Automate the STIG documentation
With the upcoming changes to rebase onto the RHEL 7 STIG controls, there needs to be a new solution for documentation that is easier to manage and filter. This patch automates the generation of the STIG control documentation in the following way: * A Sphinx extension runs early in the doc build process that writes all of the individual STIG control docs as well as ToC pages. * ToC pages are now sorted by severity, tag, and implementation status. * A giant listing of controls is easier to navigate now. * Docs are generated from metadata in the /doc/metadata directory. New documentation only needs to be added there. (Will explain this in the developer notes in a subsequent patch.) Implements: blueprint security-rhel7-stig Change-Id: I455af1121049f52193e98e2c9cb1ba5d4c292386
This commit is contained in:
parent
b2c5dc0264
commit
e57593dfd4
3
.gitignore
vendored
3
.gitignore
vendored
@ -65,3 +65,6 @@ releasenotes/build
|
|||||||
|
|
||||||
# Vagrant testing artifacts
|
# Vagrant testing artifacts
|
||||||
.vagrant
|
.vagrant
|
||||||
|
|
||||||
|
# Automatically generated documentation
|
||||||
|
doc/source/auto_*
|
||||||
|
3168
doc/metadata/U_RedHat_6_V1R12_Manual-xccdf.xml
Normal file
3168
doc/metadata/U_RedHat_6_V1R12_Manual-xccdf.xml
Normal file
File diff suppressed because one or more lines are too long
61
doc/metadata/import-existing-notes.py
Normal file
61
doc/metadata/import-existing-notes.py
Normal file
@ -0,0 +1,61 @@
|
|||||||
|
#!/usr/bin/env python
|
||||||
|
# Copyright 2016, Rackspace US, Inc.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
"""Import existing developer notes into base YAML format."""
|
||||||
|
import os
|
||||||
|
|
||||||
|
|
||||||
|
import jinja2
|
||||||
|
|
||||||
|
|
||||||
|
SCRIPT_DIR = os.path.dirname(os.path.abspath(__file__))
|
||||||
|
METADATA_DIR = "{0}/rhel6".format(SCRIPT_DIR)
|
||||||
|
NOTES_DIR = "{0}/../source/stig-notes".format(SCRIPT_DIR)
|
||||||
|
|
||||||
|
yaml_tmp = """---
|
||||||
|
id: {{ note_data['id'] }}
|
||||||
|
status: {{ note_data['status'] }}
|
||||||
|
tag: {{ note_data['tag'] }}
|
||||||
|
---
|
||||||
|
|
||||||
|
{{ note_data['deployer_notes'] }}
|
||||||
|
"""
|
||||||
|
|
||||||
|
|
||||||
|
note_files = [x for x in os.listdir(NOTES_DIR) if 'developer' in x]
|
||||||
|
for note_file in note_files:
|
||||||
|
stig_id = note_file[0:7]
|
||||||
|
|
||||||
|
with open("{0}/{1}".format(NOTES_DIR, note_file), 'r') as f:
|
||||||
|
content = f.read()
|
||||||
|
|
||||||
|
first_line = content.splitlines()[0]
|
||||||
|
print(first_line)
|
||||||
|
if 'exception' in first_line.lower():
|
||||||
|
status = 'exception'
|
||||||
|
elif 'opt-in' in first_line.lower():
|
||||||
|
status = 'opt-in'
|
||||||
|
else:
|
||||||
|
status = 'implemented'
|
||||||
|
|
||||||
|
note_data = {
|
||||||
|
'id': stig_id,
|
||||||
|
'status': status,
|
||||||
|
'tag': 'misc',
|
||||||
|
'deployer_notes': content
|
||||||
|
}
|
||||||
|
|
||||||
|
with open("{0}/{1}.rst".format(METADATA_DIR, stig_id), 'w') as f:
|
||||||
|
template = jinja2.Template(yaml_tmp)
|
||||||
|
f.write(template.render(note_data=note_data))
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38437
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
If ``autofs`` is installed, it will be disabled by Ansible tasks. To opt-out
|
If ``autofs`` is installed, it will be disabled by Ansible tasks. To opt-out
|
||||||
of this change, adjust the following variable:
|
of this change, adjust the following variable:
|
||||||
|
|
@ -1,7 +1,10 @@
|
|||||||
The role will add ``audit=1`` to the ``GRUB_CMDLINE_LINUX_DEFAULT`` variable
|
---
|
||||||
in the GRUB configuration within ``/etc/default/grub.d/`` and it will also
|
id: V-38438
|
||||||
update the active ``grub.cfg`` so that the change takes effect on the next
|
status: exception
|
||||||
boot.
