Blame SOURCES/scap-security-guide-0.1.47-e8.patch

44eea6
From 294a7b225581b89a8029143e18e14cd961fcff7d Mon Sep 17 00:00:00 2001
44eea6
From: shaneboulden <shane.boulden@gmail.com>
44eea6
Date: Sun, 22 Sep 2019 06:10:57 +1000
44eea6
Subject: [PATCH] Add Essential Eight profiles
44eea6
44eea6
The Australian Cyber Security Centre (ACSC) Essential Eight provides
44eea6
a baseline for cyber resilience.
44eea6
44eea6
A copy of the Essential Eight in Linux Environments guide can be found
44eea6
at the ACSC website:
44eea6
44eea6
https://www.cyber.gov.au/publications/essential-eight-in-linux-environments
44eea6
---
44eea6
 rhel7/profiles/e8.profile | 132 ++++++++++++++++++++++++++++++++++++
44eea6
 rhel8/profiles/e8.profile | 138 ++++++++++++++++++++++++++++++++++++++
44eea6
 2 files changed, 270 insertions(+)
44eea6
 create mode 100644 rhel7/profiles/e8.profile
44eea6
 create mode 100644 rhel8/profiles/e8.profile
44eea6
44eea6
diff --git a/rhel7/profiles/e8.profile b/rhel7/profiles/e8.profile
44eea6
new file mode 100644
44eea6
index 0000000000..27ff2a58e6
44eea6
--- /dev/null
44eea6
+++ b/rhel7/profiles/e8.profile
44eea6
@@ -0,0 +1,132 @@
44eea6
+documentation_complete: true
44eea6
+
44eea6
+title: 'Australian Cyber Security Centre (ACSC) Essential Eight'
44eea6
+
44eea6
+description: |-
44eea6
+  This profile contains configuration checks for Red Hat Enterprise Linux 7
44eea6
+  that align to the Australian Cyber Security Centre (ACSC) Essential Eight.
44eea6
+
44eea6
+  A copy of the Essential Eight in Linux Environments guide can be found at the
44eea6
+  ACSC website:
44eea6
+
44eea6
+  https://www.cyber.gov.au/publications/essential-eight-in-linux-environments
44eea6
+
44eea6
+selections:
44eea6
+
44eea6
+  ### Remove obsolete packages
44eea6
+  - package_talk_removed
44eea6
+  - package_talk-server_removed
44eea6
+  - package_xinetd_removed
44eea6
+  - service_xinetd_disabled
44eea6
+  - package_ypbind_removed
44eea6
+  - package_telnet_removed
44eea6
+  - service_telnet_disabled
44eea6
+  - package_telnet-server_removed
44eea6
+  - package_rsh_removed
44eea6
+  - package_rsh-server_removed
44eea6
+  - service_zebra_disabled
44eea6
+  - package_quagga_removed
44eea6
+  - service_avahi-daemon_disabled
44eea6
+  - package_squid_removed
44eea6
+  - service_squid_disabled
44eea6
+
44eea6
+  ### Software update
44eea6
+  - ensure_redhat_gpgkey_installed
44eea6
+  - ensure_gpgcheck_never_disabled
44eea6
+  - ensure_gpgcheck_local_packages
44eea6
+  - ensure_gpgcheck_globally_activated
44eea6
+  - security_patches_up_to_date
44eea6
+
44eea6
+  ### System security settings
44eea6
+  - sysctl_kernel_randomize_va_space
44eea6
+  - sysctl_kernel_exec_shield
44eea6
+  - sysctl_kernel_kptr_restrict
44eea6
+  - sysctl_kernel_dmesg_restrict
44eea6
+  - sysctl_kernel_kexec_load_disabled
44eea6
+  - sysctl_kernel_yama_ptrace_scope
44eea6
+
44eea6
+  ### SELinux
44eea6
+  - var_selinux_state=enforcing
44eea6
+  - selinux_state
44eea6
+  - var_selinux_policy_name=targeted
44eea6
+  - selinux_policytype
44eea6
+
44eea6
+  ### Filesystem integrity
44eea6
+  - rpm_verify_hashes
44eea6
+  - rpm_verify_permissions
44eea6
+  - rpm_verify_ownership
44eea6
+  - file_permissions_unauthorized_sgid
