Skip to content

Commit 4774004

Browse files
authored
Merge pull request #14375 from vojtapolasek/rhel8_stig_update_02_26
Update RHEL 8 STIG control file to align with DISA STIG v2r6
2 parents 88ecc84 + c6a68f0 commit 4774004

10 files changed

Lines changed: 1286 additions & 1240 deletions

File tree

linux_os/guide/system/software/integrity/fips/fips_custom_stig_sub_policy/rule.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ rationale: |-
1111
severity: medium
1212

1313
identifiers:
14+
cce@rhel8: CCE-86493-4
1415
cce@rhel9: CCE-86570-9
1516

1617
references:

products/rhel8/controls/stig_rhel8.yml

Lines changed: 68 additions & 84 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
policy: Red Hat Enterprise Linux 8 Security Technical Implementation Guide
33
title: Red Hat Enterprise Linux 8 Security Technical Implementation Guide
44
id: stig_rhel8
5-
version: V2R5
5+
version: V2R6
66
source: https://www.cyber.mil/stigs/downloads
77
reference_type: stigid
88
product: rhel8
@@ -70,14 +70,6 @@ controls:
7070
- var_authselect_profile=sssd
7171
- var_multiple_time_servers=stig
7272
- var_time_service_set_maxpoll=18_hours
73-
# Enable / Configure FIPS
74-
- enable_fips_mode
75-
- var_system_crypto_policy=fips
76-
- configure_crypto_policy
77-
- configure_bind_crypto_policy
78-
- configure_libreswan_crypto_policy
79-
- configure_kerberos_crypto_policy
80-
- enable_dracut_fips_module
8173
# Other needed rules
8274
- enable_authselect
8375

@@ -97,24 +89,23 @@ controls:
9789
- security_patches_up_to_date
9890
status: automated
9991

92+
- id: RHEL-08-010015
93+
levels:
94+
- high
95+
title: RHEL 8 must have the crypto-policies package installed.
96+
rules:
97+
- package_crypto-policies_installed
98+
status: automated
99+
100100
- id: RHEL-08-010020
101101
levels:
102102
- high
103-
title: 'RHEL 8 must implement NIST FIPS-validated cryptography for the following: To provision
104-
digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest
105-
protections in accordance with applicable federal laws, Executive Orders, directives, policies,
106-
regulations, and standards.'
103+
title: RHEL 8 must implement a FIPS 140-3-compliant systemwide cryptographic policy.
107104
rules:
108-
- configure_bind_crypto_policy
109105
- configure_crypto_policy
110-
- configure_kerberos_crypto_policy
111-
- configure_libreswan_crypto_policy
112-
- enable_dracut_fips_module
113-
- enable_fips_mode
114106
- fips_crypto_subpolicy
115-
- harden_sshd_ciphers_openssh_conf_crypto_policy
116-
- harden_sshd_macs_openssh_conf_crypto_policy
117-
- sysctl_crypto_fips_enabled
107+
- fips_custom_stig_sub_policy
108+
- var_system_crypto_policy=fips_stig
118109
status: automated
119110

120111
- id: RHEL-08-010030
@@ -338,54 +329,62 @@ controls:
338329
- file_groupowner_var_log
339330
status: automated
340331

341-
- id: RHEL-08-010290
332+
- id: RHEL-08-010270
342333
levels:
343-
- medium
344-
title: The RHEL 8 SSH server must be configured to use only Message Authentication Codes (MACs)
345-
employing FIPS 140-3 validated cryptographic hash algorithms.
334+
- high
335+
title: RHEL 8 cryptographic policy must not be overridden.
346336
rules:
347-
- harden_sshd_macs_opensshserver_conf_crypto_policy
337+
- configure_crypto_policy
348338
status: automated
349339

350-
- id: RHEL-08-010291
340+
- id: RHEL-08-010275
351341
levels:
352342
- medium
353-
title: The RHEL 8 operating system must implement DOD-approved encryption to protect the confidentiality
354-
of SSH server connections.
343+
title: RHEL 8 must implement DOD-approved encryption in the bind package.
355344
rules:
356-
- harden_sshd_ciphers_opensshserver_conf_crypto_policy
345+
- configure_bind_crypto_policy
357346
status: automated
358347