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
|
**Exception**
|
||||||
|
|
||||||
To opt-out of the change, set the following variable:
|
To opt-out of the change, set the following variable:
|
||||||
|
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38439
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Although adding centralized authentication and carefully managing user
|
Although adding centralized authentication and carefully managing user
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38443
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The ``/etc/gshadow`` file is owned by root by default on Ubuntu 14.04, Ubuntu
|
The ``/etc/gshadow`` file is owned by root by default on Ubuntu 14.04, Ubuntu
|
||||||
16.04 and CentOS 7. The security role ensures that the file is owned by root.
|
16.04 and CentOS 7. The security role ensures that the file is owned by root.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38444
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
See V-38551 for additional details. IPv6 configuration and filtering is left
|
See V-38551 for additional details. IPv6 configuration and filtering is left
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38445
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The logs generated by the audit daemon are owned by root in Ubuntu 14.04,
|
The logs generated by the audit daemon are owned by root in Ubuntu 14.04,
|
||||||
Ubuntu 16.04 and CentOS 7. The Ansible task for V-38445 ensures that the files
|
Ubuntu 16.04 and CentOS 7. The Ansible task for V-38445 ensures that the files
|
||||||
are owned by the root user.
|
are owned by the root user.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38446
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Forwarding root's email to another user is highly recommended, but the Ansible
|
Forwarding root's email to another user is highly recommended, but the Ansible
|
||||||
tasks won't configure an email address to receive root's email unless that
|
tasks won't configure an email address to receive root's email unless that
|
||||||
email address is configured. Set ``security_root_forward_email`` to an email
|
email address is configured. Set ``security_root_forward_email`` to an email
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38447
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Although Ubuntu provides the ``debsums`` command for checking the contents of
|
Although Ubuntu provides the ``debsums`` command for checking the contents of
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38448
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Although the ``/etc/gshadow`` file is group-owned by root by default, the
|
Although the ``/etc/gshadow`` file is group-owned by root by default, the
|
||||||
Ansible tasks will ensure that it is configured that way.
|
Ansible tasks will ensure that it is configured that way.
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38449
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The ``/etc/gshadow`` file's permissions will be changed to ``0000`` to meet
|
The ``/etc/gshadow`` file's permissions will be changed to ``0000`` to meet
|
||||||
the requirements of the STIG.
|
the requirements of the STIG.
|
@ -1 +1,7 @@
|
|||||||
|
---
|
||||||
|
id: V-38450
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The ownership of ``/etc/passwd`` will be changed to root.
|
The ownership of ``/etc/passwd`` will be changed to root.
|
@ -1 +1,7 @@
|
|||||||
|
---
|
||||||
|
id: V-38451
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The group ownership for ``/etc/passwd`` will be set to root.
|
The group ownership for ``/etc/passwd`` will be set to root.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38452
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Although Ubuntu provides the ``debsums`` command for checking the contents of
|
Although Ubuntu provides the ``debsums`` command for checking the contents of
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38453
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception for Ubuntu**
|
**Exception for Ubuntu**
|
||||||
|
|
||||||
Verifying ownership and permissions of installed packages isn't possible in the
|
Verifying ownership and permissions of installed packages isn't possible in the
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38454
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Although Ubuntu provides the ``debsums`` command for checking the contents of
|
Although Ubuntu provides the ``debsums`` command for checking the contents of
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38455
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Configuring another mount for ``/tmp`` can disrupt a running system and this
|
Configuring another mount for ``/tmp`` can disrupt a running system and this
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38456
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Configuring another mount for ``/var`` can disrupt a running system and this
|
Configuring another mount for ``/var`` can disrupt a running system and this
|
@ -1 +1,7 @@
|
|||||||
|
---
|
||||||
|
id: V-38457
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The permissions for ``/etc/passwd`` will be set to ``0644``.
|
The permissions for ``/etc/passwd`` will be set to ``0644``.
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38458
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The Ansible task will ensure that the ``/etc/group`` file is owned by the root
|
The Ansible task will ensure that the ``/etc/group`` file is owned by the root
|
||||||
user.
|
user.
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38459
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The tasks in file_perms.yml will ensure that "/etc/group" is owned by
|
The tasks in file_perms.yml will ensure that "/etc/group" is owned by
|
||||||
the root account.
|
the root account.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38460
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The Ansible tasks will check for ``all_squash`` in ``/etc/exports`` (if it is
|
The Ansible tasks will check for ``all_squash`` in ``/etc/exports`` (if it is
|
||||||
present). If found, a warning message will be printed. No configuration
|
present). If found, a warning message will be printed. No configuration
|
||||||
changes will be made since neither Ubuntu or openstack-ansible configures
|
changes will be made since neither Ubuntu or openstack-ansible configures
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38461
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Ubuntu sets the mode of ``/etc/group`` to ``0644`` by default and the Ansible
|
Ubuntu sets the mode of ``/etc/group`` to ``0644`` by default and the Ansible
|
||||||
task will ensure that it is current set to those permissions.
|
task will ensure that it is current set to those permissions.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38462
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
All versions of Ubuntu and CentOS supported by the role verify packages against
|
All versions of Ubuntu and CentOS supported by the role verify packages against
|
||||||
GPG signatures by default.
|
GPG signatures by default.
|
||||||
|
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38463
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Configuring a separate partition for ``/var/log`` is currently left up to the
|
Configuring a separate partition for ``/var/log`` is currently left up to the
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38464
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The default configuration for ``disk_error_action`` is ``SUSPEND``, which
|
The default configuration for ``disk_error_action`` is ``SUSPEND``, which
|
||||||
only suspends audit logging when there is a disk error on the system.
|
only suspends audit logging when there is a disk error on the system.
|
||||||
Suspending audit logging can lead to security problems because the system is no
|
Suspending audit logging can lead to security problems because the system is no
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38465
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Ubuntu 14.04, Ubuntu 16.04 and CentOS 7 set library files to have ``0755`` (or
|
Ubuntu 14.04, Ubuntu 16.04 and CentOS 7 set library files to have ``0755`` (or
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38466
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
As with V-38465, Ubuntu 14.04, Ubuntu 16.04, and CentOS 7 set the ownership of
|
As with V-38465, Ubuntu 14.04, Ubuntu 16.04, and CentOS 7 set the ownership of
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38467
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Storing audit logs on a separate partition is recommended, but this change
|
Storing audit logs on a separate partition is recommended, but this change
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38468
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The default configuration for ``disk_full_action`` is ``SUSPEND``, which only
|
The default configuration for ``disk_full_action`` is ``SUSPEND``, which only
|
||||||
suspends audit logging. Suspending audit logging can lead to security problems
|
suspends audit logging. Suspending audit logging can lead to security problems
|
||||||
because the system is no longer keeping track of which syscalls were made.
