Rule ID
SV-282627r1200861_rule
Version
V1R1
CCIs
Using interactive or recovery boot, the console user could disable auditing, firewalls, or other services, thereby weakening system security.
Verify GRUB 2 is configured to disable interactive boot. Check that the current GRUB 2 configuration disables the ability of systemd to spawn an interactive boot process using the following command: $ sudo grubby --info=ALL | grep args | grep 'systemd.confirm_spawn' If any output is returned, this is a finding.
Configure TOSS 5 to allocate sufficient audit_backlog_limit to disable the ability of systemd to spawn an interactive boot process using the following command: $ sudo grubby --update-kernel=ALL --remove-args="systemd.confirm_spawn"