Skip to content

Coreos build - enable more rules #5018

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Nov 25, 2019

Conversation

redhatrises
Copy link
Contributor

Description:

  • Enable audit rules and audit configuration checks
  • Enable sysctl and kernel checks
  • Certain software has to be installed and running
  • Time has to be configured in chrony

@redhatrises redhatrises added the CoreOS CoreOS product related. label Nov 14, 2019
@redhatrises redhatrises added this to the 0.1.48 milestone Nov 14, 2019
Copy link
Collaborator

@jhrozek jhrozek left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. Thank you very much for working on the profile, Gabe! The profile builds and in general the added rules make sense to me.

I left a couple of questions inline. I think some rules might not be needed in an OCP environment, mostly I'm concerned about the IPv4 forwarding rule, although I have not tested out if disabling the sysctl really breaks OCP networking.

But if you want, please go ahead and merge the content. The point of the inline comments is not to block the PR, it's really just questions :-) We can (and will) iterate on the content later.

@jhrozek
Copy link
Collaborator

jhrozek commented Nov 17, 2019 via email

@jhrozek
Copy link
Collaborator

jhrozek commented Nov 17, 2019 via email

- Remove ip_forward rule
- Enable ipv6 disabling
- Comment out audispd checks and add note that fluentd checks are needed
- functionality: |-
Certain technologies such as virtual machines, containers, etc. rely on IPv4 forwarding to enable and use networking.
Disabling IPv4 forwarding would cause those technologies to stop working. Therefore, this rule should not be used in
profiles or benchmarks that target usage of IPv4 forwarding.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for creating this warning. Should be very helpful for those tailoring or justifying dropping this rule locally based on how the endpoint is being used.

Copy link
Member

@shawndwells shawndwells left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

With all conversations resolved, ack'ing this PR.

@shawndwells shawndwells merged commit 195af60 into ComplianceAsCode:master Nov 25, 2019
@redhatrises redhatrises deleted the coreos_build branch November 25, 2019 22:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
CoreOS CoreOS product related.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants