Skip to content

Commit 2c784de

Browse files
authored
Merge pull request #155 from ansible-lockdown/devel
Main updates to Benchmark v1r8 release
2 parents f98b63a + d90852a commit 2c784de

10 files changed

Lines changed: 807 additions & 256 deletions

File tree

.ansible-lint

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ skip_list:
99
- 'experimental'
1010
- 'name[casing]'
1111
- 'name[template]'
12+
- 'fqcn[action]'
1213
- '204'
1314
- '305'
1415
- '303'

Changelog.md

Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
# Changes to RHEL8STIG
2+
3+
## Release 2.7.0
4+
- lint updates
5+
- Benchmark 1.8 Updates
6+
- New RULEID for the following, plus additional notes if needed
7+
- CAT1
8+
- RHEL-08-010000 
9+
-
10+
- CAT2
11+
- RHEL-08-010040
12+
- RHEL-08-010090
13+
- RHEL-08-010200 - Updated keep alive count max to 1
14+
- RHEL-08-010201
15+
- RHEL-08-010360
16+
- RHEL-08-010372 - Updated to include find and remove for conflicting parameters
17+
- RHEL-08-010373 - Updated to include find and remove for conflicting parameters
18+
- RHEL-08-010373 - Updated to include find and remove for conflicting parameters
19+
- RHEL-08-010374 - Updated to include find and remove for conflicting parameters
20+
- RHEL-08-010375 - Updated to include find and remove for conflicting parameters
21+
- RHEL-08-010376 - Updated to include find and remove for conflicting parameters
22+
- RHEL-08-010383
23+
- RHEL-08-010384
24+
- RHEL-08-010430 - Updated to include find and remove for conflicting parameters
25+
- RHEL-08-010400
26+
- RHEL-08-010500
27+
- RHEL-08-010510
28+
- RHEL-08-010520
29+
- RHEL-08-010521
30+
- RHEL-08-010522
31+
- RHEL-08-010550
32+
- RHEL-08-010671
33+
- RHEL-08-010830
34+
- RHEL-08-020330
35+
- RHEL-08-020090
36+
- RHEL-08-020104
37+
- RHEL-08-020110
38+
- RHEL-08-020120
39+
- RHEL-08-020130
40+
- RHEL-08-020140
41+
- RHEL-08-020150
42+
- RHEL-08-020160
43+
- RHEL-08-020170
44+
- RHEL-08-020190
45+
- RHEL-08-020221
46+
- RHEL-08-020230
47+
- RHEL-08-010280
48+
- RHEL-08-020300
49+
- RHEL-08-020350 - Updated CCI
50+
- RHEL-08-020352
51+
- RHEL-08-040127 - Added tasks to deal with different versions of RHEL8
52+
- RHEL-08-040161
53+
- RHEL-08-040209 - Updated to include find and remove for conflicting parameters
54+
- RHEL-08-040210 - Updated to include find and remove for conflicting parameters
55+
- RHEL-08-040220 - Updated to include find and remove for conflicting parameters
56+
- RHEL-08-040230 - Updated to include find and remove for conflicting parameters
57+
- RHEL-08-040239 - Updated to include find and remove for conflicting parameters
58+
- RHEL-08-040240 - Updated to include find and remove for conflicting parameters
59+
- RHEL-08-040249 - Updated to include find and remove for conflicting parameters
60+
- RHEL-08-040250 - Updated to include find and remove for conflicting parameters
61+
- RHEL-08-040259 - Updated to included find and remove for conflicting parameters
62+
- RHEL-08-040260 - Updated to include find and remove for conflicting parameters
63+
- RHEL-08-040261 - Updated to include find and remove for conflicting parameters
64+
- RHEL-08-040262 - Updated to include find and remove for conflicting parameters
65+
- RHEL-08-040270 - Updated to include find and remove for conflicting parameters
66+
- RHEL-08-040279 - Updated to include find and remove for conflicting parameters
67+
- RHEL-08-040280 - Updated to include find and remove for conflicting parameters
68+
- RHEL-08-040281 - Updated to include find and remove for conflicting parameters
69+
- RHEL-08-040282 - Updated to include find and remove for conflicting parameters
70+
- RHEL-08-040283 - Updated to include find adn remove for conflicting parameters
71+
- RHEL-08-040284 - Updated to include find adn remove for conflicting parameters
72+
- RHEL-08-040285 - Updated to include find adn remove for conflicting parameters
73+
- RHEL-08-040286 - Updated to include find adn remove for conflicting parameters
74+
- RHEL-08-040340
75+
- RHEL-08-040341
76+
- RHEL-08-040400 - New control
77+
- CAT3
78+
- RHEL-08-020340 - Updated CCI
79+

