Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updating RHEL8 STIG profile for readability changes #6856

Merged

Conversation

carlosmmatos
Copy link
Contributor

Direct sync of V1R1 for rules - along with current mapped rules.

@openscap-ci
Copy link
Collaborator

openscap-ci commented Apr 16, 2021

Changes identified:
Profiles:
 stig on rhel8
 rhelh-stig on rhel8

Show details

Profile stig on rhel8:
 Rule harden_sshd_crypto_policy, package_gssproxy_removed, accounts_password_pam_unix_rounds_system_auth, accounts_password_pam_unix_rounds_password_auth added to stig profile.
 Variable var_password_pam_unix_rounds=5000 added to stig profile.
Profile rhelh-stig on rhel8:
 RHELH-STIG profile extends changed STIG profile.

Recommended tests to execute:
 build_product rhel8
 tests/test_suite.py profile --libvirt qemu:///system test-suite-vm --datastream build/ssg-rhel8-ds.xml stig
 tests/test_suite.py profile --libvirt qemu:///system test-suite-vm --datastream build/ssg-rhel8-ds.xml rhelh-stig

@carlosmmatos carlosmmatos force-pushed the rhel8-stig-readability-updates branch from 98d9a74 to 5f9ecf1 Compare April 16, 2021 18:49
@carlosmmatos carlosmmatos force-pushed the rhel8-stig-readability-updates branch from 5f9ecf1 to 6a3dac4 Compare April 16, 2021 19:03
@openshift-ci
Copy link

openshift-ci bot commented Apr 16, 2021

@carlosmmatos: The following test failed, say /retest to rerun all failed tests:

Test name Commit Details Rerun command
ci/prow/e2e-aws-rhcos4-moderate 6a3dac4 link /test e2e-aws-rhcos4-moderate

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@ggbecker ggbecker self-assigned this Apr 19, 2021
# RHEL-08-010290 && RHEL-08-010291
### NOTE: This will get split out in future STIG releases, as well as we will break
### these rules up to be more flexible in meeting the requirements.
- harden_sshd_crypto_policy
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would refrain from adding harden_sshd_crypto_policy at this moment since it's not really aligned with STIG.

For the Ciphers parameter it defines aes256-ctr,aes256-cbc,aes128-ctr,aes128-cbc whereas STIG defines aes256-ctr,aes192-ctr,aes128-ctr or a subset of this list.

Copy link
Member

@ggbecker ggbecker left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm going to merge this since it can cause a few conflicts and any issue can be resolved later. I see only one issue with a rule selection and I'll open a new PR to discuss its implications.

@ggbecker ggbecker merged commit 4ce9ca5 into ComplianceAsCode:master Apr 19, 2021
@jan-cerny jan-cerny added this to the 0.1.56 milestone Apr 20, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants