-
Notifications
You must be signed in to change notification settings - Fork 706
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New sle 12/15 rule ensure_updates_are_installed #10089
New sle 12/15 rule ensure_updates_are_installed #10089
Conversation
Hi @rumch-se. Thanks for your PR. I'm waiting for a ComplianceAsCode member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Code Climate has analyzed commit c3cd477 and detected 0 issues on this pull request. The test coverage on the diff in this pull request is 100.0% (50% is the threshold). This pull request will bring the total coverage in the repository to 49.7% (0.0% change). View more on Code Climate. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@rumch-se , I believe your can use this existing rule instead:
https://github.com/ComplianceAsCode/content/blob/master/linux_os/guide/system/software/updating/security_patches_up_to_date/rule.yml
It is for the same purpose and is more complete.
Hello @marcusburghardt |
It brings a point to discuss. For example, in CIS for RHEL there is also a similar requirement. Since it is a @yuumasato , @Mab879 , @vojtapolasek , @ggbecker , what do you think? |
I think I agree. I don't think we should create new rules which are supposed to NOT have any automation associated - I mean in case we know it from the begining. I think the correct way would be to mark such a control as "manual" and possibly add related_rules. |
Hello @vojtapolasek - I have a question about automation of the rules. In general we have audit and remediation part which a subject of automation. But there are some cases when one of the parts is not possible to be automatized (usually audit when OVAL is not applicable). According to the controls definitions what is the correct status for these rules? |
Hello @rumch-se could you give me some example please? If the OVAL is not applicable in all cases, I don't see a reason for having it there at all... |
Hello @vojtapolasek According to the this CIS rule nftables creates a table in the memory of the OS, and when the OS is restarted this information will be not in the memory any more. I don't know how to check with OVAL that the object exist into memory - to make audit. During the remediation we can check if there is a table or not, but if I want to make an automatic audit only I don't know how to make it. Have a nice day |
<pre>$ sudo zypper list-updates</pre> | ||
If your have to update all packages on the system according to site policy, the following | ||
command will install them: | ||
<pre>$ sudo zypper update</pre> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should fit better in the fixtext
instead of ocil
.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@rumch-se , I have checked this proposed new rule and compared to the existing security_patches_up_to_date
. The second is more complete and also used by SUSE. It is preferable that you use it instead of creating a new rule to do almost the same. This increases project maintenance and similar rules for the same purpose cause confusion to the users. Regarding the remediation, you can edit the platform
header and this would make it to be skipped for SLE products. You can also update the ocil
and fixtext
in the existing rule to make it conditional to SLE
products.
Here are the definitions of the current available statuses: |
Like mentioned by @Mab879 in the #10128 the check can be done via OVAL or SCE (script check engine). But the SCE is not SCAP compliant. Here is an example of rule using SCE: https://github.com/ComplianceAsCode/content/tree/master/linux_os/guide/system/accounts/accounts-session/accounts_users_own_home_directories |
@rumch-se are you ok to close this PR and use the |
Hello @marcusburghardt |
Base on #10089 (comment) and confirmation from @rumch-se in #10089 (comment), I am closing this PR in favor of |
Description:
installed _
Rationale:
and should be addressed manually.