)
# Remove packages from the system as required by the STIG. Set any of these

View File

@ -1,7 +1,14 @@
---
id: RHEL-07-020220
status: not implemented
status: implemented
tag: misc
---
This STIG requirement is not yet implemented.
The tasks in the security role disable the control-alt-delete key sequence by
masking its systemd service unit.
Deployers can opt out of this change by setting the following Ansible variable:
.. code-block:: yaml
security_rhel7_disable_ctrl_alt_delete: no

View File

@ -86,3 +86,7 @@
- name: dconf update
command: dconf update
- name: reload systemd
systemd:
daemon-reload: yes

View File

@ -35,6 +35,28 @@
- misc
- RHEL-07-020161
# This returns an exit code of 0 if it's running, 3 if it's masked.
- name: Check if ctrl-alt-del.target is already masked
command: systemctl status ctrl-alt-del.target
register: cad_mask_check
check_mode: no
changed_when: False
failed_when: cad_mask_check.rc not in [0,3]
tags:
- always
- name: RHEL-07-020220 - The x86 Ctrl-Alt-Delete key sequence must be disabled
command: systemctl mask ctrl-alt-del.target
when:
- security_rhel7_disable_ctrl_alt_delete | bool
- cad_mask_check.rc != 3
notify:
- reload systemd
tags:
- high
- misc
- RHEL-07-020220
- name: Check if ClamAV is installed
stat:
path: /usr/bin/clamdscan