@@ -3,7 +3,7 @@ policy: CCN-STIC-610A22
33title : Security Profile Application Guide for Red Hat Enterprise Linux 9
44id : ccn_rhel9
55version : ' 2022-10'
6- source : https://www.ccn-cert.cni.es/pdf/guias/series-ccn-stic/guias-de-acceso-publico-ccn-stic/6768-ccn-stic-610a22-perfilado-de-seguridad-red-hat-enterprise-linux-9-0/file.html
6+ source : https://www.ccn-cert.cni.es/pdf/guias/series-ccn-stic/guias-de-acceso-publico-ccn-stic/6768-ccn-stic-610a22-perfilado-de-seguridad-red-hat-enterprise-linux-9-0/file.html # yamllint disable-line rule:line-length
77
88levels :
99 - id : basic
@@ -121,10 +121,14 @@ controls:
121121 - var_auditd_max_log_file_action=rotate
122122
123123 - id : A.3.SEC-RHEL7
124- title : Modifications to the Sudoers File Are Audited, As Are Changes to Permissions, Users, Groups,
124+ title : >-
125+ Modifications to the Sudoers File Are Audited,
126+ As Are Changes to Permissions, Users, Groups,
125127 and Passwords
126- original_title : Se auditan las modificaciones del fichero sudoers, así como los cambios en permisos,
127- usuarios, grupos y contraseñas.
128+ original_title : >-
129+ Se auditan las modificaciones del fichero sudoers,
130+ así como los cambios en permisos, usuarios,
131+ grupos y contraseñas.
128132 levels :
129133 - basic
130134 - intermediate
@@ -154,15 +158,20 @@ controls:
154158
155159 - id : A.3.SEC-RHEL8
156160 title : Changes to Cron Settings and Scheduled Tasks Including Startup Scripts Are Audited
157- original_title : Se auditan los cambios en la configuración de Cron y en tareas programadas incluyendo
158- los de scripts de inicio.
161+ original_title : >-
162+ Se auditan los cambios en la configuración de
163+ Cron y en tareas programadas incluyendo los de
164+ scripts de inicio.
159165 levels :
160166 - advanced
161167 status : pending
162168 notes : |-
163- Some possible rules were included here but it is not clear if the requirement intends to
164- check more than these rules. We can see if more related rules are available in the project
165- and include everything that makes sense in the context of cron and chrony.
169+ Some possible rules were included here but it is
170+ not clear if the requirement intends to check
171+ more than these rules. We can see if more related
172+ rules are available in the project and include
173+ everything that makes sense in the context of
174+ cron and chrony.
166175 related_rules :
167176 - audit_rules_time_adjtimex
168177 - audit_rules_time_settimeofday
@@ -185,15 +194,19 @@ controls:
185194
186195 - id : A.3.SEC-RHEL10
187196 title : All Mount Operations on the System and Changes to the Swap Are Audited
188- original_title : Se audita toda operación de montaje en el sistema y modificaciones en la memoria
189- de intercambio.
197+ original_title : >-
198+ Se audita toda operación de montaje en el
199+ sistema y modificaciones en la memoria de
200+ intercambio.
190201 levels :
191202 - intermediate
192203 - advanced
193204 status : partial
194205 notes : |-
195- We probably have audit related rule to monitor mount related syscalls, but it is not clear
196- about the swap. Is the intention to monitor when swap is changed?
206+ We probably have audit related rule to monitor
207+ mount related syscalls, but it is not clear
208+ about the swap. Is the intention to monitor
209+ when swap is changed?
197210 rules :
198211 - audit_rules_media_export
199212
@@ -204,23 +217,31 @@ controls:
204217 - advanced
205218 status : pending
206219 notes : |-
207- The intention here is probably to audit changes in /etc/pam.d files, but we need to confirm
220+ The intention here is probably to audit changes
221+ in /etc/pam.d files, but we need to confirm
208222 this assumption and get more context.
209223
210224 - id : A.4.SEC-RHEL1
211- title : Common Users Do Dot Have Local Administrator Permissions and Are Not Included in a Sudo
225+ title : >-
226+ Common Users Do Dot Have Local Administrator
227+ Permissions and Are Not Included in a Sudo
212228 Group
213- original_title : Los usuarios estándar no disponen de permisos de administrador local ni se encuentran
229+ original_title : >-
230+ Los usuarios estándar no disponen de permisos
231+ de administrador local ni se encuentran
214232 incluidos en un grupo sudoer.
215233 levels :
216234 - basic
217235 - intermediate
218236 - advanced
219237 status : pending
220238 notes : |-
221- It is a little tricky to interpret this requirement. Assuming the "Common users" are actually
222- interactive users, this requirement would automatically enforce all admin actions to be
223- performed only by the root user. I am not sure if this is the intetion here.
239+ It is a little tricky to interpret this
240+ requirement. Assuming the "Common users" are
241+ actually interactive users, this requirement
242+ would automatically enforce all admin actions
243+ to be performed only by the root user. I am
244+ not sure if this is the intetion here.
