This ansible content will configure RHEL/Centos 6 machine to be GSA compliant.
This role will make changes to the system that could break things.
For compliance auditing, use a tool such as nessus or CIS-CAT
This code is based on the GSA Red Hat Enterprise Linux Security Benchmark v1.0 and the CIS RedHat Enterprise Linux 6 Benchmark v2.0.2 .
You should carefully read through the tasks to make sure these changes will not break your systems before running this playbook.
There are many role variables defined in defaults/main.yml.
- Enable IPv6 settings
- Enable iptables
- Enable auditing with rsyslog.
- Lock users inactive for over 30 days.
- Install and configure AIDE
- Install and configure NTP
- Configure the /etc/group wheel configurations
Other settings and services are listed. Please review to ensure they meet your organizational requirements.
Note, a subset of controls were removed due to operational impact or organizational dependent variables. Those are listed here *Note: Must have a GSA account to access.
Ansible > 2.4
---
- name: Harden Server
hosts: all
become: yes
roles:
- gsa_hardening
ansible-playbook playbook.yml --connection=local
This repository has been updated to optionally utilize Continuous Intergration with CircleCI and tests the ansbile tasks against a privledged Ubuntu-16 Container. A low number of tasks are incompatiable when ran against a container vs a vm or bare-metal and have ignore_errors turned on.
- Fork this repository or create a branch
- Sign up for an account and follow the getting started guide at https://circleci.com/docs/2.0/first-steps/#section=getting-started
- Add the repository to your projects and click start building. https://circleci.com/docs/2.0/project-build/#section=getting-started
- New Commits will trigger the CircleCI build and run the playbook.yml and the result will pass or fail.
MIT