-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sync from Master #1
Commits on Feb 12, 2019
-
Configuration menu - View commit details
-
Copy full SHA for 95fa51f - Browse repository at this point
Copy the full SHA 95fa51fView commit details
Commits on Feb 13, 2019
-
Remove kubelet_enable_kernel_defaults
Red Hat disagrees with the CIS recommendation for the protect-kernel-defauts. OpenShift node/kubelet modifies the system tunable; using the protect-kernel-defaults flag will cause the kubelet to fail on start if the tunables don't match what the kubelet desires and the OpenShift node to fail to start. For more information, see https://bugzilla.redhat.com/show_bug.cgi?id=1434318 (closed Won't Fix). The expected tunable values are listed here: https://github.com/openshift/origin/blob/release-3.10/vendor/k8s.io/kubernetes/pkg/util/sysctl/sysctl.go#L28-L42
Configuration menu - View commit details
-
Copy full SHA for fe5e19d - Browse repository at this point
Copy the full SHA fe5e19dView commit details -
Configuration menu - View commit details
-
Copy full SHA for e8b5c1d - Browse repository at this point
Copy the full SHA e8b5c1dView commit details -
Configuration menu - View commit details
-
Copy full SHA for 8b8bb57 - Browse repository at this point
Copy the full SHA 8b8bb57View commit details -
Remove kubelet_enable_authorization
Unauthenticated/Unauthorized users have no access to OpenShift nodes. The kubelet flag authorization-mode is explicitly set to WebHook Since Webhook is the default value, the authorization-mode configuration is not needed in node-config. If it is configured, ensure the value is only set to ‘Webhook’. The node systemd service (atomic-openshift-node) will not start if the configuration value is set to anything other than Webhook.
Configuration menu - View commit details
-
Copy full SHA for 6b7ad5d - Browse repository at this point
Copy the full SHA 6b7ad5dView commit details -
removed kubelet_disable_anon_access
Red Hat disagrees with the CIS recommendation to disable anonymous-auth and OpenShift uses a different approach to secure anonymous authorization. OpenShift explicitly sets anonymous-auth to true, as anonymous requests are used for discovery information, webhook integrations, etc. OpenShift allows anonymous requests (then authorizes them). Access to OpenShift node is authenticated with certificate. kubelet apis are subresources of the node resource that can be restricted by RBAC roles. Anonymous access is denied for these subresources. OpenShift provides it's own fully integrated authentication and authorization mechanism. Unsecured endpoints reveal no sensitive data. Unauthenticated requests to secured endpoints are assigned to 'system:anonymous'. system:anonymous is not bound to any roles, and thus has no visibility by default. See https://docs.openshift.com/container-platform/3.10/install_config/configuring_authentication.html
Configuration menu - View commit details
-
Copy full SHA for 5945814 - Browse repository at this point
Copy the full SHA 5945814View commit details -
removed kubelet_privileged_containers
OpenShift uses Security Context Constraints to prevent privileged containers from running by default. OpenShift explicitly sets the allow-privileged kubelet flag, but does not allow privileged container by default. To create privileged pod, the user/serviceAccount must be granted access to the privileged SCC; only cluster-admin can grant SCC privileges. Some platform-level components (e.g. fluentd, sdn, ovs which run on every node) must run as privileged, thus disabling the flag would affect platform features. Review users and groups who may create privileged containers as described in 6.9.
Configuration menu - View commit details
-
Copy full SHA for 3045ce2 - Browse repository at this point
Copy the full SHA 3045ce2View commit details -
Update regex of etcd/etcd_peer_auto_tls/rule.yml
default is false, and false is the pass condition. updated OVAL to fail only when true is present.
