Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update ol8 stig #11828

Merged
merged 7 commits into from
Apr 18, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@ identifiers:

references:
srg: SRG-OS-000067-GPOS-00035
stigid@ol8: OL08-00-010100
stigid@rhel8: RHEL-08-010100

ocil_clause: 'no ssh private key is accessible without a passcode'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,6 @@ references:
disa: CCI-000186
nist: IA-5(2),IA-5(2).1
srg: SRG-OS-000067-GPOS-00035
stigid@ol8: OL08-00-010100

ocil_clause: Any contents were displayed without asking a passphrase

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,6 +50,7 @@ references:
nist-csf: DE.CM-1,DE.CM-3,PR.AC-1,PR.AC-4,PR.AC-6,PR.AC-7,PR.IP-2
pcidss: Req-8.1.8
srg: SRG-OS-000163-GPOS-00072,SRG-OS-000279-GPOS-00109
stigid@ol8: OL08-00-010200
stigid@rhel8: RHEL-08-010200
stigid@sle12: SLES-12-030191
stigid@sle15: SLES-15-010320
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,6 @@ references:
pcidss: Req-8.1.8
srg: SRG-OS-000126-GPOS-00066,SRG-OS-000163-GPOS-00072,SRG-OS-000279-GPOS-00109
stigid@ol7: OL07-00-040340
stigid@ol8: OL08-00-010200
stigid@rhel7: RHEL-07-040340
stigid@sle12: SLES-12-030191
stigid@sle15: SLES-15-010320
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,6 @@ references:
nist: AC-2(2),AC-2(3),CM-6(a)
nist-csf: DE.CM-1,DE.CM-3,PR.AC-1,PR.AC-4,PR.AC-6
srg: SRG-OS-000123-GPOS-00064,SRG-OS-000002-GPOS-00002
stigid@ol8: OL08-00-020270
stigid@rhel7: RHEL-07-010271

ocil_clause: 'any emergency accounts have no expiration date set or do not expire within 72 hours'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ references:
nist-csf: DE.CM-1,DE.CM-3,PR.AC-1,PR.AC-4,PR.AC-6
srg: SRG-OS-000123-GPOS-00064,SRG-OS-000002-GPOS-00002
stigid@ol7: OL07-00-010271
stigid@ol8: OL08-00-020000
stigid@ol8: OL08-00-020000,OL08-00-020270
stigid@rhel7: RHEL-07-010271
stigid@rhel8: RHEL-08-020000,RHEL-08-020270
stigid@sle12: SLES-12-010331
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,7 @@ identifiers:
references:
disa: CCI-000162,CCI-000163,CCI-000164
srg: SRG-OS-000462-GPOS-00206,SRG-OS-000475-GPOS-00220,SRG-OS-000057-GPOS-00027,SRG-OS-000058-GPOS-00028,SRG-OS-000059-GPOS-00029
stigid@ol8: OL08-00-030122
stigid@rhel8: RHEL-08-030122

ocil_clause: 'the system is not configured to make login UIDs immutable'
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
#!/bin/bash
# packages = audit
# variables = var_auditd_name_format=hostname|fqd|numeric
# Ensure test system has proper directories/files for test scenario
bash -x setup.sh

Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
#!/bin/bash
# packages = audit
# variables = var_auditd_name_format=hostname|fqd|numeric
# Ensure test system has proper directories/files for test scenario
bash -x setup.sh

Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
#!/bin/bash
# packages = audit
# variables = var_auditd_name_format=hostname|fqd|numeric
# Ensure test system has proper directories/files for test scenario
bash -x setup.sh

{{%- if product in ["rhel7", "ol7"] %}}
config_file="/etc/audisp/audispd.conf"
{{%- else %}}
config_file="/etc/audit/auditd.conf"
{{%- endif %}}

# remove any occurrence
sed -i "s/^.*name_format.*$//" $config_file
echo "name_format = fqd" >> $config_file
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
#!/bin/bash
# packages = audit
# variables = var_auditd_name_format=hostname|fqd|numeric
# Ensure test system has proper directories/files for test scenario

bash -x setup.sh
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
#!/bin/bash
# packages = audit
# variables = var_auditd_name_format=hostname|fqd|numeric

