Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updated 6 rules 2 for sle micro #12331

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
27 changes: 16 additions & 11 deletions controls/stig_slmicro5.yml
Original file line number Diff line number Diff line change
Expand Up @@ -802,8 +802,9 @@ controls:
title:
All SLEM 5 local interactive user accounts, upon creation, must be assigned
a home directory.
rules: []
status: pending
rules:
- accounts_have_homedir_login_defs
status: automated

- id: SLEM-05-411015
levels:
Expand Down Expand Up @@ -1154,15 +1155,16 @@ controls:
- high
title: SLEM 5 must not be configured to allow blank or null passwords.
rules:
- sshd_disable_empty_passwords
- no_empty_passwords
status: automated

- id: SLEM-05-611060
levels:
- high
title: SLEM 5 must not have accounts configured with blank or null passwords.
rules: []
status: pending
rules:
- no_empty_passwords_etc_shadow
status: automated

- id: SLEM-05-611065
levels:
Expand Down Expand Up @@ -1449,15 +1451,17 @@ controls:
title:
SLEM 5 must offload audit records onto a different system or media from the
system being audited.
rules: []
status: pending
rules:
- auditd_audispd_network_failure_action
status: automated

- id: SLEM-05-653045
levels:
- medium
title: Audispd must take appropriate action when SLEM 5 audit storage is full.
rules: []
status: pending
rules:
- auditd_audispd_disk_full_action
status: automated

- id: SLEM-05-653050
levels:
Expand Down Expand Up @@ -1944,8 +1948,9 @@ controls:
levels:
- medium
title: SLEM 5 must not disable syscall auditing.
rules: []
status: pending
rules:
- audit_rules_enable_syscall_auditing
status: automated

- id: SLEM-05-671010
levels:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = multi_platform_sle
# platform = multi_platform_sle,multi_platform_slmicro
# reboot = false
# strategy = restrict
# complexity = low
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = multi_platform_sle
# platform = multi_platform_sle,multi_platform_slmicro

if [ -f "/usr/lib/systemd/system/auditd.service" ] ; then
IS_AUGENRULES=$(grep -E "^(ExecStartPost=|Requires=augenrules\.service)" /usr/lib/systemd/system/auditd.service)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ severity: medium
identifiers:
cce@sle12: CCE-83119-8
cce@sle15: CCE-85706-0
cce@slmicro5: CCE-93739-1

references:
disa: CCI-000366
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_sle
# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_sle,multi_platform_slmicro
# reboot = false
# strategy = configure
# complexity = low
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_sle,multi_platform_ubuntu
# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_sle,multi_platform_slmicro,multi_platform_ubuntu

{{{ bash_instantiate_variables("var_audispd_disk_full_action") }}}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ identifiers:
cce@rhel9: CCE-88477-5
cce@sle12: CCE-83116-4
cce@sle15: CCE-85617-9
cce@slmicro5: CCE-93728-4

references:
disa: CCI-001851
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_sle
# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_sle,multi_platform_slmicro
# reboot = false
# strategy = configure
# complexity = low
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_sle,multi_platform_ubuntu
# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_sle,multi_platform_slmicro,multi_platform_ubuntu

{{{ bash_instantiate_variables("var_audispd_network_failure_action") }}}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,7 @@ identifiers:
cce@rhel9: CCE-90187-6
cce@sle12: CCE-83115-6
cce@sle15: CCE-85705-2
cce@slmicro5: CCE-93727-6

references:
disa: CCI-001851
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
#!/bin/bash
# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_sle
# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_sle,multi_platform_slmicro

. $SHARED/auditd_utils.sh
prepare_auditd_test_enviroment
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
#!/bin/bash
# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_sle
# platform = Red Hat Virtualization 4,multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_sle,multi_platform_slmicro

. $SHARED/auditd_utils.sh
prepare_auditd_test_enviroment
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
# platform = multi_platform_slmicro
# reboot = false
# strategy = configure
# complexity = low
# disruption = medium
- name: Find files in /etc/pam.d/ with password auth
find:
paths: /etc/pam.d
contains: ".*pam_unix\\.so.*nullok.*"
recurse: yes
register: find_pam_conf_files_result

- name: Prevent Log In to Accounts with Empty Password
replace:
dest: "{{ item.path }}"
regexp: nullok
with_items: "{{ find_pam_conf_files_result.files }}"
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
# platform = multi_platform_rhel,multi_platform_fedora,multi_platform_ol,multi_platform_rhv,multi_platform_sle,multi_platform_ubuntu
# platform = multi_platform_rhel,multi_platform_fedora,multi_platform_ol,multi_platform_rhv,multi_platform_sle,multi_platform_slmicro,multi_platform_ubuntu
# reboot = false
# strategy = configure
# complexity = low
# disruption = medium

{{% if 'sle' in product %}}
{{% if 'sle' in product or 'slmicro' in product %}}
PAM_PATH="/etc/pam.d/"
NULLOK_FILES=$(grep -rl ".*pam_unix\\.so.*nullok.*" ${PAM_PATH})
for FILE in ${NULLOK_FILES}; do
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
<ind:object object_ref="object_no_empty_passwords" />
</ind:textfilecontent54_test>
<ind:textfilecontent54_object id="object_no_empty_passwords" version="1">
{{% if product in ['sle12', 'sle15'] %}}
{{% if product in ["sle12", "sle15", "slmicro5"] %}}
<ind:filepath operation="pattern match">^/etc/pam.d/.*$</ind:filepath>
{{% elif 'ubuntu' in product %}}
<ind:filepath operation="pattern match">^/etc/pam.d/common-password</ind:filepath>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ description: |-
but does not have an assigned password, it may be possible to log
into the account without authentication. Remove any instances of the
<tt>nullok</tt> in
{{% if product in ["sle12", "sle15"] %}}
{{% if product in ["sle12", "sle15", "slmicro5"] %}}
password authentication configurations in <tt>/etc/pam.d/</tt>
{{% elif 'ubuntu' in product %}}
<tt>/etc/pam.d/common-password</tt>
Expand All @@ -33,6 +33,7 @@ identifiers:
cce@rhel10: CCE-86640-0
cce@sle12: CCE-83039-8
cce@sle15: CCE-85576-7
cce@slmicro5: CCE-93738-3

references:
cis-csc: 1,12,13,14,15,16,18,3,5
Expand Down Expand Up @@ -62,7 +63,7 @@ ocil_clause: 'NULL passwords can be used'

ocil: |-
To verify that null passwords cannot be used, run the following command:
{{% if product in ["sle12", "sle15"] %}}
{{% if product in ["sle12", "sle15", "slmicro5"] %}}
<pre>$ grep pam_unix.so /etc/pam.d/* | grep nullok</pre>
{{% elif 'ubuntu' in product %}}
<pre>grep nullok /etc/pam.d/common-password</pre>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ identifiers:
cce@rhel10: CCE-90491-2
cce@sle12: CCE-83249-3
cce@sle15: CCE-91155-2
cce@slmicro5: CCE-93737-5

references:
cis@ubuntu2204: 6.2.2
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@ identifiers:
cce@rhel10: CCE-88604-4
cce@sle12: CCE-83053-9
cce@sle15: CCE-85562-7
cce@slmicro5: CCE-93736-7

references:
disa: CCI-000366
Expand Down
Loading