44eea6
+  - file_permissions_unauthorized_suid
44eea6
+  - file_permissions_unauthorized_world_writable
44eea6
+  - dir_perms_world_writable_sticky_bits
44eea6
+  - file_permissions_library_dirs
44eea6
+  - file_ownership_binary_dirs
44eea6
+  - file_permissions_binary_dirs
44eea6
+  - file_ownership_library_dirs
44eea6
+
44eea6
+  ### Passwords
44eea6
+  - no_empty_passwords
44eea6
+
44eea6
+  ### Partitioning
44eea6
+  - mount_option_dev_shm_nodev
44eea6
+  - mount_option_dev_shm_nosuid
44eea6
+  - mount_option_dev_shm_noexec
44eea6
+
44eea6
+  ### Network
44eea6
+  - package_firewalld_installed
44eea6
+  - service_firewalld_enabled
44eea6
+  - network_sniffer_disabled
44eea6
+
44eea6
+  ### Admin privileges
44eea6
+  - sudo_remove_nopasswd
44eea6
+  - sudo_remove_no_authenticate
44eea6
+  - sudo_require_authentication
44eea6
+
44eea6
+  ### Audit
44eea6
+  - package_rsyslog_installed
44eea6
+  - service_rsyslog_enabled
44eea6
+  - service_auditd_enabled
44eea6
+  - var_auditd_flush=incremental_async
44eea6
+  - auditd_data_retention_flush
44eea6
+  - auditd_local_events
44eea6
+  - auditd_write_logs
44eea6
+  - auditd_log_format
44eea6
+  - auditd_freq
44eea6
+  - auditd_name_format
44eea6
+  - audit_rules_login_events_tallylog
44eea6
+  - audit_rules_login_events_faillock
44eea6
+  - audit_rules_login_events_lastlog
44eea6
+  - audit_rules_login_events
44eea6
+  - audit_rules_time_adjtimex
44eea6
+  - audit_rules_time_clock_settime
44eea6
+  - audit_rules_time_watch_localtime
44eea6
+  - audit_rules_time_settimeofday
44eea6
+  - audit_rules_time_stime
44eea6
+  - audit_rules_execution_restorecon
44eea6
+  - audit_rules_execution_chcon
44eea6
+  - audit_rules_execution_semanage
44eea6
+  - audit_rules_execution_setsebool
44eea6
+  - audit_rules_execution_setfiles
44eea6
+  - audit_rules_execution_seunshare
44eea6
+  - audit_rules_sysadmin_actions
44eea6
+  - audit_rules_networkconfig_modification
44eea6
+  - audit_rules_usergroup_modification
44eea6
+  - audit_rules_dac_modification_chmod
44eea6
+  - audit_rules_dac_modification_chown
44eea6
+  - audit_rules_kernel_module_loading
44eea6
+
44eea6
+  ### Secure access
44eea6
+  - sshd_disable_root_login
44eea6
+  - sshd_disable_gssapi_auth
44eea6
+  - sshd_use_strong_ciphers
44eea6
+  - sshd_print_last_log
44eea6
+  - sshd_use_priv_separation
44eea6
+  - sshd_do_not_permit_user_env
44eea6
+  - sshd_disable_rhosts_rsa
44eea6
+  - sshd_disable_rhosts
44eea6
+  - sshd_allow_only_protocol2
44eea6
+  - sshd_set_loglevel_info
44eea6
+  - sshd_disable_empty_passwords
44eea6
+  - sshd_disable_user_known_hosts
44eea6
+  - sshd_enable_strictmodes
44eea6
+  - sshd_use_strong_macs
44eea6
diff --git a/rhel8/profiles/e8.profile b/rhel8/profiles/e8.profile
44eea6
new file mode 100644
44eea6
index 0000000000..53b4c156e2
44eea6
--- /dev/null
44eea6
+++ b/rhel8/profiles/e8.profile
44eea6
@@ -0,0 +1,138 @@
44eea6
+documentation_complete: true
44eea6
+
44eea6
+title: 'Australian Cyber Security Centre (ACSC) Essential Eight'
44eea6
+
44eea6
+description: |-
44eea6
+  This profile contains configuration checks for Red Hat Enterprise Linux 8
44eea6
+  that align to the Australian Cyber Security Centre (ACSC) Essential Eight.