224245
225246 - id : A.4.SEC-RHEL2
226247 title : The System Has an Updated Antivirus
@@ -231,9 +252,11 @@ controls:
231252 - advanced
232253 status : pending
233254 notes : |-
234- New templated rule is necessary to install the package. But to ensure the chosen antivirus
235- is actually updated would demand a more complex rule. Maybe this requirement can have at
236- leastthe partial status after the templated rule.
255+ New templated rule is necessary to install the
256+ package. But to ensure the chosen antivirus
257+ is actually updated would demand a more complex
258+ rule. Maybe this requirement can have at least
259+ the partial status after the templated rule.
237260
238261 - id : A.4.SEC-RHEL3
239262 title : Permissions by Partitions Are Modified
@@ -266,7 +289,9 @@ controls:
266289
267290 - id : A.5.SEC-RHEL2
268291 title : Elevation Attempts Are Controlled by Defining Users and Sudoer Groups
269- original_title : Se controlan los intentos de elevación mediante definición de usuarios y grupos
292+ original_title : >-
293+ Se controlan los intentos de elevación
294+ mediante definición de usuarios y grupos
270295 sudoers.
271296 levels :
272297 - basic
@@ -286,7 +311,9 @@ controls:
286311 - advanced
287312 status : pending
288313 notes : |-
289- There are rules for ssh_keys, for example. We need to confirm the scope of this requirement
314+ There are rules for ssh_keys, for example.
315+ We need to confirm the scope of this
316+ requirement
290317
291318 - id : A.5.SEC-RHEL4
292319 title : Disable Insecure Encryption Algorithms
@@ -374,8 +401,10 @@ controls:
374401
375402 - id : A.6.SEC-RHEL2
376403 title : Access in Recovery Mode Including Grub Boot Modification Mode is Restricted
377- original_title : Se restringen accesos en modo recuperación incluido el modo modificación de inicio
378- de grub.
404+ original_title : >-
405+ Se restringen accesos en modo recuperación
406+ incluido el modo modificación de inicio de
407+ grub.
379408 levels :
380409 - basic
381410 - intermediate
@@ -472,7 +501,9 @@ controls:
472501
473502 - id : A.8.SEC-RHEL4
474503 title : Unnecessary Services are Disabled, Reducing the Attack Surface
475- original_title : Se deshabilitan servicios innecesarios, reduciendo la superficie de exposición.
504+ original_title : >-
505+ Se deshabilitan servicios innecesarios,
506+ reduciendo la superficie de exposición.
476507 levels :
477508 - intermediate
478509 - advanced
@@ -488,6 +519,7 @@ controls:
488519 - package_telnet-server_removed
489520 - package_tftp-server_removed
490521 - package_vsftpd_removed
522+ - service_kdump_disabled
491523
492524 - id : A.8.SEC-RHEL5
493525 title : Application Execution is Controlled
@@ -541,8 +573,10 @@ controls:
541573
542574 - id : A.8.SEC-RHEL7
543575 title : Password Encrypted Boot That Prevents Modification is Enabled (Protected GRUB)
544- original_title : Está habilitado el arranque cifrado con contraseña que evite modificaciones (GRUB
545- protegido).
576+ original_title : >-
577+ Está habilitado el arranque cifrado con
578+ contraseña que evite modificaciones
579+ (GRUB protegido).
546580 levels :
547581 - basic
548582 - intermediate
@@ -560,8 +594,9 @@ controls:
560594 - advanced
561595 status : pending
562596 notes : |-
563- Is it related to downloads from the Internet to the system or from the system to an external
564- storage, for example?
597+ Is it related to downloads from the Internet
598+ to the system or from the system to an
599+ external storage, for example?
565600 related_rules :
566601 - audit_rules_file_deletion_events_rename
567602 - audit_rules_file_deletion_events_renameat
@@ -622,9 +657,13 @@ controls:
622657 - var_accounts_password_minlen_login_defs=12
623658
624659 - id : A.11.SEC-RHEL4
625- title : During Login, the System Displays a Text in Compliance With the Organization's Standards
660+ title : >-
661+ During Login, the System Displays a Text in
662+ Compliance With the Organization's Standards
626663 or Directives
627- original_title : Durante el inicio de sesión, el sistema muestra un texto en cumplimiento con las
664+ original_title : >-
665+ Durante el inicio de sesión, el sistema
666+ muestra un texto en cumplimiento con las
628667 normas o directivas de la organización.
629668 levels :
630669 - basic
@@ -785,7 +824,9 @@ controls:
785824
786825 - id : A.23.SEC-RHEL1
787826 title : The Installation And Use of Any Device Connected to the Equipment is Controlled
788- original_title : Se controla la instalación y uso de cualquier dispositivo conectado al equipo.
827+ original_title : >-
828+ Se controla la instalación y uso de cualquier
829+ dispositivo conectado al equipo.
789830 levels :
790831 - basic
791832 - intermediate
0 commit comments