|
because the system is no longer keeping track of which syscalls were made.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38469
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Ubuntu 14.04, Ubuntu 16.04, and CentOS 7 set the permissions for system
|
Ubuntu 14.04, Ubuntu 16.04, and CentOS 7 set the permissions for system
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38470
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The default configuration for ``security_space_left_action`` is ``SUSPEND``,
|
The default configuration for ``security_space_left_action`` is ``SUSPEND``,
|
||||||
which actually only suspends audit logging. Suspending audit logging can lead
|
which actually only suspends audit logging. Suspending audit logging can lead
|
||||||
to security problems because the system is no longer keeping track of which
|
to security problems because the system is no longer keeping track of which
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38471
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
An Ansible task will adjust ``active`` from `no` to `yes` in
|
An Ansible task will adjust ``active`` from `no` to `yes` in
|
||||||
``/etc/audisp/plugins.d/syslog.conf`` so that auditd records are forwarded to
|
``/etc/audisp/plugins.d/syslog.conf`` so that auditd records are forwarded to
|
||||||
syslog automatically. The auditd daemon will be restarted if the configuration
|
syslog automatically. The auditd daemon will be restarted if the configuration
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38472
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Ubuntu 14.04, Ubuntu 16.04, and CentOS 7 set system commands to be owned by
|
Ubuntu 14.04, Ubuntu 16.04, and CentOS 7 set system commands to be owned by
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38473
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Creating ``/home`` on a different partition is highly recommended but it is
|
Creating ``/home`` on a different partition is highly recommended but it is
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38474
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
The openstack-ansible roles don't install X by default, so there is no
|
The openstack-ansible roles don't install X by default, so there is no
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38475
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Configuration required**
|
**Configuration required**
|
||||||
|
|
||||||
The STIG recommends passwords to be a minimum of 14 characters in length. To
|
The STIG recommends passwords to be a minimum of 14 characters in length. To
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38476
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The security role verifies that the GPG keys that correspond to each supported
|
The security role verifies that the GPG keys that correspond to each supported
|
||||||
Linux distribution are installed on each host. If the GPG keys are not found,
|
Linux distribution are installed on each host. If the GPG keys are not found,
|
||||||
or if they differ from the list of trusted GPG keys, the playbook execution
|
or if they differ from the list of trusted GPG keys, the playbook execution
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38477
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Configuration required**
|
**Configuration required**
|
||||||
|
|
||||||
The STIG recommends setting a limit of one password change per day. To enable
|
The STIG recommends setting a limit of one password change per day. To enable
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38478
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Ubuntu and CentOS do not use the Red Hat Network Service. However, there are
|
Ubuntu and CentOS do not use the Red Hat Network Service. However, there are
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38479
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Configuration required**
|
**Configuration required**
|
||||||
|
|
||||||
The STIG recommends setting a limit of 60 days before a password must
|
The STIG recommends setting a limit of 60 days before a password must
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38480
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Configuration required**
|
**Configuration required**
|
||||||
|
|
||||||
After enabling password age limits in V-38479, be sure to configure
|
After enabling password age limits in V-38479, be sure to configure
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38481
|
||||||
|
status: opt-in
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Opt-in required**
|
**Opt-in required**
|
||||||
|
|
||||||
Operating system patching policies vary from organization to organization and
|
Operating system patching policies vary from organization to organization and
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38482
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Password complexity requirements are left up to the deployer. Deployers are
|
Password complexity requirements are left up to the deployer. Deployers are
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38483
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The Ansible task for V-38462 already checks for configurations that would
|
The Ansible task for V-38462 already checks for configurations that would
|
||||||
disable any GPG checks when installing packages. However, it is possible for
|
disable any GPG checks when installing packages. However, it is possible for
|
||||||
the root user to override these configurations via command line parameters.
|
the root user to override these configurations via command line parameters.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38484
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Ubuntu 14.04, Ubuntu 16.04, and CentOS 7 already enable the display of the last
|
Ubuntu 14.04, Ubuntu 16.04, and CentOS 7 already enable the display of the last
|
||||||
successful login for a user immediately after login. An Ansible task ensures
|
successful login for a user immediately after login. An Ansible task ensures
|
||||||
this setting is applied and restarts the ssh daemon if necessary.
|
this setting is applied and restarts the ssh daemon if necessary.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38486
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
System backups are left to the deployer to configure. Deployers are stringly
|
System backups are left to the deployer to configure. Deployers are stringly
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38487
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The Ansible task for V-38462 already checks for apt configurations that would
|
The Ansible task for V-38462 already checks for apt configurations that would
|
||||||
disable any GPG checks when installing packages. However, it's possible for
|
disable any GPG checks when installing packages. However, it's possible for
|
||||||
the root user to override these configurations via command line parameters.
|
the root user to override these configurations via command line parameters.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38488
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
System backups are left to the deployer to configure. Deployers are stringly
|
System backups are left to the deployer to configure. Deployers are stringly
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38489
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The security role installs and configures the ``aide`` package to provide file
|
The security role installs and configures the ``aide`` package to provide file
|
||||||
integrity monitoring on the host.
|
integrity monitoring on the host.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38490
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Disabling the ``usb-storage`` module can add extra security, but it's not
|
Disabling the ``usb-storage`` module can add extra security, but it's not
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38491
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The Ansible task will check for the presence of ``/etc/hosts.equiv`` and
|
The Ansible task will check for the presence of ``/etc/hosts.equiv`` and
|
||||||
``/root/.rhosts``. Both of those files could potentially be used with ``rsh``
|
``/root/.rhosts``. Both of those files could potentially be used with ``rsh``
|
||||||
for host access.
