Closed
Description
Many of the FIPS related rules unnecessarily check whether or not the installed OS is FIPS certified.
For example, take the rule to check whether AIDE is configured to use FIPS 140-2 hashes. The criteria are:
<oval:criteria operator="AND">
<oval:extend_definition comment="Installed OS is FIPS certified" definition_ref="oval:ssg-installed_OS_is_FIPS_certified:def:1"/>
<oval:extend_definition comment="Aide is installed" definition_ref="oval:ssg-package_aide_installed:def:1"/>
<oval:criterion comment="non-FIPS hashes are not configured" test_ref="oval:ssg-test_aide_non_fips_hashes:tst:1"/>
<oval:criterion comment="FIPS hashes are configured" test_ref="oval:ssg-test_aide_use_fips_hashes:tst:1"/>
</oval:criteria>Whether or not the OS is FIPS certified is orthogonal to whether or not the FIPS approved algorithms are being used.
This is problematic when evaluating benchmarks on CentOS since it's not RHEL proper and thus not FIPS certified. Certainly it should fail the"Installed OS is FIPS certified" test, which is it's own stand alone rule, but that shouldn't preclude validation that various crypto components like ssh and AIDE use FIPS approved crypto algorithms and hashes.
Metadata
Metadata
Assignees
Labels
No labels