Skip to content

Commit fa66171

Browse files
authored
Merge pull request #5 from Eric-Domeier/fix/rules
Fix/rules
2 parents 11a42b6 + fd36c01 commit fa66171

File tree

7 files changed

+48
-31
lines changed

7 files changed

+48
-31
lines changed

controls/stig_al2023.yml

Lines changed: 39 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -209,6 +209,14 @@ controls:
209209
- sudo_remove_nopasswd
210210
status: automated
211211

212+
- id: AZLX-23-002610
213+
levels:
214+
- medium
215+
title: Amazon Linux 2023 must implement nonexecutable data to protect its memory from unauthorized code execution.
216+
rules:
217+
- bios_enable_execution_restrictions
218+
status: automated
219+
212220
- id: AZLX-23-001025
213221
levels:
214222
- medium
@@ -528,20 +536,23 @@ controls:
528536
package.
529537
rules: []
530538
status: pending
539+
531540
- id: AZLX-23-001265
532541
levels:
533542
- medium
534543
title: Amazon Linux 2023 must implement DOD-approved TLS encryption in the
535544
OpenSSL package.
536545
rules: []
537546
status: pending
547+
538548
- id: AZLX-23-001270
539549
levels:
540550
- medium
541551
title: Amazon Linux 2023 must implement a FIPS 140-2/140-3 compliant
542552
systemwide cryptographic policy.
543553
rules: []
544554
status: pending
555+
545556
- id: AZLX-23-001275
546557
levels:
547558
- medium
@@ -552,6 +563,7 @@ controls:
552563
- harden_sshd_ciphers_opensshserver_conf_crypto_policy
553564
- sshd_approved_ciphers=stig_rhel9
554565
status: automated
566+
555567
- id: AZLX-23-001280
556568
levels:
557569
- high
@@ -569,6 +581,7 @@ controls:
569581
title: Amazon Linux 2023 crypto policy must not be overridden.
570582
rules: []
571583
status: pending
584+
572585
- id: AZLX-23-001290
573586
levels:
574587
- medium
@@ -613,8 +626,10 @@ controls:
613626
title: Amazon Linux 2023, for PKI-based authentication, must validate
614627
certificates by constructing a certification path (which includes status
615628
information) to an accepted trust anchor.
616-
rules: []
629+
rules:
630+
- sssd_has_trust_anchor
617631
status: pending
632+
618633
- id: AZLX-23-001315
619634
levels:
620635
- medium
@@ -748,8 +763,10 @@ controls:
748763
- medium
749764
title: Amazon Linux 2023 must be configured to off-load audit records onto a
750765
different system from the system being audited via syslog.
751-
rules: []
752-
status: pending
766+
rules:
767+
- rsyslog_remote_loghost
768+
status: automated
769+
753770
- id: AZLX-23-002065
754771
levels:
755772
- medium
@@ -804,7 +821,8 @@ controls:
804821
title: Amazon Linux 2023 must generate audit records for all account
805822
creations, modifications, disabling, and termination events that affect
806823
/etc/sudoers.d/ directory.
807-
rules: []
824+
rules:
825+
- audit_rules_sudoers_d
808826
status: pending
809827
- id: AZLX-23-002095
810828
levels:
@@ -1017,8 +1035,10 @@ controls:
10171035
title: Amazon Linux 2023 must generate audit records for all account
10181036
creations, modifications, disabling, and termination events that affect
10191037
/etc/passwd.
1020-
rules: []
1038+
rules:
1039+
- audit_rules_usergroup_modification_shadow
10211040
status: pending
1041+
10221042
- id: AZLX-23-002210
10231043
levels:
10241044
- medium
@@ -1034,8 +1054,10 @@ controls:
10341054
title: Amazon Linux 2023 must alert the information system security officer
10351055
(ISSO) and system administrator (SA), at a minimum, in the event of an audit
10361056
processing failure.
1037-
rules: []
1057+
rules:
1058+
- auditd_data_retention_action_mail_acct
10381059
status: pending
1060+
10391061
- id: AZLX-23-002220
10401062
levels:
10411063
- medium
@@ -1051,23 +1073,29 @@ controls:
10511073
- medium
10521074
title: Amazon Linux 2023 audit logs must be group-owned by root or by a
10531075
restricted logging group to prevent unauthorized read access.
1054-
rules: []
1076+
rules:
1077+
- file_group_ownership_var_log_audit
10551078
status: pending
1079+
10561080
- id: AZLX-23-002230
10571081
levels:
10581082
- medium
10591083
title:
10601084
Amazon Linux 2023 audit log directory must be owned by root to prevent
10611085
unauthorized read access.
1062-
rules: []
1086+
rules:
1087+
- file_ownership_var_log_audit_stig
10631088
status: pending
1089+
10641090
- id: AZLX-23-002235
10651091
levels:
10661092
- medium
10671093
title: Amazon Linux 2023 audit logs file must have mode "0600" or less
10681094
permissive to prevent unauthorized access to the audit log.
1069-
rules: []
1095+
rules:
1096+
- file_permissions_var_log_audit
10701097
status: pending
1098+
10711099
- id: AZLX-23-002240
10721100
levels:
10731101
- medium
@@ -1656,6 +1684,7 @@ controls:
16561684
for the appropriate DOD network.
16571685
rules: []
16581686
status: pending
1687+
16591688
- id: AZLX-23-002565
16601689
levels:
16611690
- medium
@@ -1740,13 +1769,7 @@ controls:
17401769
configured on impacted network interfaces.
17411770
rules: []
17421771
status: pending
1743-
- id: AZLX-23-002610
1744-
levels:
1745-
- medium
1746-
title: Amazon Linux 2023 must implement nonexecutable data to protect its
1747-
memory from unauthorized code execution.
1748-
rules: []
1749-
status: pending
1772+
17501773
- id: AZLX-23-002615
17511774
levels:
17521775
- low

linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_FIPS_certified/oval/shared.xml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
The operating system installed on the system is a certified operating system that meets FIPS 140-2 requirements.
55
", rule_title=rule_title) }}}
66
<criteria comment="Installed operating system is a certified operating system" operator="OR">
7+
<extend_definition comment="Installed OS is Al2023" definition_ref="installed_OS_is_al2023" />
78
<extend_definition comment="Installed OS is RHEL8" definition_ref="installed_OS_is_rhel8" />
89
<!--extend_definition comment="Installed OS is RHEL9" definition_ref="installed_OS_is_rhel9" /-->
910
<extend_definition comment="Installed OS is RHCOS4" definition_ref="installed_OS_is_rhcos4" />

linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/oval/shared.xml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
", rule_title=rule_title) }}}
66
<criteria comment="Installed operating system is supported by a vendor" operator="OR">
77
<extend_definition comment="Installed OS is ALMALINUX9" definition_ref="installed_OS_is_almalinux9" />
8+
<extend_definition comment="Installed OS is AL2023" definition_ref="installed_OS_is_al2023" />
89
<extend_definition comment="Installed OS is RHEL8" definition_ref="installed_OS_is_rhel8" />
910
<extend_definition comment="Installed OS is RHEL9" definition_ref="installed_OS_is_rhel9" />
1011
<extend_definition comment="Installed OS is RHEL10" definition_ref="installed_OS_is_rhel10" />

products/al2023/CMakeLists.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ ssg_build_product(${PRODUCT})
99

1010
ssg_build_html_cce_table(${PRODUCT})
1111

12-
ssg_build_html_ref_tables("${PRODUCT}" "table-${PRODUCT}-{ref_id}refs" "anssi;cis;cui;nist;pcidss")
12+
ssg_build_html_ref_tables("${PRODUCT}" "table-${PRODUCT}-{ref_id}refs" "cis;nist")
1313

1414
ssg_build_html_profile_table("table-${PRODUCT}-nistrefs-stig" "${PRODUCT}" "stig" "nist")
1515

1616
ssg_build_html_srgmap_tables(${PRODUCT})
1717

1818
ssg_build_html_stig_tables(${PRODUCT})
19-
ssg_build_html_stig_tables_per_profile(${PRODUCT} "stig")
19+
ssg_build_html_stig_tables_per_profile(${PRODUCT} "stig")

products/al2023/profiles/standard.profile

Lines changed: 0 additions & 12 deletions
This file was deleted.

products/al2023/profiles/stig.profile

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,3 +48,7 @@ selections:
4848
- audit_rules_sysadmin_actions
4949
- audit_rules_kernel_module_loading
5050
- audit_rules_immutable_login_uids
51+
- mount_option_boot_efi_nosuid
52+
- grub2_audit_backlog_limit_argument
53+
- grub2_audit_argument
54+
- file_permissions_var_log_audit

shared/templates/audit_rules_privileged_commands/oval.template

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
{{%- if product in ["almalinux9", "debian12", "debian13", "fedora", "ol7", "ol8", "ol9", "ol10", "rhel8", "rhel9", "rhel10", "sle12", "sle15", "slmicro5", "slmicro6", "ubuntu2204", "ubuntu2404"] %}}
1+
{{%- if product in ["almalinux9", "al2023", "debian12", "debian13", "fedora", "ol7", "ol8", "ol9", "ol10", "rhel8", "rhel9", "rhel10", "sle12", "sle15", "slmicro5", "slmicro6", "ubuntu2204", "ubuntu2404"] %}}
22
{{%- set perm_x="(?:[\s]+-F[\s]+perm=x)" %}}
33
{{%- endif %}}
44
<def-group>

0 commit comments

Comments
 (0)