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66

77
Configure a RHEL/Rocky 8 system to be DISA STIG compliant. All findings will be audited by default. Non-disruptive CAT I, CAT II, and CAT III findings will be corrected by default. Disruptive finding remediation can be enabled by setting `rhel8stig_disruption_high` to `yes`.
88

9-
This role is based on RHEL 8 DISA STIG: [Version 1, Rel 7 released on July 27, 2022](https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_8_V1R7_STIG.zip).
9+
This role is based on RHEL 8 DISA STIG: [Version 1, Rel 8 released on Oct 27, 2022](https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_8_V1R8_STIG.zip).
1010

1111
## Join us
1212

defaults/main.yml

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -430,6 +430,7 @@ rhel_08_040350: true
430430
rhel_08_040370: true
431431
rhel_08_040380: true
432432
rhel_08_040390: true
433+
rhel_08_040400: true
433434

434435
# CAT 3 rules
435436
rhel_08_010171: true
@@ -501,8 +502,8 @@ rhel8stig_sys_commands_perm: 0755
501502

502503
# RHEL-08-010330
503504
# rhel8stig_lib_file_perm is the permissions teh library files will be set to
504-
# To conform to STIG standards this needs to be set to 0755 or more restrictive
505-
rhel8stig_lib_file_perm: 0755
505+
# To conform to STIG standards this needs to be set to 755 or more restrictive
506+
rhel8stig_lib_file_perm: 755
506507

507508
# RHEL-08-010480
508509
# rhel8stig_ssh_pub_key_perm are the permissions set to the SSH public host keys
@@ -828,7 +829,7 @@ rhel8stig_sshd_compression: "no"
828829

829830
# RHEL-08-030740
830831
# rhel8stig_ntp_server_name is the name of the NTP server
831-
rhel8stig_ntp_server_name: server.name
832+
rhel8stig_ntp_server_name: 0.us.pool.ntp.mil
832833

833834
# RHEL-08-040137
834835
# rhel8stig_fapolicy_white_list is the whitelist for fapolicyd, the last item in the list must be dyny all all
@@ -901,7 +902,7 @@ copy_goss_from_path: /some/accessible/path
901902
## managed by the control audit_content
902903
# git
903904
audit_file_git: "https://github.com/ansible-lockdown/{{ benchmark }}-Audit.git"
904-
audit_git_version: main
905+
audit_git_version: benchmark_v1r8_rh8
905906

906907
# copy:
907908
audit_local_copy: "some path to copy from"
@@ -911,7 +912,7 @@ audit_files_url: "some url maybe s3?"
911912

912913
## Goss configuration information
913914
# Where the goss configs and outputs are stored
914-
audit_out_dir: '/var/tmp'
915+
audit_out_dir: '/opt'
915916
# Where the goss audit configuration will be stored
916917
audit_conf_dir: "{{ audit_out_dir }}/{{ benchmark }}-Audit/"
917918

tasks/fix-cat1.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
- name: "HIGH | RHEL-08-010000 | AUDIT | The RHEL 8 must be a vendor-supported release."
44
debug:
5-
msg: Minimum supported version of {{ ansible_distribution }} is {{ rhel8stig_min_supported_os_ver[ansible_distribution] }}
5+
msg: Minimum supported version of {{ ansible_distribution }} is {{ rhel8stig_min_supported_os_ver[ansible_distribution] }}
66
changed_when: ansible_distribution_version is not version_compare(rhel8stig_min_supported_os_ver[ansible_distribution], '>=')
77
when:
88
- rhel_08_010000
@@ -11,7 +11,7 @@
1111
- CAT1
1212
- CCI-000366
1313
- SRG-OS-000480-GPOS-00227
14-
- SV-230221r743913_rule
14+
- SV-230221r858734_rule
1515
- V-230221
1616

1717
- name: "HIGH | RHEL-08-010020 | PATCH | The Red Hat Enterprise Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards."
@@ -335,7 +335,7 @@
335335
- CAT1
336336
- CCI-000366
337337
- SRG-OS-000480-GPOS-00227
338-
- SV-230380r743993_rule
338+
- SV-230380r858715_rule
339339
- V-230380
340340
- disruption_high
341341

0 commit comments

Comments
 (0)