Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature suse 15.1 #5548

Merged
merged 38 commits into from
Apr 1, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
38 commits
Select commit Hold shift + click to select a range
63cadc8
Added password variables to SUSE Hardening Guide's values
eradot4027 Mar 22, 2020
0ec96a7
fixed variable value issues
eradot4027 Mar 22, 2020
4dfcdc1
Added firewalld checks to standard profile as pr SUSE Hardening Guide
eradot4027 Mar 22, 2020
1696379
fixed spelling error
eradot4027 Mar 22, 2020
0b32e83
Added HTML guide generation and a few more checks to standard profile
eradot4027 Mar 22, 2020
af33e7f
Added ssh and http daemon stuff to tandard.profile and enabled it in …
eradot4027 Mar 23, 2020
a099d7a
Added more ssh options and comment fields
eradot4027 Mar 23, 2020
876da1e
Added comment for Kernel Options
eradot4027 Mar 23, 2020
4840c51
Added audit configurations
eradot4027 Mar 24, 2020
fee8ccd
Added more auditing for SLE15
eradot4027 Mar 24, 2020
2b2f6a7
Added product types to ensure log rotation check on sle12,15
eradot4027 Mar 25, 2020
9cd4f3c
removed prodtyoe from group beacuse I didn't read the docs
eradot4027 Mar 25, 2020
7b593f8
Updated to reflect cpe in /etc/product.d/* on SLES machine
eradot4027 Mar 25, 2020
40d19f6
Fixed CPE according to products
eradot4027 Mar 25, 2020
071a2d9
Fixed cpe definition in installed OS check
eradot4027 Mar 25, 2020
773aebc
Updated constans with correct cpe from SLES.prod
eradot4027 Mar 25, 2020
ec562b4
Updated constans with correct cpe from SLES.prod
eradot4027 Mar 25, 2020
0fcbf7d
Added CPE 2.3 from NIST
eradot4027 Mar 26, 2020
dff8583
Reverted to CPE 2
eradot4027 Mar 26, 2020
0a4cfaf
Fixed CPE definition in check.
eradot4027 Mar 26, 2020
595a975
adde zypper checks, and updated cpe
eradot4027 Mar 26, 2020
9f0a4e9
Resolved typos for zypper
eradot4027 Mar 26, 2020
d4a0207
added cpe and checks for openssh
eradot4027 Mar 26, 2020
bf084ab
Forgoet to add file
eradot4027 Mar 26, 2020
5b098f3
Added correct CPE for OpenSSH to check
eradot4027 Mar 26, 2020
50d35d6
Fixed CPE for SSH
eradot4027 Mar 27, 2020
1e5c43e
added gdm cpe
eradot4027 Mar 27, 2020
81919a7
Added multi_platform_sle to audit check shared check for kernel modul…
eradot4027 Mar 27, 2020
9cf245d
Added support fo SLE15 to kernel modules loading init and finit
eradot4027 Mar 28, 2020
5a2cbb0
Fixed issues with cpe dictionary and added zypper check
eradot4027 Mar 30, 2020
cd75001
removed merged duplicates in cpe dictionary ssgs validate now for SLE15
eradot4027 Mar 30, 2020
00d9e29
Resolved incorrect CPE per pull comments
eradot4027 Mar 30, 2020
d978481
Resolved CPE per pull comment
eradot4027 Mar 30, 2020
5b25b3a
Resolved pull per
eradot4027 Mar 30, 2020
c4cf421
Resolved per pull request. removed openSSH check and removed ssh from…
eradot4027 Mar 30, 2020
8a34912
added Ensure auditd Collects File Deletion Events by User to standard…
eradot4027 Mar 31, 2020
5057806
added zypper config file
eradot4027 Mar 31, 2020
3544aee
removed zypper check as it was invalid. Updated standard profile to …
eradot4027 Apr 1, 2020
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: rhel6,rhel7,rhel8
prodtype: rhel6,rhel7,rhel8,sle15

title: 'Uninstall httpd Package'

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: rhel6,rhel7,rhel8
prodtype: rhel6,rhel7,rhel8,sle15

title: 'Disable httpd Service'

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: opensuse,sle11,sle12
prodtype: opensuse,sle11,sle12,sle15

title: 'Install the OpenSSH Client and Server Package'

Expand Down
2 changes: 1 addition & 1 deletion linux_os/guide/services/ssh/service_sshd_enabled/rule.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: rhel7,rhel8,rhv4,sle12,wrlinux1019
prodtype: rhel7,rhel8,rhv4,sle12,sle15,wrlinux1019

title: 'Enable the OpenSSH Service'

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: fedora,ol7,ol8,rhel6,rhel7,rhel8,rhv4
prodtype: fedora,ol7,ol8,rhel6,rhel7,rhel8,rhv4,sle15

title: 'Record Successful Permission Changes to Files - chmod'

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@
<platform>multi_platform_fedora</platform>
<platform>multi_platform_ol</platform>
<platform>multi_platform_rhel</platform>
<platform>multi_platform_sle</platform>
</affected>
<description>The audit rules should be configured to log information about kernel module loading and unloading.</description>
</metadata>
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: fedora,ocp4,ol7,ol8,rhel7,rhel8,rhv4,wrlinux1019
prodtype: fedora,ocp4,ol7,ol8,rhel7,rhel8,rhv4,sle15,wrlinux1019

title: 'Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module'

Expand Down Expand Up @@ -47,4 +47,3 @@ references:
cis-csc: 1,11,12,13,14,15,16,19,2,3,4,5,6,7,8,9

