11---
22# # metadata for Audit benchmark
3- benchmark_version : ' v1r12 '
3+ benchmark_version : ' v1r13 '
44
55# # Benchmark name used by audting control role
66# The audit variable found at the base
@@ -35,7 +35,6 @@ rhel8stig_audit_disruptive: false
3535rhel8stig_skip_for_travis : false
3636
3737rhel8stig_workaround_for_disa_benchmark : true
38- rhel8stig_workaround_for_ssg_benchmark : true
3938
4039# tweak role to run in a chroot, such as in kickstart %post script
4140rhel8stig_system_is_chroot : " {{ ansible_is_chroot | default(False) }}"
@@ -56,23 +55,26 @@ rhel8stig_skip_reboot: true
5655# Defined will change if control requires
5756change_requires_reboot : false
5857
59- # #########################################
58+ # ##########################################
6059# ## Goss is required on the remote host ###
61- # # Refer to vars/auditd.yml for any other settings ##
60+ # ## vars/auditd.yml for other settings # ##
6261
6362# Allow audit to setup the requirements including installing git (if option chosen and downloading and adding goss binary to system)
6463setup_audit : false
6564
6665# enable audits to run - this runs the audit and get the latest content
6766run_audit : false
67+ # Run heavy tests - some tests can have more impact on a system enabling these can have greater impact on a system
68+ audit_run_heavy_tests : true
6869
69- # Only run Audit do not remediate
70+ # # Only run Audit do not remediate
7071audit_only : false
71- # As part of audit_only
72- # This will enable files to be copied back to control node
72+ # ## As part of audit_only ###
73+ # This will enable files to be copied back to control node in audit_only mode
7374fetch_audit_files : false
74- # Path to copy the files to will create dir structure
75+ # Path to copy the files to will create dir structure in audit_only mode
7576audit_capture_files_dir : /some/location to copy to on control node
77+ # ############################
7678
7779# How to retrieve audit binary
7880# Options are copy or download - detailed settings at the bottom of this file
@@ -85,20 +87,24 @@ get_audit_binary_method: download
8587audit_bin_copy_location : /some/accessible/path
8688
8789# how to get audit files onto host options
88- # options are git/copy/get_url other e.g. if you wish to run from already downloaded conf
90+ # options are git/copy/archive/ get_url other e.g. if you wish to run from already downloaded conf
8991audit_content : git
9092
91- # archive or copy:
92- audit_conf_copy : " some path to copy from"
93+ # If using either archive, copy, get_url:
94+ # # Note will work with .tar files - zip will require extra configuration
95+ # ## If using get_url this is expecting github url in tar.gz format e.g.
96+ # ## https://github.com/ansible-lockdown/UBUNTU22-CIS-Audit/archive/refs/heads/benchmark-v1.0.0.tar.gz
97+ audit_conf_source : " some path or url to copy from"
9398
94- # get_url:
95- audit_files_url : " some url maybe s3?"
99+ # Destination for the audit content to be placed on managed node
100+ # note may not need full path e.g. /opt with the directory being the {{ benchmark }}-Audit directory
101+ audit_conf_dest : " /opt"
96102
97- # Run heavy tests - some tests can have more impact on a system enabling these can have greater impact on a system
98- audit_run_heavy_tests : true
103+ # Where the audit logs are stored
104+ audit_log_dir : ' /opt '
99105
100- # ## End Goss enablements ## ##
101- # ### Detailed settings found at the end of this document ####
106+ # ## Goss Settings ##
107+ # ###### END #### ####
102108
103109# These variables correspond with the STIG IDs defined in the STIG and allows you to enable/disable specific rules.
104110# PLEASE NOTE: These work in coordination with the cat1, cat2, cat3 group variables. You must enable an entire group
@@ -501,11 +507,6 @@ rhel8stig_kdump_needed: false
501507# or rhel8stig_gui)
502508rhel8stig_always_configure_dconf : false
503509
504- # Whether or not to run tasks related to smart card authentication enforcement
505- rhel8stig_smartcard : false
506- # Configure your smartcard driver
507- rhel8stig_smartcarddriver : cackey
508-
509510# Set the file that sysctl should write to
510511rhel8stig_sysctl_file : /etc/sysctl.d/99_stig_sysctl.conf
511512
@@ -528,6 +529,11 @@ rhel8stig_ipv6_required: true
528529# When set to anything other than mcafee it will skip this control assuming localized threat prevention management
529530rhel8stig_av_sftw : mcafee
530531
532+ # RHEL-08-010110 & 010130 & 010760 & 020190 & 020200 & 020231 & 020310 & 020351
533+ # rhel8stig_login_defs_file_perms
534+ # Permissions set on /etc/login.defs
535+ rhel8stig_login_defs_file_perms : 0644
536+
531537# RHEL-08-010210
532538# rhel8stig_var_log_messages_perm is the permissions the /var/log/messages file is set to.