Configuration menu - View commit details
-
Copy full SHA for c0ea52c - Browse repository at this point
Copy the full SHA c0ea52cView commit details -
default value is false. update OVAL to fail upon "true"
Configuration menu - View commit details
-
Copy full SHA for a71c3a1 - Browse repository at this point
Copy the full SHA a71c3a1View commit details -
Configuration menu - View commit details
-
Copy full SHA for d0681d6 - Browse repository at this point
Copy the full SHA d0681d6View commit details -
Merge branch 'update_contributors_0_1_43' of https://github.com/yuuma…
…sato/scap-security-guide into yuumasato-update_contributors_0_1_43
Configuration menu - View commit details
-
Copy full SHA for 74b059a - Browse repository at this point
Copy the full SHA 74b059aView commit details -
Configuration menu - View commit details
-
Copy full SHA for 6f61628 - Browse repository at this point
Copy the full SHA 6f61628View commit details
Commits on Feb 14, 2019
-
Merge branch 'rhv_ospp_profile' of https://github.com/redhatrises/sca…
…p-security-guide into redhatrises-rhv_ospp_profile * 'rhv_ospp_profile' of https://github.com/redhatrises/scap-security-guide: Add draft RHVH FISMA Low profile
Configuration menu - View commit details
-
Copy full SHA for 1f84c58 - Browse repository at this point
Copy the full SHA 1f84c58View commit details -
Configuration menu - View commit details
-
Copy full SHA for 67488a1 - Browse repository at this point
Copy the full SHA 67488a1View commit details
Commits on Feb 15, 2019
-
Configuration menu - View commit details
-
Copy full SHA for 402e34b - Browse repository at this point
Copy the full SHA 402e34bView commit details
Commits on Feb 17, 2019
-
Configuration menu - View commit details
-
Copy full SHA for 4a79e33 - Browse repository at this point
Copy the full SHA 4a79e33View commit details
Commits on Feb 18, 2019
-
Configuration menu - View commit details
-
Copy full SHA for 8c49ace - Browse repository at this point
Copy the full SHA 8c49aceView commit details -
Configuration menu - View commit details
-
Copy full SHA for 26ab405 - Browse repository at this point
Copy the full SHA 26ab405View commit details -
Configuration menu - View commit details
-
Copy full SHA for 6ff039b - Browse repository at this point
Copy the full SHA 6ff039bView commit details -
Configuration menu - View commit details
-
Copy full SHA for c17181e - Browse repository at this point
Copy the full SHA c17181eView commit details -
Configuration menu - View commit details
-
Copy full SHA for f20e420 - Browse repository at this point
Copy the full SHA f20e420View commit details -
Configuration menu - View commit details
-
Copy full SHA for f4e492b - Browse repository at this point
Copy the full SHA f4e492bView commit details -
Merge pull request #3791 from shawndwells/ocp3
Misc updates to OCP content
Configuration menu - View commit details
-
Copy full SHA for a13227d - Browse repository at this point
Copy the full SHA a13227dView commit details -
Configuration menu - View commit details
-
Copy full SHA for e9e39b3 - Browse repository at this point
Copy the full SHA e9e39b3View commit details -
Configuration menu - View commit details
-
Copy full SHA for 7f17ec6 - Browse repository at this point
Copy the full SHA 7f17ec6View commit details -
Configuration menu - View commit details
-
Copy full SHA for e7793de - Browse repository at this point
Copy the full SHA e7793deView commit details -
Configuration menu - View commit details
-
Copy full SHA for 9e3f390 - Browse repository at this point
Copy the full SHA 9e3f390View commit details -
Configuration menu - View commit details
-
Copy full SHA for 7a301f9 - Browse repository at this point
Copy the full SHA 7a301f9View commit details -
Bump supported ansible version to 2.5
- Ansible versions < 2.5 are no longer supported
Configuration menu - View commit details
-
Copy full SHA for 31337cb - Browse repository at this point
Copy the full SHA 31337cbView commit details -
Configuration menu - View commit details
-
Copy full SHA for 5881f5c - Browse repository at this point
Copy the full SHA 5881f5cView commit details -
Configuration menu - View commit details
-
Copy full SHA for 187dda1 - Browse repository at this point
Copy the full SHA 187dda1View commit details -
Remove out-of-date crypto rules from RHEL8/Fedora builds
- With Crypto policies now shipped in RHEL8/Fedora, the SSH rules that checked that ciphers and macs where configured for FIPS are now out-of-date and deprecated. They should no longer be built with RHEL8/Fedora content. The rules have been now replaced by the configure_ssh_crypto_policy rule.
Configuration menu - View commit details
-
Copy full SHA for d1450e2 - Browse repository at this point
Copy the full SHA d1450e2View commit details -
Configuration menu - View commit details
-
Copy full SHA for 1dd1d7d - Browse repository at this point
Copy the full SHA 1dd1d7dView commit details -
Merge pull request #3797 from redhatrises/remove_old_crypto_rules_rhel8
Remove out-of-date crypto rules from RHEL8/Fedora builds
Configuration menu - View commit details
-
Copy full SHA for 0d337af - Browse repository at this point
Copy the full SHA 0d337afView commit details -
Configuration menu - View commit details
-
Copy full SHA for a1af934 - Browse repository at this point
Copy the full SHA a1af934View commit details -
Merge pull request #3774 from shawndwells/redhatrises-rhv_ospp_profile
RHVH FISMA Low profile
Configuration menu - View commit details
-
Copy full SHA for 7dd1d23 - Browse repository at this point
Copy the full SHA 7dd1d23View commit details -
Merge pull request #3796 from redhatrises/bump_ansible_version
Bump supported ansible version to 2.5
Configuration menu - View commit details
-
Copy full SHA for 09af579 - Browse repository at this point
Copy the full SHA 09af579View commit details -
Configuration menu - View commit details
-
Copy full SHA for c54db2d - Browse repository at this point
Copy the full SHA c54db2dView commit details
Commits on Feb 19, 2019
-
Merge pull request #3798 from redhatrises/map_contributor_name
Map lkinser to Lee Kinser in ssg/contributors.py
Configuration menu - View commit details
-
Copy full SHA for 9299136 - Browse repository at this point
Copy the full SHA 9299136View commit details