|
for host access.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38492
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Virtual consoles are helpful during an emergency and they can only be reached
|
Virtual consoles are helpful during an emergency and they can only be reached
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38493
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Ubuntu 14.04, Ubuntu 16.04, and CentOS 7 set the mode of ``/var/log/audit/`` to
|
Ubuntu 14.04, Ubuntu 16.04, and CentOS 7 set the mode of ``/var/log/audit/`` to
|
||||||
``0750`` by default. The Ansible task for this requirement ensures that the
|
``0750`` by default. The Ansible task for this requirement ensures that the
|
||||||
mode is ``0750`` (which is more strict than the STIG requirement).
|
mode is ``0750`` (which is more strict than the STIG requirement).
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38494
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Removing serial consoles from ``/etc/securetty`` can make troubleshooting
|
Removing serial consoles from ``/etc/securetty`` can make troubleshooting
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38495
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The Ansible tasks will ensure that files in ``/var/log/audit`` are owned
|
The Ansible tasks will ensure that files in ``/var/log/audit`` are owned
|
||||||
by the root user.
|
by the root user.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38496
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
The Ansible tasks will check for default system accounts (other than root)
|
The Ansible tasks will check for default system accounts (other than root)
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38497
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Ubuntu 14.04, Ubuntu 16.04, and CentOS 7 allow accounts with null passwords to
|
Ubuntu 14.04, Ubuntu 16.04, and CentOS 7 allow accounts with null passwords to
|
||||||
authenticate via PAM by default. This STIG requires that those login attempts
|
authenticate via PAM by default. This STIG requires that those login attempts
|
||||||
are blocked.
|
are blocked.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38498
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Ubuntu and CentOS set the current audit log (the one that is actively being
|
Ubuntu and CentOS set the current audit log (the one that is actively being
|
||||||
written to) to ``0600`` so that only the root user can read and write to it.
|
written to) to ``0600`` so that only the root user can read and write to it.
|
||||||
The older, rotated logs are set to ``0400`` since they should not receive
|
The older, rotated logs are set to ``0400`` since they should not receive
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38499
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The Ansible task will search for password hashes in ``/etc/passwd`` using
|
The Ansible task will search for password hashes in ``/etc/passwd`` using
|
||||||
awk and report a failure if any are found.
|
awk and report a failure if any are found.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38500
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The Ansible tasks will search for accounts in ``/etc/passwd`` that have UID 0
|
The Ansible tasks will search for accounts in ``/etc/passwd`` that have UID 0
|
||||||
that aren't the normal root account. If any matching accounts are found, a
|
that aren't the normal root account. If any matching accounts are found, a
|
||||||
warning is printed to stdout and the Ansible play will fail.
|
warning is printed to stdout and the Ansible play will fail.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38501
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception and opt-in alternative**
|
**Exception and opt-in alternative**
|
||||||
|
|
||||||
Adjusting PAM configurations is very risky since it affects how all users
|
Adjusting PAM configurations is very risky since it affects how all users
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38502
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The user and group ownership of ``/etc/passwd`` is root by default. The Ansible
|
The user and group ownership of ``/etc/passwd`` is root by default. The Ansible
|
||||||
task will ensure that the default is maintained.
|
task will ensure that the default is maintained.
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38503
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The user and group ownership of ``/etc/passwd`` is root by default. The Ansible
|
The user and group ownership of ``/etc/passwd`` is root by default. The Ansible
|
||||||
task will ensure that the default is maintained.
|
task will ensure that the default is maintained.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38504
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Ubuntu 14.04 and Ubuntu 16.04 set the mode of ``/etc/shadow`` to ``0640``, but
|
Ubuntu 14.04 and Ubuntu 16.04 set the mode of ``/etc/shadow`` to ``0640``, but
|
||||||
CentOS 7 sets it to ``000``. The STIG requires the mode to be ``000`` and the
|
CentOS 7 sets it to ``000``. The STIG requires the mode to be ``000`` and the
|
||||||
Ansible tasks in the security role ensure that the mode meets the requirement.
|
Ansible tasks in the security role ensure that the mode meets the requirement.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38511
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Special Case**
|
**Special Case**
|
||||||
|
|
||||||
Running virtual infrastructure requires IP forwarding to be enabled on various
|
Running virtual infrastructure requires IP forwarding to be enabled on various
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38512
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Although a minimal set of iptables rules are configured on openstack-ansible
|
Although a minimal set of iptables rules are configured on openstack-ansible
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38513
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Although a minimal set of iptables rules are configured on openstack-ansible
|
Although a minimal set of iptables rules are configured on openstack-ansible
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38514
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The Datagram Congestion Control Protocol (DCCP) must be disabled if it's not
|
The Datagram Congestion Control Protocol (DCCP) must be disabled if it's not
|
||||||
needed. Although this protocol is occasionally used in some OpenStack
|
needed. Although this protocol is occasionally used in some OpenStack
|
||||||
environments for quality of service functions, it is not in the default
|
environments for quality of service functions, it is not in the default
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38515
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The Stream Control Transmission Protocol (SCTP) must be disabled. To opt-out of
|
The Stream Control Transmission Protocol (SCTP) must be disabled. To opt-out of
|
||||||
this change, set the following variable to ``no``:
|
this change, set the following variable to ``no``:
|
||||||
|
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38516
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The `Reliable Datagram Sockets (RDS)`_ protocol must be disabled. The Ansible
|
The `Reliable Datagram Sockets (RDS)`_ protocol must be disabled. The Ansible
|
||||||
tasks in this role will disable the module.
|
tasks in this role will disable the module.
|
||||||
|
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38517
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The `Transparent Inter-Process Communication (TIPC)`_ protocol must be
|
The `Transparent Inter-Process Communication (TIPC)`_ protocol must be
|
||||||
disabled. To opt-out of this change, set the following variable to ``no``:
|
disabled. To opt-out of this change, set the following variable to ``no``:
|
||||||
|
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38518
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Different systems may have different log files populated depending on the type
|
Different systems may have different log files populated depending on the type
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38519
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
Different systems may have different log files populated depending on the type
|
Different systems may have different log files populated depending on the type
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38520
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
At the moment, openstack-ansible already sends logs to the rsyslog container
|
At the moment, openstack-ansible already sends logs to the rsyslog container
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38521
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
At the moment, openstack-ansible already sends logs to the rsyslog container
|
At the moment, openstack-ansible already sends logs to the rsyslog container
|
@ -1 +1,7 @@
|
|||||||
|
---
|
||||||
|
id: V-38522
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Rules are added for auditing changes to system time made via ``settimeofday``.
|
Rules are added for auditing changes to system time made via ``settimeofday``.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38523
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
The STIG makes several requirements for IPv4 network restrictions, but these
|
The STIG makes several requirements for IPv4 network restrictions, but these
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38524
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
This patch disables ICMPv4 redirects feature on the host.
|
This patch disables ICMPv4 redirects feature on the host.
|
||||||
Accepting ICMP redirects has few legitimate uses.
|
Accepting ICMP redirects has few legitimate uses.
|
||||||
It should be disabled unless it is absolutely required.
|
It should be disabled unless it is absolutely required.
|
@ -1 +1,7 @@
|
|||||||
|
---
|
||||||
|
id: V-38525
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Rules are added for auditing changes to system time done via ``stime``.
|
Rules are added for auditing changes to system time done via ``stime``.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38526
|
||||||
|
status: opt-in
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Opt-in required**
|
**Opt-in required**
|
||||||
|
|
||||||
The STIG requires that secure ICMP redirects are disabled, but this can cause
|
The STIG requires that secure ICMP redirects are disabled, but this can cause
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38527
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Rules are added for auditing changes to system time done via
|
Rules are added for auditing changes to system time done via
|
||||||
``clock_settime``.
|
``clock_settime``.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38528
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
The STIG requires that all martian packets are logged by setting the sysctl
|
The STIG requires that all martian packets are logged by setting the sysctl
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38529
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
The STIG makes several requirements for IPv4 network restrictions, but these
|
The STIG makes several requirements for IPv4 network restrictions, but these
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38530
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Rules are added to auditd to log all attempts to change the system time using
|
Rules are added to auditd to log all attempts to change the system time using
|
||||||
``/etc/localtime``.
