Blame SOURCES/scap-security-guide-0.1.55-add_rules_for_R37-PR_6540.patch

a297d8
From 76aede9cea67f4ea37eaa05ad74bf80273638de2 Mon Sep 17 00:00:00 2001
a297d8
From: Watson Sato <wsato@redhat.com>
a297d8
Date: Wed, 28 Oct 2020 18:52:13 +0100
a297d8
Subject: [PATCH] Select rules for ANSSI R37
a297d8
a297d8
These rules are better fit for R37 than R38.
a297d8
R37 is about binaries designed to be used with setuid or setgid bits.
a297d8
R38 is about reducing number of binaries with setuid root.
a297d8
---
a297d8
 controls/anssi.yml | 17 ++++++++++++-----
a297d8
 1 file changed, 12 insertions(+), 5 deletions(-)
a297d8
a297d8
diff --git a/controls/anssi.yml b/controls/anssi.yml
a297d8
index 26bc7f4694..4648b98dff 100644
a297d8
--- a/controls/anssi.yml
a297d8
+++ b/controls/anssi.yml
a297d8
@@ -590,8 +590,17 @@ controls:
a297d8
 
a297d8
   - id: R37
a297d8
     level: minimal
a297d8
-    title: Executables with setuid and/or setgid bits
a297d8
-    # rules: TBD
a297d8
+    title: Executables with setuid and setgid bits
a297d8
+    notes: >-
a297d8
+      Only programs specifically designed to be used with setuid or setgid bits can have these privilege bits set.
a297d8
+      This requirement considers apropriate for setuid and setgid bits the binaries that are installed from
a297d8
+      recognized and authorized repositories (covered in R15).
a297d8
+      The remediation resets the sticky bit to intended value by vendor/developer, any finding after remediation
a297d8
+      should be reviewed.
a297d8
+    automated: yes
a297d8
+    rules:
a297d8
+    - file_permissions_unauthorized_suid
a297d8
+    - file_permissions_unauthorized_sgid
a297d8
 
a297d8
   - id: R38
a297d8
     level: enhanced
a297d8
@@ -600,9 +609,7 @@ controls:
a297d8
       Setuid executables should be as small as possible. When it is expected
a297d8
       that only the administrators of the machine execute them, the setuid bit
a297d8
       must be removed and prefer them commands like su or sudo, which can be monitored
a297d8
-    rules:
a297d8
-    - file_permissions_unauthorized_suid
a297d8
-    - file_permissions_unauthorized_sgid
a297d8
+    # rules: TBD
a297d8
 
a297d8
   - id: R39
a297d8
     level: intermediary