359-
- id: RHEL-08-010292
348+
- id: RHEL-08-010280
360349
levels:
361-
- low
362-
title: RHEL 8 must ensure the SSH server uses strong entropy.
350+
- medium
351+
title: RHEL 8 IP tunnels must use FIPS 140-3-approved cryptographic algorithms.
363352
rules:
364-
- sshd_use_strong_rng
353+
- configure_libreswan_crypto_policy
365354
status: automated
366355

367-
- id: RHEL-08-010293
356+
- id: RHEL-08-010290
368357
levels:
369358
- medium
370-
title: The RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package.
359+
title: The RHEL 8 SSH server must be configured to use only Message Authentication Codes (MACs)
360+
employing FIPS 140-3 validated cryptographic hash algorithms.
361+
notes: This is implemented by a special STIG subpolicy.
371362
rules:
372-
- configure_openssl_crypto_policy
363+
- configure_crypto_policy
364+
- fips_crypto_subpolicy
365+
- fips_custom_stig_sub_policy
366+
- var_system_crypto_policy=fips_stig
373367
status: automated
374368

375-
- id: RHEL-08-010294
369+
- id: RHEL-08-010291
376370
levels:
377371
- medium
378-
title: The RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.
372+
title: The RHEL 8 operating system must implement DOD-approved encryption to protect the confidentiality
373+
of SSH server connections.
374+
notes: This is implemented by a special STIG subpolicy.
379375
rules:
380-
- configure_openssl_tls_crypto_policy
376+
- configure_crypto_policy
377+
- fips_crypto_subpolicy
378+
- fips_custom_stig_sub_policy
379+
- var_system_crypto_policy=fips_stig
381380
status: automated
382381

383-
- id: RHEL-08-010295
382+
- id: RHEL-08-010292
384383
levels:
385-
- medium
386-
title: The RHEL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.
384+
- low
385+
title: RHEL 8 must ensure the SSH server uses strong entropy.
387386
rules:
388-
- configure_gnutls_tls_crypto_policy
387+
- sshd_use_strong_rng
389388
status: automated
390389

391390
- id: RHEL-08-010300
@@ -807,14 +806,6 @@ controls:
807806
- mount_option_nosuid_remote_filesystems
808807
status: automated
809808

810-
- id: RHEL-08-010660
811-
levels:
812-
- medium
813-
title: Local RHEL 8 initialization files must not execute world-writable programs.
814-
rules:
815-
- accounts_user_dot_no_world_writable_programs
816-
status: automated
817-
818809
- id: RHEL-08-010670
819810
levels:
820811
- medium
@@ -975,6 +966,7 @@ controls:
975966
equivalent).
976967
rules:
977968
- partition_for_home
969+
- accounts_user_interactive_home_directory_on_separate_partition
978970
status: automated
979971

980972
- id: RHEL-08-010820
@@ -1375,14 +1367,6 @@ controls:
13751367
- sshd_disable_empty_passwords
13761368
status: automated
13771369

1378-
- id: RHEL-08-020340
1379-
levels:
1380-
- low
1381-
title: RHEL 8 must display the date and time of the last successful account logon upon logon.
1382-
rules:
1383-
- display_login_attempts
1384-
status: automated
1385-
13861370
- id: RHEL-08-020350
13871371
levels:
13881372
- medium
@@ -1418,6 +1402,16 @@ controls:
14181402
- accounts_umask_etc_profile
14191403
status: automated
14201404

1405+
- id: RHEL-08-020353
1406+
levels:
1407+
- medium
1408+
title: RHEL 8 must automatically exit interactive command shell user sessions after 10 minutes of inactivity.
1409+
rules:
1410+
- accounts_tmout
1411+
- var_accounts_tmout=10_min
1412+
status: automated
1413+
1414+
14211415
- id: RHEL-08-030000
14221416
levels:
14231417
- medium
@@ -2810,14 +2804,6 @@ controls:
28102804
- sshd_set_idle_timeout
28112805
status: automated
28122806

2813-
- id: RHEL-08-010287
2814-
levels:
2815-
- medium
2816-
title: The RHEL 8 SSH daemon must be configured to use system-wide crypto policies.
2817-
rules:
2818-
- configure_ssh_crypto_policy
2819-
status: automated
2820-
28212807
- id: RHEL-08-010472
28222808
levels:
28232809
- low
@@ -3159,14 +3145,6 @@ controls:
31593145
- selinux_user_login_roles
31603146
status: automated
31613147