|
``/etc/localtime``.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38531
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
The audit rules from V-38534 already cover all account modifications.
|
The audit rules from V-38534 already cover all account modifications.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38532
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
The STIG makes several requirements for IPv4 network restrictions, but these
|
The STIG makes several requirements for IPv4 network restrictions, but these
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38533
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
The STIG makes several requirements for IPv4 network restrictions, but these
|
The STIG makes several requirements for IPv4 network restrictions, but these
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38534
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Audit rules are added in a task so that any events associated with
|
Audit rules are added in a task so that any events associated with
|
||||||
account modifications are logged. The new audit rule will be loaded immediately
|
account modifications are logged. The new audit rule will be loaded immediately
|
||||||
with ``augenrules --load``.
|
with ``augenrules --load``.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38535
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
By default, Ubuntu 14.04 rejects ICMPv4 packets sent to a broadcast address.
|
By default, Ubuntu 14.04 rejects ICMPv4 packets sent to a broadcast address.
|
||||||
The Ansible tasks for this STIG configuration ensures that the secure default
|
The Ansible tasks for this STIG configuration ensures that the secure default
|
||||||
setting is maintained.
|
setting is maintained.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38536
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
The audit rules from V-38534 already cover all account modifications.
|
The audit rules from V-38534 already cover all account modifications.
|
@ -1,2 +1,8 @@
|
|||||||
|
---
|
||||||
|
id: V-38537
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Ubuntu already ignores ICMPv4 bogus error messages by default. The role will
|
Ubuntu already ignores ICMPv4 bogus error messages by default. The role will
|
||||||
ensure that this default setting is maintained.
|
ensure that this default setting is maintained.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38538
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
The audit rules from V-38534 already cover all account modifications.
|
The audit rules from V-38534 already cover all account modifications.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38539
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
The STIG recommends enabling TCP SYN cookies to deal with TCP SYN floods.
|
The STIG recommends enabling TCP SYN cookies to deal with TCP SYN floods.
|
||||||
|
|
||||||
Note that high-traffic environments may require TCP SYN cookies to be disabled.
|
Note that high-traffic environments may require TCP SYN cookies to be disabled.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38540
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
Rules are added for auditing network configuration changes. The path to
|
Rules are added for auditing network configuration changes. The path to
|
||||||
Ubuntu's standard network configuration location has replaced the path
|
Ubuntu's standard network configuration location has replaced the path
|
||||||
to Red Hat's default network configuration location.
|
to Red Hat's default network configuration location.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38541
|
||||||
|
status: implemented
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
For Ubuntu, rules are added to auditd that will log any changes made in the
|
For Ubuntu, rules are added to auditd that will log any changes made in the
|
||||||
``/etc/apparmor`` directory.
|
``/etc/apparmor`` directory.
|
||||||
|
|
19
doc/metadata/rhel6/V-38542.rst
Normal file
19
doc/metadata/rhel6/V-38542.rst
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
---
|
||||||
|
id: V-38542
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
|
**Exception**
|
||||||
|
|
||||||
|
The STIG makes several requirements for IPv4 network restrictions, but these
|
||||||
|
restrictions can impact certain network interfaces and cause service
|
||||||
|
disruptions. Some security configurations make sense for certain types of
|
||||||
|
network interfaces, like bridges, but other restrictions cause the network
|
||||||
|
interface to stop passing valid traffic between hosts, containers, or virtual
|
||||||
|
machines.
|
||||||
|
|
||||||
|
The default network scripts and LXC userspace tools already configure various
|
||||||
|
network devices to their most secure setting. Since some hosts will act as
|
||||||
|
routers, enabling security configurations that restrict network traffic can
|
||||||
|
cause service disruptions for OpenStack environments.
|
@ -1,3 +1,9 @@
|
|||||||
|
---
|
||||||
|
id: V-38543
|
||||||
|
status: exception
|
||||||
|
tag: misc
|
||||||
|
---
|
||||||
|
|
||||||
**Exception**
|
**Exception**
|
||||||
|
|
||||||
The audit rules which monitor ``chmod``, ``fchmod``, and ``fchmodat``
|
The audit rules which monitor ``chmod``, ``fchmod``, and ``fchmodat``
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user