{{{ complete_ocil_entry_audit_syscall(syscall="finit_module") }}}

Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: fedora,ocp4,ol7,ol8,rhel7,rhel8,rhv4,wrlinux1019
prodtype: fedora,ocp4,ol7,ol8,rhel7,rhel8,rhv4,sle15,wrlinux1019

title: 'Ensure auditd Collects Information on Kernel Module Loading - init_module'

Expand Down Expand Up @@ -47,4 +47,3 @@ references:
cis-csc: 1,11,12,13,14,15,16,19,2,3,4,5,6,7,8,9

{{{ complete_ocil_entry_audit_syscall(syscall="init_module") }}}

Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: ocp4,ol7,ol8,rhel7,rhel8
prodtype: ocp4,ol7,ol8,rhel7,rhel8,sle15

title: 'Install firewalld Package'

Expand Down
5 changes: 5 additions & 0 deletions sle15/CMakeLists.txt
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,9 @@ if ("${CMAKE_SOURCE_DIR}" STREQUAL "${CMAKE_CURRENT_SOURCE_DIR}")
message(FATAL_ERROR "cmake has to be used on the root CMakeLists.txt, see the developer_guide.adoc for more details!")
endif()

set(PRODUCT "sle15")
ssg_build_product("sle15")

ssg_build_html_nistrefs_table(${PRODUCT} "standard")

ssg_build_html_cce_table(${PRODUCT})
5 changes: 0 additions & 5 deletions sle15/cpe/sle15-cpe-dictionary.xml
Original file line number Diff line number Diff line change
Expand Up @@ -67,9 +67,4 @@
<!-- the check references an OVAL file that contains an inventory definition -->
<check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="filename">installed_env_has_systemd_package</check>
</cpe-item>
<cpe-item name="cpe:/a:yum">
<title xml:lang="en-us">Package yum is installed</title>
<!-- the check references an OVAL file that contains an inventory definition -->
<check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="filename">installed_env_has_yum_package</check>
</cpe-item>
</cpe-list>
53 changes: 45 additions & 8 deletions sle15/profiles/standard.profile
Original file line number Diff line number Diff line change
Expand Up @@ -27,18 +27,11 @@ selections:
- service_cron_enabled
- service_ntp_enabled
- service_rsyslog_enabled
- sshd_idle_timeout_value=5_minutes
- sshd_set_idle_timeout
- sshd_disable_root_login
- sshd_disable_empty_passwords
- sshd_allow_only_protocol2
- sshd_set_keepalive
- file_owner_logfiles_value=adm
- rsyslog_files_ownership
- file_groupowner_logfiles_value=adm
- rsyslog_files_groupownership
- rsyslog_files_permissions
- "!rsyslog_remote_loghost"
- ensure_logrotate_activated
- file_permissions_systemmap
- file_permissions_etc_shadow
Expand Down Expand Up @@ -83,7 +76,7 @@ selections:
- accounts_tmout
- display_login_attempts
- inactivity_timeout_value=15_minutes
- var_password_pam_minlen=15
- var_password_pam_minlen=8
- accounts_password_pam_minlen
- accounts_password_minlen_login_defs
- var_password_pam_ocredit=1
Expand All @@ -105,3 +98,47 @@ selections:
- accounts_passwords_pam_faillock_deny
- accounts_passwords_pam_faillock_interval
- accounts_passwords_pam_faillock_unlock_time
- service_httpd_disabled
- package_httpd_removed
- package_firewalld_installed
- package_openssh_installed
- service_sshd_enabled
- sshd_enable_x11_forwarding
- sshd_allow_only_protocol2
- sshd_idle_timeout_value=5_minutes
- sshd_set_idle_timeout
- sshd_disable_root_login
- sshd_disable_empty_passwords
- sshd_set_keepalive
- audit_rules_time_adjtimex
- audit_rules_time_settimeofday
- audit_rules_time_stime
- audit_rules_time_clock_settime
- audit_rules_time_watch_localtime
- audit_rules_usergroup_modification
- audit_rules_networkconfig_modification
- audit_rules_mac_modification
- audit_rules_dac_modification_chmod
- audit_rules_dac_modification_chown
- audit_rules_dac_modification_fchmod
- audit_rules_dac_modification_fchmodat
- audit_rules_dac_modification_fchown
- audit_rules_dac_modification_fchownat
- audit_rules_dac_modification_fremovexattr
- audit_rules_dac_modification_fsetxattr
- audit_rules_dac_modification_lchown
- audit_rules_dac_modification_lremovexattr
- audit_rules_dac_modification_lsetxattr
- audit_rules_dac_modification_removexattr
- audit_rules_dac_modification_setxattr
- audit_rules_unsuccessful_file_modification
- audit_rules_privileged_commands
- audit_rules_media_export
- audit_rules_file_deletion_events
- audit_rules_sysadmin_actions
- audit_rules_kernel_module_loading_finit
- audit_rules_kernel_module_loading_init
- audit_rules_successful_file_modification_chmod
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
2 changes: 2 additions & 0 deletions ssg/constants.py
Original file line number Diff line number Diff line change
Expand Up @@ -103,6 +103,7 @@
PKG_MANAGER_TO_CONFIG_FILE = {
"yum": "/etc/yum.conf",
"dnf": "/etc/dnf/dnf.conf",
"zypper": "/etc/zypp/zypper.conf",
}

FULL_NAME_TO_PRODUCT_MAPPING = {
Expand Down Expand Up @@ -263,6 +264,7 @@
],
"sle15": [
"cpe:/o:suse:linux_enterprise_server:15",
"cpe:/o:suse:linux_enterprise_desktop:15",
],
"ubuntu1404": [
"cpe:/o:canonical:ubuntu_linux:14.04",
Expand Down