QRadar installations for highly secure environments

This Security Technical Implementation Guide (STIG) provides guidance for implementing security standards for IBM® QRadar® deployments in highly secure environments, such as the federal government. These security standards meet the requirements set by the Defense Information Systems Agency (DISA).

Hardening of the operating system and QRadar hosts to implement the Security Technical Implementation Guide (STIG) standards is part of making QRadar deployments more secure. Some of the steps that are required to secure a QRadar deployment are not specified in the Red Hat Enterprise Linux STIG documents.

The procedures in this guide are not suitable for every QRadar deployment, however, you must complete the procedures if you want your deployment to be STIG compliant.
  1. Ensure that your system meets the hardware and software requirements.
  2. Install the software.
  3. Create a non-root user.
  4. Run the hardening script on the QRadar console.
  5. Edit the QRadar configuration.
  6. Modify the GRUB2 boot loader configuration.
  7. Verify the installation.