{{%- if product in ["rhel7", "ol7"] %}}
config_file="/etc/audisp/audispd.conf"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
#!/bin/bash
# packages = audit
# variables = var_auditd_name_format=hostname|fqd|numeric
# Ensure test system has proper directories/files for test scenario
bash -x setup.sh

Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
#!/bin/bash
# packages = audit
# variables = var_auditd_name_format=hostname|fqd|numeric
# Ensure test system has proper directories/files for test scenario
bash -x setup.sh

{{%- if product in ["rhel7", "ol7"] %}}
config_file="/etc/audisp/audispd.conf"
{{%- else %}}
config_file="/etc/audit/auditd.conf"
{{%- endif %}}

# remove any occurrence
sed -i "s/^.*name_format.*$//" $config_file
echo "name_format = none" >> $config_file
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,6 @@ references:
nist: AU-2(a)
ospp: FAU_GEN.1.2
srg: SRG-OS-000462-GPOS-00206,SRG-OS-000475-GPOS-00220,SRG-OS-000057-GPOS-00027,SRG-OS-000058-GPOS-00028,SRG-OS-000059-GPOS-00029,SRG-APP-000121-CTR-000255,SRG-APP-000495-CTR-001235
stigid@ol8: OL08-00-030122

ocil_clause: 'the file does not exist or the content differs'

Expand Down
18 changes: 10 additions & 8 deletions products/ol8/profiles/stig.profile
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,6 @@ selections:
- var_password_pam_lcredit=1
- var_password_pam_retry=3
- var_password_pam_minlen=15
- var_sshd_set_keepalive=0
- sshd_approved_macs=stig_extended
- sshd_approved_ciphers=stig_extended
- sshd_idle_timeout_value=10_minutes
Expand All @@ -61,6 +60,7 @@ selections:
- var_auditd_disk_full_action=ol8
- var_sssd_certificate_verification_digest_function=sha1
- login_banner_text=dod_banners
- var_authselect_profile=sssd

### Enable / Configure FIPS
- enable_fips_mode
Expand All @@ -71,6 +71,9 @@ selections:
- configure_kerberos_crypto_policy
- enable_dracut_fips_module

# Other needed rules
- enable_authselect

### Rules:
# OL08-00-010000
- installed_OS_is_vendor_supported
Expand Down Expand Up @@ -113,7 +116,7 @@ selections:
- sssd_has_trust_anchor

# OL08-00-010100
- ssh_private_keys_have_passcode
- ssh_keys_passphrase_protected

# OL08-00-010110
- set_password_hashing_algorithm_logindefs
Expand Down Expand Up @@ -167,7 +170,8 @@ selections:
- dir_perms_world_writable_sticky_bits

# OL08-00-010200
- sshd_set_keepalive_0
- sshd_set_keepalive
- var_sshd_set_keepalive=1

# OL08-00-010201
- sshd_set_idle_timeout
Expand Down Expand Up @@ -486,7 +490,7 @@ selections:
- sshd_do_not_permit_user_env
- sshd_do_not_permit_user_env.severity=high

# OL08-00-020000
# OL08-00-020000, OL08-00-020270
- account_temp_expire_date

# OL08-00-020010, OL08-00-020011
Expand Down Expand Up @@ -653,9 +657,6 @@ selections:
# OL08-00-020264
- file_groupownership_lastlog

# OL08-00-020270
- account_emergency_expire_date

# OL08-00-020280
- accounts_password_pam_ocredit
- accounts_password_pam_ocredit.severity=low
Expand Down Expand Up @@ -718,6 +719,7 @@ selections:

# OL08-00-030062
- auditd_name_format
- var_auditd_name_format=stig

# OL08-00-030063
- auditd_log_format
Expand All @@ -744,7 +746,7 @@ selections:
- audit_rules_immutable

# OL08-00-030122
- audit_immutable_login_uids
- audit_rules_immutable_login_uids

# OL08-00-030130
- audit_rules_usergroup_modification_shadow
Expand Down
Loading