-
Notifications
You must be signed in to change notification settings - Fork 710
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add remediation and OVAL for UBTU-20-010297 #11098
Add remediation and OVAL for UBTU-20-010297 #11098
Conversation
This commit will add shell and ansible remediations for kmod. Additionally, adds in OVAL definition.
Hi @dexterle. Thanks for your PR. I'm waiting for a ComplianceAsCode member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@dexterle , I saw you opened 41 draft PRs. We definitely appreciate your collaboration in the project, but 41 draft PRs without proper description is making the PRs queue a little messy and consequently hard to review. Please, take a time and organize your existing PRs:
I also invite you to join the Project room in Gitter: |
@marcusburghardt , apologies for the delay on the PR updates, and thank you for your patience. I have modified all of the Ubuntu profile upgrade STIG PRs with proper descriptions and moved to "Ready for Review". I have also joined the project room in Glitter, and will spend time rebasing and testing. |
Great @dexterle. You do not need to apologize. You are getting used to the project and everything is fine. Most maintainers are on Gitter. You can also contact us there when you need any help. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Perhaps it is time to simplify this rule. Currently the OVAL and remediation are named to satisfy only specific products but the rule is be valid for many other products. Ideally, this rule should use the audit_rules_privileged_commands
template, like other similar rules. If there is any particularity where the template is not suitable, we should unify the files using the shared
name. What do you think @ComplianceAsCode/suse-maintainers , @ComplianceAsCode/ubuntu-maintainers , @ComplianceAsCode/oracle-maintainers ?
sounds good to me |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please check our comments above
This sounds good 👍🏻
Looking at OL7 and OL8 STIGs, the template works for OL7. However for OL8 DISA is using a different syntax for the rules.
This is true for a number of audit rules. If other products are in a similar position we could modify the template to accommodate both syntaxes. |
Completely agree 👍 , let's start with shared and platform restriction there and we can add platforms as we go :) |
This datastream diff is auto generated by the check Click here to see the full diffOVAL for rule 'xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_kmod' differs.
--- oval:ssg-audit_rules_privileged_commands_kmod:def:1
+++ oval:ssg-audit_rules_privileged_commands_kmod:def:1
@@ -1,7 +1,7 @@
criteria OR
criteria AND
extend_definition oval:ssg-audit_rules_augenrules:def:1
-criterion oval:ssg-test_audit_rules_privileged_commands_kmod_augenrules:tst:1
+criterion oval:ssg-test_kmod_augenrules:tst:1
criteria AND
extend_definition oval:ssg-audit_rules_auditctl:def:1
-criterion oval:ssg-test_audit_rules_privileged_commands_kmod_auditctl:tst:1
+criterion oval:ssg-test_kmod_auditctl:tst:1
New datastream is missing bash remediation for rule 'xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_kmod'.
New datastream is missing ansible remediation for rule 'xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_kmod'. |
This commit will remove specific remediations for sle15 and sle12 to adopt shared remediations. This is necessary for the following OS's because the supplied template within rule.yml is not applicable.
479094d
to
b28df48
Compare
Code Climate has analyzed commit b28df48 and detected 0 issues on this pull request. The test coverage on the diff in this pull request is 100.0% (50% is the threshold). This pull request will bring the total coverage in the repository to 56.9%. View more on Code Climate. |
@teacup-on-rockingchair could you check if this looks ok from SUSE's perspective? There are some failing tests. |
Those seem to fail for two reasons:
After that I got result 'not applicable' on those since they seem to be only |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍 nice stuff
Thanks to @dodys for the initial feedback on this in the context of ComplianceAsCode#11098
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
that also lgtm, thanks!
Description:
Rationale:
Review Hints:
Build the product:
To test these changes with Ansible:
To test changes with bash, run the remediation sections:
xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_kmod
Checkout Manual STIG OVAL definitions, and use software like DISA STIG Viewer to view definitions.
This STIG can be tested with the latest Ubuntu 2004 Benchmark SCAP. For reference, please review the latest artifacts: https://public.cyber.mil/stigs/downloads/