Skip to content
This repository was archived by the owner on Aug 24, 2020. It is now read-only.

Latest commit

 

History

History
114 lines (77 loc) · 4.51 KB

File metadata and controls

114 lines (77 loc) · 4.51 KB

Telekom Security Compliance Framework

To restrict the reachability of listening TCP and UDP services on a system (as required with Req. 2) it is recommended to use IPTables. TCP Wrapper, as another solution for traffic control, has some major drawbacks and cannot be recommended.

The following requirements are a minimal setup for IPTables. If needed additional rules must be con-figured.

Loopback traffic is used between server processes. A policy for traffic to the loopback network (127.0.0.0/8) must be configured for all other network interfaces.

Motivation: To prevent spoofing attacks, the loopback netwSLES 15t be protected from such malicious traffic.

Implementation (Ubuntu LTS (14.04/16.04/18.04), RHEL 7.x, SLES 15)

   <tbd>implementation

Compliance Check (Ubuntu LTS (14.04/16.04/18.04), RHEL 7.x, SLES 15)

   <tbd>Compliance Check

For outbound and established connections iptables policies must be configured.

Motivation: Without rules for outbound and established connections all packets will be dropped by the default iptables policy which will prevent network usage.

Implementation (Ubuntu LTS (14.04/16.04/18.04), RHEL 7.x, SLES 15)

   <tbd>implementation

Compliance Check (Ubuntu LTS (14.04/16.04/18.04), RHEL 7.x, SLES 15)

   <tbd>Compliance Check

It is necessary to configure iptables rules for all available services (ports) on a server. If a complete reachability is not needed (for example for management services like SSH) a restriction to source IP addresses or IP networks must be implemented.

Motivation: A restriction of reachability of a network service minimizes the possible attack vector.

Implementation (Ubuntu LTS (14.04/16.04/18.04), RHEL 7.x, SLES 15)

   <tbd>implementation

Compliance Check (Ubuntu LTS (14.04/16.04/18.04), RHEL 7.x, SLES 15)

   <tbd>Compliance Check

To reject connections to unconfigured network services, the default policy of iptables must be con-figured to DROP all packets not caught by other policies.

Motivation: Uncontrolled access to network services is possible without an iptables default DROP policy.

Implementation (Ubuntu LTS (14.04/16.04/18.04), RHEL 7.x, SLES 15)

   <tbd>implementation

Compliance Check (Ubuntu LTS (14.04/16.04/18.04), RHEL 7.x, SLES 15)

   <tbd>Compliance Check