[Ubuntu 22.04 STIG] Add stigid@ubuntu2204 references: Auditing (96 rules)#14512
[Ubuntu 22.04 STIG] Add stigid@ubuntu2204 references: Auditing (96 rules)#14512hdean3 wants to merge 1 commit intoComplianceAsCode:masterfrom
Conversation
Add missing stigid@ubuntu2204 entries to 96 rule.yml files for DISA Ubuntu 22.04 STIG V2R7 Auditing controls (UBTU-22-651000 to UBTU-22-671099 range). Without these references, OpenSCAP scan results cannot be mapped to DISA UBTU-22-XXXXXX checklist items in STIG Viewer (CKL export produces blank Rule ID fields). Entries follow the same pattern as existing stigid@ol8, stigid@sle12, and stigid@sle15 references. Authoritative UBTU-22-XXXXXX IDs sourced from controls/stig_ubuntu2204.yml.
|
Hi @hdean3. Thanks for your PR. I'm waiting for a ComplianceAsCode member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
Closing: The stig_ubuntu2204 controls file has reference_type: stigid which auto-injects UBTU-22-xxx references into all mapped rules at build time. Adding stigid@ubuntu2204 to rule.yml creates duplicate references, which is now caught by the build validation. This approach was incorrect. The correct fix for any actual gaps would be to add missing controls to the controls file itself, not to patch rule.yml. Thank you for your review. |
Summary
Adds missing
stigid@ubuntu2204cross-references to 96 rule.yml files covering audit rules — DAC modifications, file deletions, unsuccessful file modifications, kernel module loading, SUID/SGID execution, account management events.Coverage Gap Addressed
Ubuntu 22.04 LTS had no
stigid@ubuntu2204entries in rule.ymlreferences:blocks. This gap causes STIG Viewer CKL exports to show blank Rule ID fields for Ubuntu 22.04 rules, preventing automated compliance tracking against the DISA STIG.Note: Ubuntu 24.04 and OL9 use controls-based stigid injection (reference_type in stig_ubuntu2404.yml / stig_ol9.yml injects references via the controls system). Ubuntu 22.04's build environment does not include
stigidinreference_uris, so rule.yml patches are the correct approach for this distro.Changes
stigid@ubuntu2204: UBTU-22-030xxxadded toreferences:blockreferences:entries preservedTesting
Related Work
Part of the Ubuntu 22.04 STIG stigid@ gap-filling series (original: #14463, closed due to PR volume). Companion PR: Password Policy batch.