Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Restrict the list of accepted shells in no_shelllogin_for_systemaccounts #11896

Conversation

marcusburghardt
Copy link
Member

Description:

There were already long discussions in the past about the cons of using /bin/false.
More recently the topic was also discussed in CIS Community and unanimously agreed to use /sbin/nologin for a user shell when it is not desired the respective user to interact with a shell.
This is also in alignment with STIG recommendations.
In addition, the approach is in all other related rules in the project.

Therefore, this OVAL was updated to the minimal list of shells.

Rationale:

Review Hints:

automatus tests should be enough.

There were already long discussions in the past about the cons of using
/bin/false. More recently the topic was also discussed in CIS community
and unanimously agreed to use /sbin/nologin for a user shell when it is
not desired the respective user to interact with shell. This is also in
alignment with STIG recommendations. In addition, is the approach in
all other related rules in the project. Therefore, this OVAL was
updated to the minimal list of shells.
@marcusburghardt marcusburghardt added OVAL OVAL update. Related to the systems assessments. STIG STIG Benchmark related. labels Apr 26, 2024
@marcusburghardt marcusburghardt added this to the 0.1.73 milestone Apr 26, 2024
Copy link

Start a new ephemeral environment with changes proposed in this pull request:

rhel8 (from CTF) Environment (using Fedora as testing environment)
Open in Gitpod

Fedora Testing Environment
Open in Gitpod

Oracle Linux 8 Environment
Open in Gitpod

Copy link

🤖 A k8s content image for this PR is available at:
ghcr.io/complianceascode/k8scontent:11896
This image was built from commit: a936357

Click here to see how to deploy it

If you alread have Compliance Operator deployed:
utils/build_ds_container.py -i ghcr.io/complianceascode/k8scontent:11896

Otherwise deploy the content and operator together by checking out ComplianceAsCode/compliance-operator and:
CONTENT_IMAGE=ghcr.io/complianceascode/k8scontent:11896 make deploy-local

Copy link

codeclimate bot commented Apr 26, 2024

Code Climate has analyzed commit a936357 and detected 0 issues on this pull request.

The test coverage on the diff in this pull request is 100.0% (50% is the threshold).

This pull request will bring the total coverage in the repository to 59.4% (0.0% change).

View more on Code Climate.

@Mab879
Copy link
Member

Mab879 commented Apr 26, 2024

/test images

@Mab879 Mab879 self-assigned this Apr 26, 2024
@Mab879
Copy link
Member

Mab879 commented Apr 26, 2024

I'm waving the Automatus failures on SLE15 as they pass locally.

@Mab879 Mab879 merged commit d635d19 into ComplianceAsCode:master Apr 26, 2024
112 of 113 checks passed
@marcusburghardt marcusburghardt deleted the no_shelllogin_for_systemaccounts branch April 26, 2024 12:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
OVAL OVAL update. Related to the systems assessments. STIG STIG Benchmark related.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

no_shelllogin_for_systemaccounts is misaligned with DISA
2 participants