Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sync from Master #1

Merged
merged 39 commits into from
Feb 19, 2019
Merged

Sync from Master #1

merged 39 commits into from
Feb 19, 2019

Commits on Feb 12, 2019

  1. Configuration menu
    Copy the full SHA
    95fa51f View commit details
    Browse the repository at this point in the history

Commits on Feb 13, 2019

  1. Remove kubelet_enable_kernel_defaults

    Red Hat disagrees with the CIS recommendation for the protect-kernel-defauts. OpenShift node/kubelet modifies the system tunable; using the protect-kernel-defaults flag will cause the kubelet to fail on start if the tunables don't match what the kubelet desires and the OpenShift node to fail to start. For more information, see https://bugzilla.redhat.com/show_bug.cgi?id=1434318 (closed Won't Fix).
    The expected tunable values are listed here:
    https://github.com/openshift/origin/blob/release-3.10/vendor/k8s.io/kubernetes/pkg/util/sysctl/sysctl.go#L28-L42
    shawndwells committed Feb 13, 2019
    Configuration menu
    Copy the full SHA
    fe5e19d View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    e8b5c1d View commit details
    Browse the repository at this point in the history
  3. assign CCE to OCP

    shawndwells committed Feb 13, 2019
    Configuration menu
    Copy the full SHA
    8b8bb57 View commit details
    Browse the repository at this point in the history
  4. Remove kubelet_enable_authorization

    Unauthenticated/Unauthorized users have no access to OpenShift nodes.  The kubelet flag authorization-mode is explicitly set to WebHook
    
    Since Webhook is the default value, the authorization-mode configuration is not needed in node-config.  If it is configured, ensure the value is only set to ‘Webhook’.  The node systemd service (atomic-openshift-node) will not start if the configuration value is set to anything other than Webhook.
    shawndwells committed Feb 13, 2019
    Configuration menu
    Copy the full SHA
    6b7ad5d View commit details
    Browse the repository at this point in the history
  5. removed kubelet_disable_anon_access

    Red Hat disagrees with the CIS recommendation to disable anonymous-auth and OpenShift uses a different approach to secure anonymous authorization. OpenShift explicitly sets anonymous-auth to true, as anonymous requests are used for discovery information, webhook integrations, etc. OpenShift allows anonymous requests (then authorizes them).
    Access to OpenShift node is authenticated with certificate.  kubelet apis are subresources of the node resource that can be restricted by RBAC roles.  Anonymous access is denied for these subresources. OpenShift provides it's own fully integrated authentication and authorization mechanism. Unsecured endpoints reveal no sensitive data. Unauthenticated requests to secured endpoints are assigned to 'system:anonymous'. system:anonymous is not bound to any roles, and thus has no visibility by default. See https://docs.openshift.com/container-platform/3.10/install_config/configuring_authentication.html
    shawndwells committed Feb 13, 2019
    Configuration menu
    Copy the full SHA
    5945814 View commit details
    Browse the repository at this point in the history
  6. removed kubelet_privileged_containers

    OpenShift uses Security Context Constraints to prevent privileged containers from running by default. OpenShift explicitly sets the allow-privileged kubelet flag, but does not allow privileged container by default. To create privileged pod, the user/serviceAccount must be granted access to the privileged SCC; only cluster-admin can grant SCC privileges.  Some platform-level components (e.g. fluentd, sdn, ovs which run on every node) must run as privileged, thus disabling the flag would affect platform features. Review users and groups who may create privileged containers as described in 6.9.
    shawndwells committed Feb 13, 2019
    Configuration menu
    Copy the full SHA
    3045ce2 View commit details
    Browse the repository at this point in the history
  7. Update regex of etcd/etcd_peer_auto_tls/rule.yml

    default is false, and false is the pass condition.
    updated OVAL to fail only when true is present.
    shawndwells committed Feb 13, 2019
    Configuration menu
    Copy the full SHA
    c0ea52c View commit details
    Browse the repository at this point in the history
  8. update etcd_auto_tls

    default value is false. update OVAL to fail upon "true"
    shawndwells committed Feb 13, 2019
    Configuration menu
    Copy the full SHA
    a71c3a1 View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    d0681d6 View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    74b059a View commit details
    Browse the repository at this point in the history
  11. Configuration menu
    Copy the full SHA
    6f61628 View commit details
    Browse the repository at this point in the history

Commits on Feb 14, 2019

  1. Merge branch 'rhv_ospp_profile' of https://github.com/redhatrises/sca…

    …p-security-guide into redhatrises-rhv_ospp_profile
    
    * 'rhv_ospp_profile' of https://github.com/redhatrises/scap-security-guide:
      Add draft RHVH FISMA Low profile
    shawndwells committed Feb 14, 2019
    Configuration menu
    Copy the full SHA
    1f84c58 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    67488a1 View commit details
    Browse the repository at this point in the history

Commits on Feb 15, 2019

  1. Configuration menu
    Copy the full SHA
    402e34b View commit details
    Browse the repository at this point in the history

Commits on Feb 17, 2019

  1. RHVM profile updates

    shawndwells committed Feb 17, 2019
    Configuration menu
    Copy the full SHA
    4a79e33 View commit details
    Browse the repository at this point in the history

Commits on Feb 18, 2019

  1. RHVH FISMA Low additions

    shawndwells committed Feb 18, 2019
    Configuration menu
    Copy the full SHA
    8c49ace View commit details
    Browse the repository at this point in the history
  2. update CCEs

    shawndwells committed Feb 18, 2019
    Configuration menu
    Copy the full SHA
    26ab405 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    6ff039b View commit details
    Browse the repository at this point in the history
  4. Remove alternate comments

    redhatrises committed Feb 18, 2019
    Configuration menu
    Copy the full SHA
    c17181e View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    f20e420 View commit details
    Browse the repository at this point in the history
  6. Add rhelh-vpp profile

    redhatrises committed Feb 18, 2019
    Configuration menu
    Copy the full SHA
    f4e492b View commit details
    Browse the repository at this point in the history
  7. Merge pull request #3791 from shawndwells/ocp3

    Misc updates to OCP content
    redhatrises authored Feb 18, 2019
    Configuration menu
    Copy the full SHA
    a13227d View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    e9e39b3 View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    7f17ec6 View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    e7793de View commit details
    Browse the repository at this point in the history
  11. Configuration menu
    Copy the full SHA
    9e3f390 View commit details
    Browse the repository at this point in the history
  12. Configuration menu
    Copy the full SHA
    7a301f9 View commit details
    Browse the repository at this point in the history
  13. Bump supported ansible version to 2.5

    - Ansible versions < 2.5 are no longer supported
    redhatrises committed Feb 18, 2019
    Configuration menu
    Copy the full SHA
    31337cb View commit details
    Browse the repository at this point in the history
  14. Configuration menu
    Copy the full SHA
    5881f5c View commit details
    Browse the repository at this point in the history
  15. Configuration menu
    Copy the full SHA
    187dda1 View commit details
    Browse the repository at this point in the history
  16. Remove out-of-date crypto rules from RHEL8/Fedora builds

    - With Crypto policies now shipped in RHEL8/Fedora, the SSH rules that checked
      that ciphers and macs where configured for FIPS are now out-of-date and deprecated.
      They should no longer be built with RHEL8/Fedora content. The rules have been now
      replaced by the configure_ssh_crypto_policy rule.
    redhatrises committed Feb 18, 2019
    Configuration menu
    Copy the full SHA
    d1450e2 View commit details
    Browse the repository at this point in the history
  17. Configuration menu
    Copy the full SHA
    1dd1d7d View commit details
    Browse the repository at this point in the history
  18. Merge pull request #3797 from redhatrises/remove_old_crypto_rules_rhel8

    Remove out-of-date crypto rules from RHEL8/Fedora builds
    shawndwells authored Feb 18, 2019
    Configuration menu
    Copy the full SHA
    0d337af View commit details
    Browse the repository at this point in the history
  19. Configuration menu
    Copy the full SHA
    a1af934 View commit details
    Browse the repository at this point in the history
  20. Configuration menu
    Copy the full SHA
    7dd1d23 View commit details
    Browse the repository at this point in the history
  21. Merge pull request #3796 from redhatrises/bump_ansible_version

    Bump supported ansible version to 2.5
    shawndwells authored Feb 18, 2019
    Configuration menu
    Copy the full SHA
    09af579 View commit details
    Browse the repository at this point in the history
  22. Configuration menu
    Copy the full SHA
    c54db2d View commit details
    Browse the repository at this point in the history

Commits on Feb 19, 2019

  1. Merge pull request #3798 from redhatrises/map_contributor_name

    Map lkinser to Lee Kinser in ssg/contributors.py
    shawndwells authored Feb 19, 2019
    Configuration menu
    Copy the full SHA
    9299136 View commit details
    Browse the repository at this point in the history