44eea6
+
44eea6
+  A copy of the Essential Eight in Linux Environments guide can be found at the
44eea6
+  ACSC website:
44eea6
+
44eea6
+  https://www.cyber.gov.au/publications/essential-eight-in-linux-environments
44eea6
+
44eea6
+selections:
44eea6
+
44eea6
+  ### Remove obsolete packages
44eea6
+  - package_talk_removed
44eea6
+  - package_talk-server_removed
44eea6
+  - package_xinetd_removed
44eea6
+  - service_xinetd_disabled
44eea6
+  - package_ypbind_removed
44eea6
+  - package_telnet_removed
44eea6
+  - service_telnet_disabled
44eea6
+  - package_telnet-server_removed
44eea6
+  - package_rsh_removed
44eea6
+  - package_rsh-server_removed
44eea6
+  - service_zebra_disabled
44eea6
+  - package_quagga_removed
44eea6
+  - service_avahi-daemon_disabled
44eea6
+  - package_squid_removed
44eea6
+  - service_squid_disabled
44eea6
+
44eea6
+  ### Software update
44eea6
+  - ensure_redhat_gpgkey_installed
44eea6
+  - ensure_gpgcheck_never_disabled
44eea6
+  - ensure_gpgcheck_local_packages
44eea6
+  - ensure_gpgcheck_globally_activated
44eea6
+  - security_patches_up_to_date
44eea6
+
44eea6
+  ### System security settings
44eea6
+  - sysctl_kernel_randomize_va_space
44eea6
+  - sysctl_kernel_exec_shield
44eea6
+  - sysctl_kernel_kptr_restrict
44eea6
+  - sysctl_kernel_dmesg_restrict
44eea6
+  - sysctl_kernel_kexec_load_disabled
44eea6
+  - sysctl_kernel_yama_ptrace_scope
44eea6
+  - sysctl_kernel_unprivileged_bpf_disabled
44eea6
+  - sysctl_net_core_bpf_jit_harden
44eea6
+
44eea6
+  ### SELinux
44eea6
+  - var_selinux_state=enforcing
44eea6
+  - selinux_state
44eea6
+  - var_selinux_policy_name=targeted
44eea6
+  - selinux_policytype
44eea6
+
44eea6
+  ### Filesystem integrity
44eea6
+  - rpm_verify_hashes
44eea6
+  - rpm_verify_permissions
44eea6
+  - rpm_verify_ownership
44eea6
+  - file_permissions_unauthorized_sgid
44eea6
+  - file_permissions_unauthorized_suid
44eea6
+  - file_permissions_unauthorized_world_writable
44eea6
+  - dir_perms_world_writable_sticky_bits
44eea6
+  - file_permissions_library_dirs
44eea6
+  - file_ownership_binary_dirs
44eea6
+  - file_permissions_binary_dirs
44eea6
+  - file_ownership_library_dirs
44eea6
+
44eea6
+  ### Passwords
44eea6
+  - no_empty_passwords
44eea6
+
44eea6
+  ### Partitioning
44eea6
+  - mount_option_dev_shm_nodev
44eea6
+  - mount_option_dev_shm_nosuid
44eea6
+  - mount_option_dev_shm_noexec
44eea6
+
44eea6
+  ### Network
44eea6
+  - package_firewalld_installed
44eea6
+  - service_firewalld_enabled
44eea6
+  - network_sniffer_disabled
44eea6
+
44eea6
+  ### Admin privileges
44eea6
+  - sudo_remove_nopasswd
44eea6
+  - sudo_remove_no_authenticate
44eea6
+  - sudo_require_authentication
44eea6
+
44eea6
+  ### Audit
44eea6
+  - package_rsyslog_installed
44eea6
+  - service_rsyslog_enabled
44eea6
+  - service_auditd_enabled
44eea6
+  - var_auditd_flush=incremental_async
44eea6
+  - auditd_data_retention_flush
44eea6
+  - auditd_local_events
44eea6
+  - auditd_write_logs
44eea6
+  - auditd_log_format
44eea6
+  - auditd_freq
44eea6
+  - auditd_name_format
44eea6
+  - audit_rules_login_events_tallylog
44eea6
+  - audit_rules_login_events_faillock
44eea6
+  - audit_rules_login_events_lastlog
44eea6
+  - audit_rules_login_events
44eea6
+  - audit_rules_time_adjtimex
44eea6
+  - audit_rules_time_clock_settime
44eea6
+  - audit_rules_time_watch_localtime
44eea6
+  - audit_rules_time_settimeofday
44eea6
+  - audit_rules_time_stime
44eea6
+  - audit_rules_execution_restorecon
44eea6
+  - audit_rules_execution_chcon
44eea6
+  - audit_rules_execution_semanage
44eea6
+  - audit_rules_execution_setsebool
44eea6
+  - audit_rules_execution_setfiles
44eea6
+  - audit_rules_execution_seunshare
44eea6
+  - audit_rules_sysadmin_actions
44eea6
+  - audit_rules_networkconfig_modification
44eea6
+  - audit_rules_usergroup_modification
44eea6
+  - audit_rules_dac_modification_chmod
44eea6
+  - audit_rules_dac_modification_chown
44eea6
+  - audit_rules_kernel_module_loading
44eea6
+
44eea6
+  ### Secure access
44eea6
+  - sshd_disable_root_login
44eea6
+  - sshd_disable_gssapi_auth
44eea6
+  - sshd_print_last_log
44eea6
+  - sshd_use_priv_separation
44eea6
+  - sshd_do_not_permit_user_env
44eea6
+  - sshd_disable_rhosts_rsa
44eea6
+  - sshd_disable_rhosts
44eea6
+  - sshd_allow_only_protocol2
44eea6
+  - sshd_set_loglevel_info
44eea6
+  - sshd_disable_empty_passwords
44eea6
+  - sshd_disable_user_known_hosts
44eea6
+  - sshd_enable_strictmodes
44eea6
+
44eea6
+  ### Application whitelisting
44eea6
+  - package_fapolicyd_installed
44eea6
+  - service_fapolicyd_enabled
44eea6
+  - configure_fapolicyd_mounts
44eea6
+