533539# To conform to STIG standards this needs to be 0640 or more restrictive
@@ -559,10 +565,6 @@ rhel8stig_ssh_pub_key_perm: 0644
559565rhel8stig_ssh_priv_key_perm : 0600
560566
561567# RHEL-08-010690
562- # Set standard user paths here
563- # Also set whether we should automatically remediate paths in user ini files.
564- # rhel_08_020720_user_path: "PATH=$PATH:$HOME/.local/bin:$HOME/bin"
565- rhel8stig_standard_user_path : " PATH=$PATH:$HOME/.local/bin:$HOME/bin"
566568rhel8stig_change_user_path : false
567569
568570# RHEL-08-010700
@@ -591,6 +593,19 @@ rhel8stig_local_int_home_file_perms: 0750
591593# To connform to STIG standards this needs to be set to 0740 or less permissive
592594rhel8stig_local_int_perm : 0740
593595
596+ # RHEL-08-020100 pamd file permissions - /etc/pam.d/(password-auth|system-auth) files
597+ # rhel8stig_pamd_file_perms
598+ # This needs a minimum of 0644 ( more restrictive may cause issues testing will be required)
599+ rhel8stig_pamd_file_perms : 0644
600+
601+ # RHEL-08-020110 - pwquality file permissions
602+ # mode: "{{ rhel8stig_pamd_file_perms }}"
603+ rhel8stig_pwquality_file_perms : 0644
604+
605+ # RHEL-08-0400xx
606+ # blacklist.conf - /etc/modprobe.d/blacklist.conf file permissions
607+ rhel8stig_blacklist_conf_file_perms : 0640
608+
594609# RHEL-08-020250
595610# This is a check for a "supported release"
596611# These are the minimum supported releases.
@@ -707,13 +722,6 @@ rhel8stig_sssd:
707722 maprule : (userCertificate;binary={cert!bin})
708723 domains : " {{ rhel8stig_sssd_domain }}"
709724
710- # RHEL-08-020070
711- # Session timeout setting file (TMOUT setting can be set in multiple files)
712- # Timeout value is in seconds. (60 seconds * 10 = 600)
713- rhel8stig_shell_session_timeout :
714- file : /etc/profile.d/tmout.sh
715- timeout : 600
716-
717725# RHEL-08-010200 | All network connections associated with SSH traffic must
718726# terminate at the end of the session or after 10 minutes of inactivity, except
719727# to fulfill documented and validated mission requirements.
@@ -763,14 +771,6 @@ rhel8stig_pam_faillock:
763771# RHEL-08-020035
764772rhel_08_020035_idlesessiontimeout : 900
765773
766- # RHEL-08-030670
767- # rhel8stig_audisp_disk_full_action options are syslog, halt, and single to fit STIG standards
768- rhel8stig_audisp_disk_full_action : single
769-
770- # RHEL-08-030680
771- # rhel8stig_audisp_network_failure_action optoins are syslog, halt, and single
772- rhel8stig_audisp_network_failure_action : single
773-
774774# RHEL-08-030060
775775# rhel8stig_auditd_disk_full_action options are SYSLOG, HALT, and SINGLE to fit STIG standards
776776rhel8stig_auditd_disk_full_action : HALT
@@ -892,7 +892,6 @@ rhel8stig_existing_zone_to_copy: public
892892# RHEL-08-040090
893893# This designed not work with rhel8stig_existing_zone_to_copy and when deploy new rules
894894# rhel8stig_white_list_services is the services that you want to allow through initially for the new firewall zone
895- # http and ssh need to be enabled for the role to run.
896895# This can also be a port number if no service exists
897896rhel8stig_white_list_services :
898897 - ssh
@@ -910,11 +909,6 @@ rhel8stig_ssh_ciphers: "Ciphers=aes256-ctr,aes192-ctr,aes128-ctr,aes256-gcm@open
910909# Expected Values for FIPS KEX algorithims
911910rhel8stig_ssh_kex : " KexAlgorithms=ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512"
912911
913- # This will be the CRYPTO_POLICY settings in the opensshserver.conf file. It will be a string for the entirety of the setting
914- # to conform to STIG standard control RHEL-08-010290 this variable must contain oCiphers=aes256-ctr,aes192-ctr,aes128-ctr -oMACS=hmac-sha2-512,hmac-sha2-256 settings
915- # to conform to STIG standard control RHEL-08-010291 this variable must cotnain oCiphers=aes256-ctr,aes192-ctr,aes128-ctr
916- rhel8stig_ssh_server_crypto_settings : " -oCiphers=aes256-ctr,aes192-ctr,aes128-ctr -oMACS=hmac-sha2-512,hmac-sha2-256"
917-
918912# RHEL-08-010295
919913# This will be teh GnuTLS ecryption packages. The task sets the +VERS-ALL: setting, the only items needed are the DoD approved encryptions
920914# to conform to STIG standards this variable must contain +VERS-ALL:-VERS-DTLS0.9:-VERS-SSL3.0:-VERS-TLS1.0:-VERS-TLS1.1:-VERS-DTLS1.0
0 commit comments