DISA misalignment with rule mount_option_boot_efi_nosuid #13006
Labels
OVAL
OVAL update. Related to the systems assessments.
productization-issue
Issue found in upstream stabilization process.
RHEL8
Red Hat Enterprise Linux 8 product related.
RHEL9
Red Hat Enterprise Linux 9 product related.
triaged
Milestone
Description of problem:
The content is misaligned with an external (third party) content that targets the same policy - typically, this means that a system hardened by our content doesn't pass the scan by the external content.
Details:
This content is not aligned with content from DISA (https://www.stigviewer.com/stig/red_hat_enterprise_linux_9/2024-06-04/finding/V-257862).
The misalignment affects these profiles:
The misalignment affects these rules:
The rule in CaC content after (#12958) does not have a platform and check
/boot/efi
partition if it is mounted or configured in/etc/fstab
(followingmount_option
template logic). It does pass if neither is present in the system.The rule in DISA content checks for presence of
/sys/firmware/efi
(as the rule's platform). Which was the previous behaviour of the CaC's rule.The
uefi
platform in CaC is (note that Ansible conditional is different from Bash and OVAL, which also checks for/sys/firmware/efi
):Ideally the rule should be applicable for systems which have
/boot/efi
either configured and/or present in runtime. More appropriate platform for that would bemount
.We also might want to persuade DISA into changing the platform criteria.
Outcome:
SCAP Security Guide Version:
74cf6d5
External Content's Version:
RHEL-09-231105
The text was updated successfully, but these errors were encountered: