Skip to content

Commit a78ca75

Browse files
authored
Merge pull request #14697 from vojtapolasek/rhel9_ccn_disable_kdump
Add service_kdump_disabled to RHEL 9 CCN profiles
2 parents 920a25a + dde4d8e commit a78ca75

3 files changed

Lines changed: 77 additions & 34 deletions

File tree

products/rhel9/controls/ccn_rhel9.yml

Lines changed: 75 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ policy: CCN-STIC-610A22
33
title: Security Profile Application Guide for Red Hat Enterprise Linux 9
44
id: ccn_rhel9
55
version: '2022-10'
6-
source: https://www.ccn-cert.cni.es/pdf/guias/series-ccn-stic/guias-de-acceso-publico-ccn-stic/6768-ccn-stic-610a22-perfilado-de-seguridad-red-hat-enterprise-linux-9-0/file.html
6+
source: https://www.ccn-cert.cni.es/pdf/guias/series-ccn-stic/guias-de-acceso-publico-ccn-stic/6768-ccn-stic-610a22-perfilado-de-seguridad-red-hat-enterprise-linux-9-0/file.html # yamllint disable-line rule:line-length
77

88
levels:
99
- id: basic
@@ -121,10 +121,14 @@ controls:
121121
- var_auditd_max_log_file_action=rotate
122122

123123
- id: A.3.SEC-RHEL7
124-
title: Modifications to the Sudoers File Are Audited, As Are Changes to Permissions, Users, Groups,
124+
title: >-
125+
Modifications to the Sudoers File Are Audited,
126+
As Are Changes to Permissions, Users, Groups,
125127
and Passwords
126-
original_title: Se auditan las modificaciones del fichero sudoers, así como los cambios en permisos,
127-
usuarios, grupos y contraseñas.
128+
original_title: >-
129+
Se auditan las modificaciones del fichero sudoers,
130+
así como los cambios en permisos, usuarios,
131+
grupos y contraseñas.
128132
levels:
129133
- basic
130134
- intermediate
@@ -154,15 +158,20 @@ controls:
154158

155159
- id: A.3.SEC-RHEL8
156160
title: Changes to Cron Settings and Scheduled Tasks Including Startup Scripts Are Audited
157-
original_title: Se auditan los cambios en la configuración de Cron y en tareas programadas incluyendo
158-
los de scripts de inicio.
161+
original_title: >-
162+
Se auditan los cambios en la configuración de
163+
Cron y en tareas programadas incluyendo los de
164+
scripts de inicio.
159165
levels:
160166
- advanced
161167
status: pending
162168
notes: |-
163-
Some possible rules were included here but it is not clear if the requirement intends to
164-
check more than these rules. We can see if more related rules are available in the project
165-
and include everything that makes sense in the context of cron and chrony.
169+
Some possible rules were included here but it is
170+
not clear if the requirement intends to check
171+
more than these rules. We can see if more related
172+
rules are available in the project and include
173+
everything that makes sense in the context of
174+
cron and chrony.
166175
related_rules:
167176
- audit_rules_time_adjtimex
168177
- audit_rules_time_settimeofday
@@ -185,15 +194,19 @@ controls:
185194

186195
- id: A.3.SEC-RHEL10
187196
title: All Mount Operations on the System and Changes to the Swap Are Audited
188-
original_title: Se audita toda operación de montaje en el sistema y modificaciones en la memoria
189-
de intercambio.
197+
original_title: >-
198+
Se audita toda operación de montaje en el
199+
sistema y modificaciones en la memoria de
200+
intercambio.
190201
levels:
191202
- intermediate
192203
- advanced
193204
status: partial
194205
notes: |-
195-
We probably have audit related rule to monitor mount related syscalls, but it is not clear
196-
about the swap. Is the intention to monitor when swap is changed?
206+
We probably have audit related rule to monitor
207+
mount related syscalls, but it is not clear
208+
about the swap. Is the intention to monitor
209+
when swap is changed?
197210
rules:
198211
- audit_rules_media_export
199212

@@ -204,23 +217,31 @@ controls:
204217
- advanced
205218
status: pending
206219
notes: |-
207-
The intention here is probably to audit changes in /etc/pam.d files, but we need to confirm
220+
The intention here is probably to audit changes
221+
in /etc/pam.d files, but we need to confirm
208222
this assumption and get more context.
209223
210224
- id: A.4.SEC-RHEL1
211-
title: Common Users Do Dot Have Local Administrator Permissions and Are Not Included in a Sudo
225+
title: >-
226+
Common Users Do Dot Have Local Administrator
227+
Permissions and Are Not Included in a Sudo
212228
Group
213-
original_title: Los usuarios estándar no disponen de permisos de administrador local ni se encuentran
229+
original_title: >-
230+
Los usuarios estándar no disponen de permisos
231+
de administrador local ni se encuentran
214232
incluidos en un grupo sudoer.
215233
levels:
216234
- basic
217235
- intermediate
218236
- advanced
219237
status: pending
220238
notes: |-
221-
It is a little tricky to interpret this requirement. Assuming the "Common users" are actually
222-
interactive users, this requirement would automatically enforce all admin actions to be
223-
performed only by the root user. I am not sure if this is the intetion here.
239+
It is a little tricky to interpret this
240+
requirement. Assuming the "Common users" are
241+
actually interactive users, this requirement
242+
would automatically enforce all admin actions
243+
to be performed only by the root user. I am
244+
not sure if this is the intetion here.
224245
225246
- id: A.4.SEC-RHEL2
226247
title: The System Has an Updated Antivirus
@@ -231,9 +252,11 @@ controls:
231252
- advanced
232253
status: pending
233254
notes: |-
234-
New templated rule is necessary to install the package. But to ensure the chosen antivirus
235-
is actually updated would demand a more complex rule. Maybe this requirement can have at
236-
leastthe partial status after the templated rule.
255+
New templated rule is necessary to install the
256+
package. But to ensure the chosen antivirus
257+
is actually updated would demand a more complex
258+
rule. Maybe this requirement can have at least
259+
the partial status after the templated rule.
237260
238261
- id: A.4.SEC-RHEL3
239262
title: Permissions by Partitions Are Modified
@@ -266,7 +289,9 @@ controls:
266289

267290
- id: A.5.SEC-RHEL2
268291
title: Elevation Attempts Are Controlled by Defining Users and Sudoer Groups
269-
original_title: Se controlan los intentos de elevación mediante definición de usuarios y grupos
292+
original_title: >-
293+
Se controlan los intentos de elevación
294+
mediante definición de usuarios y grupos
270295
sudoers.
271296
levels:
272297
- basic
@@ -286,7 +311,9 @@ controls:
286311
- advanced
287312
status: pending
288313
notes: |-
289-
There are rules for ssh_keys, for example. We need to confirm the scope of this requirement
314+
There are rules for ssh_keys, for example.
315+
We need to confirm the scope of this
316+
requirement
290317
291318
- id: A.5.SEC-RHEL4
292319
title: Disable Insecure Encryption Algorithms
@@ -374,8 +401,10 @@ controls:
374401

375402
- id: A.6.SEC-RHEL2
376403
title: Access in Recovery Mode Including Grub Boot Modification Mode is Restricted
377-
original_title: Se restringen accesos en modo recuperación incluido el modo modificación de inicio
378-
de grub.
404+
original_title: >-
405+
Se restringen accesos en modo recuperación
406+
incluido el modo modificación de inicio de
407+
grub.
379408
levels:
380409
- basic
381410
- intermediate
@@ -472,7 +501,9 @@ controls:
472501

473502
- id: A.8.SEC-RHEL4
474503
title: Unnecessary Services are Disabled, Reducing the Attack Surface
475-
original_title: Se deshabilitan servicios innecesarios, reduciendo la superficie de exposición.
504+
original_title: >-
505+
Se deshabilitan servicios innecesarios,
506+
reduciendo la superficie de exposición.
476507
levels:
477508
- intermediate
478509
- advanced
@@ -488,6 +519,7 @@ controls:
488519
- package_telnet-server_removed
489520
- package_tftp-server_removed
490521
- package_vsftpd_removed
522+
- service_kdump_disabled
491523

492524
- id: A.8.SEC-RHEL5
493525
title: Application Execution is Controlled
@@ -541,8 +573,10 @@ controls:
541573

542574
- id: A.8.SEC-RHEL7
543575
title: Password Encrypted Boot That Prevents Modification is Enabled (Protected GRUB)
544-
original_title: Está habilitado el arranque cifrado con contraseña que evite modificaciones (GRUB
545-
protegido).
576+
original_title: >-
577+
Está habilitado el arranque cifrado con
578+
contraseña que evite modificaciones
579+
(GRUB protegido).
546580
levels:
547581
- basic
548582
- intermediate
@@ -560,8 +594,9 @@ controls:
560594
- advanced
561595
status: pending
562596
notes: |-
563-
Is it related to downloads from the Internet to the system or from the system to an external
564-
storage, for example?
597+
Is it related to downloads from the Internet
598+
to the system or from the system to an
599+
external storage, for example?
565600
related_rules:
566601
- audit_rules_file_deletion_events_rename
567602
- audit_rules_file_deletion_events_renameat
@@ -622,9 +657,13 @@ controls:
622657
- var_accounts_password_minlen_login_defs=12
623658

624659
- id: A.11.SEC-RHEL4
625-
title: During Login, the System Displays a Text in Compliance With the Organization's Standards
660+
title: >-
661+
During Login, the System Displays a Text in
662+
Compliance With the Organization's Standards
626663
or Directives
627-
original_title: Durante el inicio de sesión, el sistema muestra un texto en cumplimiento con las
664+
original_title: >-
665+
Durante el inicio de sesión, el sistema
666+
muestra un texto en cumplimiento con las
628667
normas o directivas de la organización.
629668
levels:
630669
- basic
@@ -785,7 +824,9 @@ controls:
785824

786825
- id: A.23.SEC-RHEL1
787826
title: The Installation And Use of Any Device Connected to the Equipment is Controlled
788-
original_title: Se controla la instalación y uso de cualquier dispositivo conectado al equipo.
827+
original_title: >-
828+
Se controla la instalación y uso de cualquier
829+
dispositivo conectado al equipo.
789830
levels:
790831
- basic
791832
- intermediate

tests/data/profile_stability/rhel9/ccn_advanced.profile

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -121,6 +121,7 @@ remote_login_banner_text=cis_banners
121121
selinux_policytype
122122
selinux_state
123123
service_firewalld_enabled
124+
service_kdump_disabled
124125
service_nftables_disabled
125126
service_usbguard_enabled
126127
set_firewalld_default_zone

tests/data/profile_stability/rhel9/ccn_intermediate.profile

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,7 @@ remote_login_banner_text=cis_banners
108108
selinux_policytype
109109
selinux_state
110110
service_firewalld_enabled
111+
service_kdump_disabled
111112
service_nftables_disabled
112113
service_usbguard_enabled
113114
set_firewalld_default_zone

0 commit comments

Comments
 (0)