3162-
- id: RHEL-08-040342
3163-
levels:
3164-
- medium
3165-
title: RHEL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms.
3166-
rules:
3167-
- sshd_use_approved_kex_ordered_stig
3168-
status: automated
3169-
31703148
- id: RHEL-08-010019
31713149
levels:
31723150
- medium
@@ -3204,20 +3182,26 @@ controls:
32043182
- id: RHEL-08-010296
32053183
levels:
32063184
- medium
3207-
title: RHEL 8 SSH client must be configured to use only Message Authentication Codes (MACs) employing
3208-
FIPS 140-3 validated cryptographic hash algorithms.
3185+
title: The RHEL 8 SSH client must be configured to use only DOD-approved Message Authentication Codes (MACs) employing FIPS 140-3-validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
3186+
notes: This is implemented by a special STIG subpolicy.
32093187
rules:
3210-
- harden_sshd_ciphers_openssh_conf_crypto_policy
3211-
- harden_sshd_macs_openssh_conf_crypto_policy
3188+
- configure_crypto_policy
3189+
- fips_crypto_subpolicy
3190+
- fips_custom_stig_sub_policy
3191+
- var_system_crypto_policy=fips_stig
32123192
status: automated
32133193

32143194
- id: RHEL-08-010297
32153195
levels:
32163196
- medium
3217-
title: RHEL 8 SSH client must be configured to use only ciphers employing FIPS 140-3 validated
3218-
cryptographic hash algorithms.
3219-
rules: []
3220-
status: pending
3197+
title: The RHEL 8 SSH client must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3-validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
3198+
notes: This is implemented by a special STIG subpolicy.
3199+
rules:
3200+
- configure_crypto_policy
3201+
- fips_crypto_subpolicy
3202+
- fips_custom_stig_sub_policy
3203+
- var_system_crypto_policy=fips_stig
3204+
status: automated
32213205

32223206
- id: RHEL-08-010455
32233207
levels:

products/rhel8/profiles/default.profile

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -731,3 +731,10 @@ selections:
731731
- package_xorg-x11-server-common_removed
732732
- accounts_users_netrc_file_permissions
733733
- journald_forward_to_syslog
734+
- harden_sshd_ciphers_opensshserver_conf_crypto_policy
735+
- harden_sshd_macs_opensshserver_conf_crypto_policy
736+
- sysctl_crypto_fips_enabled
737+
- configure_gnutls_tls_crypto_policy
738+
- configure_openssl_tls_crypto_policy
739+
- sshd_use_approved_kex_ordered_stig
740+
- accounts_user_dot_no_world_writable_programs

products/rhel8/profiles/stig.profile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
documentation_complete: true
33

44
metadata:
5-
version: V2R5
5+
version: V2R6
66
SMEs:
77
- mab879
88
- ggbecker
@@ -13,7 +13,7 @@ title: 'DISA STIG for Red Hat Enterprise Linux 8'
1313

1414
description: |-
1515
This profile contains configuration checks that align to the
16-
DISA STIG for Red Hat Enterprise Linux 8 V2R5.
16+
DISA STIG for Red Hat Enterprise Linux 8 V2R6.
1717

1818
In addition to being applicable to Red Hat Enterprise Linux 8, this
1919
configuration baseline is applicable to the operating system tier of

products/rhel8/profiles/stig_gui.profile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
documentation_complete: true
33

44
metadata:
5-
version: V2R5
5+
version: V2R6
66
SMEs:
77
- mab879
88
- ggbecker
@@ -13,7 +13,7 @@ title: 'DISA STIG with GUI for Red Hat Enterprise Linux 8'
1313

1414
description: |-
1515
This profile contains configuration checks that align to the
16-
DISA STIG with GUI for Red Hat Enterprise Linux 8 V2R5.
16+
DISA STIG with GUI for Red Hat Enterprise Linux 8 V2R6.
1717

1818
In addition to being applicable to Red Hat Enterprise Linux 8, this
1919
configuration baseline is applicable to the operating system tier of

shared/references/cce-redhat-avail.txt

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@ CCE-86482-7
44
CCE-86483-5
55
CCE-86484-3
66
CCE-86492-6
7-
CCE-86493-4
87
CCE-86494-2
98
CCE-86497-5
109
CCE-86498-3

shared/references/disa-stig-rhel8-v2r5-xccdf-manual.xml renamed to shared/references/disa-stig-rhel8-v2r6-xccdf-manual.xml

Lines changed: 332 additions & 372 deletions
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)