Blame SOURCES/scap-security-guide-0.1.53-fix_severity_stig-PR_6110.patch

fe0dde
From 147ad40e23d8bd1c839baa001105c659e732c7cd Mon Sep 17 00:00:00 2001
fe0dde
From: Gabriel Becker <ggasparb@redhat.com>
fe0dde
Date: Mon, 21 Sep 2020 15:30:47 +0200
fe0dde
Subject: [PATCH 1/4] Fix severity of RHEL 7 STIG rules.
fe0dde
fe0dde
---
fe0dde
 rhel7/profiles/stig.profile | 5 +++++
fe0dde
 1 file changed, 5 insertions(+)
fe0dde
fe0dde
diff --git a/rhel7/profiles/stig.profile b/rhel7/profiles/stig.profile
fe0dde
index b820d30608..57e88de210 100644
fe0dde
--- a/rhel7/profiles/stig.profile
fe0dde
+++ b/rhel7/profiles/stig.profile
fe0dde
@@ -104,6 +104,7 @@ selections:
fe0dde
     - grub2_password
fe0dde
     - require_singleuser_auth
fe0dde
     - grub2_uefi_password
fe0dde
+    - grub2_uefi_password.severity=high
fe0dde
     - smartcard_auth
fe0dde
     - package_rsh-server_removed
fe0dde
     - package_ypserv_removed
fe0dde
@@ -157,6 +158,7 @@ selections:
fe0dde
     - grub2_enable_fips_mode
fe0dde
     - aide_verify_acls
fe0dde
     - aide_verify_ext_attributes
fe0dde
+    - aide_verify_ext_attributes.severity=low
fe0dde
     - aide_use_fips_hashes
fe0dde
     - grub2_no_removeable_media
fe0dde
     - uefi_no_removeable_media
fe0dde
@@ -297,6 +299,9 @@ selections:
fe0dde
     - sysctl_net_ipv4_conf_all_accept_redirects
fe0dde
     - wireless_disable_interfaces
fe0dde
     - mount_option_dev_shm_nodev
fe0dde
+    - mount_option_dev_shm_nodev.severity=low
fe0dde
     - mount_option_dev_shm_noexec
fe0dde
+    - mount_option_dev_shm_noexec.severity=low
fe0dde
     - mount_option_dev_shm_nosuid
fe0dde
+    - mount_option_dev_shm_nosuid.severity=low
fe0dde
     - audit_rules_privileged_commands_mount
fe0dde
fe0dde
From 1e6ae626c138106ec8884f0863b09d0e628ae68f Mon Sep 17 00:00:00 2001
fe0dde
From: Gabriel Becker <ggasparb@redhat.com>
fe0dde
Date: Mon, 21 Sep 2020 15:44:44 +0200
fe0dde
Subject: [PATCH 2/4] Revert severity of some rules and refine on a profile
fe0dde
 basis.
fe0dde
fe0dde
These rules had been previously severity mappings from NIST 800-53 and
fe0dde
we should keep them as they were and refine as needed on the profile
fe0dde
level.
fe0dde
---
fe0dde
 .../ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml        | 2 +-
fe0dde
 .../accounts-session/accounts_logon_fail_delay/rule.yml         | 2 +-
fe0dde
 rhel7/profiles/stig.profile                                     | 2 ++
fe0dde
 3 files changed, 4 insertions(+), 2 deletions(-)
fe0dde
fe0dde
diff --git a/linux_os/guide/services/ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml b/linux_os/guide/services/ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml
fe0dde
index 95e11e5787..2ead6f7896 100644
fe0dde
--- a/linux_os/guide/services/ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml
fe0dde
+++ b/linux_os/guide/services/ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml
fe0dde
@@ -10,7 +10,7 @@ rationale: |-
fe0dde
     Removing the <tt>vsftpd</tt> package decreases the risk of its
fe0dde
     accidental activation.
fe0dde
 
fe0dde
-severity: high
fe0dde
+severity: low
fe0dde
 
fe0dde
 identifiers:
fe0dde
     cce@rhel6: CCE-26687-4
fe0dde
diff --git a/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml b/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml
fe0dde
index 08f81100f4..bb7c17108a 100644
fe0dde
--- a/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml
fe0dde
+++ b/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml
fe0dde
@@ -11,7 +11,7 @@ rationale: |-
fe0dde
     Increasing the time between a failed authentication attempt and re-prompting to
fe0dde
     enter credentials helps to slow a single-threaded brute force attack.
fe0dde
 
fe0dde
-severity: medium
fe0dde
+severity: low
fe0dde
 
fe0dde
 identifiers:
fe0dde
     cce@rhel7: CCE-80352-8
fe0dde
diff --git a/rhel7/profiles/stig.profile b/rhel7/profiles/stig.profile
fe0dde
index 57e88de210..f3f94a66ba 100644
fe0dde
--- a/rhel7/profiles/stig.profile
fe0dde
+++ b/rhel7/profiles/stig.profile
fe0dde
@@ -97,6 +97,7 @@ selections:
fe0dde
     - sudo_remove_nopasswd
fe0dde
     - sudo_remove_no_authenticate
fe0dde
     - accounts_logon_fail_delay
fe0dde
+    - accounts_logon_fail_delay.severity=medium
fe0dde
     - gnome_gdm_disable_automatic_login
fe0dde
     - gnome_gdm_disable_guest_login
fe0dde
     - sshd_do_not_permit_user_env
fe0dde
@@ -274,6 +275,7 @@ selections:
fe0dde
     - network_sniffer_disabled
fe0dde
     - postfix_prevent_unrestricted_relay
fe0dde
     - package_vsftpd_removed
fe0dde
+    - package_vsftpd_removed.severity=high
fe0dde
     - package_tftp-server_removed
fe0dde
     - sshd_enable_x11_forwarding
fe0dde
     - tftpd_uses_secure_mode
fe0dde
fe0dde
From 4dcb7e0cfe8a59f7490e4eb4da18acc3a96e06a5 Mon Sep 17 00:00:00 2001
fe0dde
From: Gabriel Becker <ggasparb@redhat.com>
fe0dde
Date: Fri, 2 Oct 2020 17:18:19 +0200
fe0dde
Subject: [PATCH 3/4] Revert to previous severity since what's in the STIG
fe0dde
 takes precedence.
fe0dde
fe0dde
---
fe0dde
 .../ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml        | 2 +-
fe0dde
 .../accounts-session/accounts_logon_fail_delay/rule.yml         | 2 +-
fe0dde
 2 files changed, 2 insertions(+), 2 deletions(-)
fe0dde
fe0dde
diff --git a/linux_os/guide/services/ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml b/linux_os/guide/services/ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml
fe0dde
index 2ead6f7896..95e11e5787 100644
fe0dde
--- a/linux_os/guide/services/ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml
fe0dde
+++ b/linux_os/guide/services/ftp/disabling_vsftpd/package_vsftpd_removed/rule.yml
fe0dde
@@ -10,7 +10,7 @@ rationale: |-
fe0dde
     Removing the <tt>vsftpd</tt> package decreases the risk of its
fe0dde
     accidental activation.
fe0dde
 
fe0dde
-severity: low
fe0dde
+severity: high
fe0dde
 
fe0dde
 identifiers:
fe0dde
     cce@rhel6: CCE-26687-4
fe0dde
diff --git a/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml b/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml
fe0dde
index bb7c17108a..08f81100f4 100644
fe0dde
--- a/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml
fe0dde
+++ b/linux_os/guide/system/accounts/accounts-session/accounts_logon_fail_delay/rule.yml
fe0dde
@@ -11,7 +11,7 @@ rationale: |-
fe0dde
     Increasing the time between a failed authentication attempt and re-prompting to
fe0dde
     enter credentials helps to slow a single-threaded brute force attack.
fe0dde
 
fe0dde
-severity: low
fe0dde
+severity: medium
fe0dde
 
fe0dde
 identifiers:
fe0dde
     cce@rhel7: CCE-80352-8
fe0dde
fe0dde
From 0da43ce6d4758a540ba3276a8c51819be643f709 Mon Sep 17 00:00:00 2001
fe0dde
From: Gabriel Becker <ggasparb@redhat.com>
fe0dde
Date: Fri, 2 Oct 2020 17:38:03 +0200
fe0dde
Subject: [PATCH 4/4] Remove severity refinement from profile and change on a
fe0dde
 rule level.
fe0dde
fe0dde
---
fe0dde
 .../system/bootloader-grub2/grub2_uefi_password/rule.yml   | 2 +-
fe0dde
 .../partitions/mount_option_dev_shm_nodev/rule.yml         | 2 +-
fe0dde
 .../partitions/mount_option_dev_shm_noexec/rule.yml        | 2 +-
fe0dde
 .../partitions/mount_option_dev_shm_nosuid/rule.yml        | 2 +-
fe0dde
 .../aide/aide_verify_ext_attributes/rule.yml               | 2 +-
fe0dde
 rhel7/profiles/stig.profile                                | 7 -------
fe0dde
 6 files changed, 5 insertions(+), 12 deletions(-)
fe0dde
fe0dde
diff --git a/linux_os/guide/system/bootloader-grub2/grub2_uefi_password/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_uefi_password/rule.yml
fe0dde
index e07094177b..0184c601a0 100644
fe0dde
--- a/linux_os/guide/system/bootloader-grub2/grub2_uefi_password/rule.yml
fe0dde
+++ b/linux_os/guide/system/bootloader-grub2/grub2_uefi_password/rule.yml
fe0dde
@@ -24,7 +24,7 @@ rationale: |-
fe0dde
     important bootloader settings. These include which kernel to use,
fe0dde
     and whether to enter single-user mode.
fe0dde
 
fe0dde
-severity: medium
fe0dde
+severity: high
fe0dde
 
fe0dde
 identifiers:
fe0dde
     cce@rhel7: CCE-80354-4
fe0dde
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nodev/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nodev/rule.yml
fe0dde
index 4f01edeebc..4a06fd5f2f 100644
fe0dde
--- a/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nodev/rule.yml
fe0dde
+++ b/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nodev/rule.yml
fe0dde
@@ -14,7 +14,7 @@ rationale: |-
fe0dde
 
fe0dde
 {{{ complete_ocil_entry_mount_option("/dev/shm", "nodev") }}}
fe0dde
 
fe0dde
-severity: medium
fe0dde
+severity: low
fe0dde
 
fe0dde
 identifiers:
fe0dde
     cce@rhel6: CCE-26778-1
fe0dde
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_noexec/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_noexec/rule.yml
fe0dde
index 0074e898c6..eaab02ff6d 100644
fe0dde
--- a/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_noexec/rule.yml
fe0dde
+++ b/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_noexec/rule.yml
fe0dde
@@ -17,7 +17,7 @@ rationale: |-
fe0dde
 
fe0dde
 {{{ complete_ocil_entry_mount_option("/dev/shm", "noexec") }}}
fe0dde
 
fe0dde
-severity: medium
fe0dde
+severity: low
fe0dde
 
fe0dde
 identifiers:
fe0dde
     cce@rhel6: CCE-26622-1
fe0dde
diff --git a/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nosuid/rule.yml b/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nosuid/rule.yml
fe0dde
index e0eabc2a9e..3771bf2451 100644
fe0dde
--- a/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nosuid/rule.yml
fe0dde
+++ b/linux_os/guide/system/permissions/partitions/mount_option_dev_shm_nosuid/rule.yml
fe0dde
@@ -14,7 +14,7 @@ rationale: |-
fe0dde
 
fe0dde
 {{{ complete_ocil_entry_mount_option("/dev/shm", "nosuid") }}}
fe0dde
 
fe0dde
-severity: medium
fe0dde
+severity: low
fe0dde
 
fe0dde
 identifiers:
fe0dde
     cce@rhel6: CCE-26486-1
fe0dde
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_verify_ext_attributes/rule.yml b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_verify_ext_attributes/rule.yml
fe0dde
index 9dba1deca5..2e81a270c5 100644
fe0dde
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_verify_ext_attributes/rule.yml
fe0dde
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_verify_ext_attributes/rule.yml
fe0dde
@@ -17,7 +17,7 @@ rationale: |-
fe0dde
     Extended attributes in file systems are used to contain arbitrary data and file metadata
fe0dde
     with security implications.
fe0dde
 
fe0dde
-severity: medium
fe0dde
+severity: low
fe0dde
 
fe0dde
 identifiers:
fe0dde
     cce@rhel7: CCE-80376-7
fe0dde
diff --git a/rhel7/profiles/stig.profile b/rhel7/profiles/stig.profile
fe0dde
index f3f94a66ba..b820d30608 100644
fe0dde
--- a/rhel7/profiles/stig.profile
fe0dde
+++ b/rhel7/profiles/stig.profile
fe0dde
@@ -97,7 +97,6 @@ selections:
fe0dde
     - sudo_remove_nopasswd
fe0dde
     - sudo_remove_no_authenticate
fe0dde
     - accounts_logon_fail_delay
fe0dde
-    - accounts_logon_fail_delay.severity=medium
fe0dde
     - gnome_gdm_disable_automatic_login
fe0dde
     - gnome_gdm_disable_guest_login
fe0dde
     - sshd_do_not_permit_user_env
fe0dde
@@ -105,7 +104,6 @@ selections:
fe0dde
     - grub2_password
fe0dde
     - require_singleuser_auth
fe0dde
     - grub2_uefi_password
fe0dde
-    - grub2_uefi_password.severity=high
fe0dde
     - smartcard_auth
fe0dde
     - package_rsh-server_removed
fe0dde
     - package_ypserv_removed
fe0dde
@@ -159,7 +157,6 @@ selections:
fe0dde
     - grub2_enable_fips_mode
fe0dde
     - aide_verify_acls
fe0dde
     - aide_verify_ext_attributes
fe0dde
-    - aide_verify_ext_attributes.severity=low
fe0dde
     - aide_use_fips_hashes
fe0dde
     - grub2_no_removeable_media
fe0dde
     - uefi_no_removeable_media
fe0dde
@@ -275,7 +272,6 @@ selections:
fe0dde
     - network_sniffer_disabled
fe0dde
     - postfix_prevent_unrestricted_relay
fe0dde
     - package_vsftpd_removed
fe0dde
-    - package_vsftpd_removed.severity=high
fe0dde
     - package_tftp-server_removed
fe0dde
     - sshd_enable_x11_forwarding
fe0dde
     - tftpd_uses_secure_mode
fe0dde
@@ -301,9 +297,6 @@ selections:
fe0dde
     - sysctl_net_ipv4_conf_all_accept_redirects
fe0dde
     - wireless_disable_interfaces
fe0dde
     - mount_option_dev_shm_nodev
fe0dde
-    - mount_option_dev_shm_nodev.severity=low
fe0dde
     - mount_option_dev_shm_noexec
fe0dde
-    - mount_option_dev_shm_noexec.severity=low
fe0dde
     - mount_option_dev_shm_nosuid
fe0dde
-    - mount_option_dev_shm_nosuid.severity=low
fe0dde
     - audit_rules_privileged_commands_mount