Blame SOURCES/scap-security-guide-0.1.49-update-ospp-baseline-package-list.patch

54c0d5
From 38cc9c9eb785f17fbc23a2e7ccbb9902d069f4b3 Mon Sep 17 00:00:00 2001
54c0d5
From: Vojtech Polasek <vpolasek@redhat.com>
54c0d5
Date: Mon, 10 Feb 2020 16:16:17 +0100
54c0d5
Subject: [PATCH 1/4] create new rules, add missing reference to older rule
54c0d5
54c0d5
---
54c0d5
 .../rule.yml                                  | 26 +++++++++++++++
54c0d5
 .../package_openssh-server_installed/rule.yml |  1 +
54c0d5
 .../rule.yml                                  | 32 +++++++++++++++++++
54c0d5
 .../rule.yml                                  | 29 +++++++++++++++++
54c0d5
 5 files changed, 88 insertions(+), 3 deletions(-)
54c0d5
 create mode 100644 linux_os/guide/services/ssh/package_openssh-clients_installed/rule.yml
54c0d5
 create mode 100644 linux_os/guide/system/selinux/package_policycoreutils-python-utils_installed/rule.yml
54c0d5
 create mode 100644 linux_os/guide/system/software/integrity/crypto/package_crypto-policies_installed/rule.yml
54c0d5
54c0d5
diff --git a/linux_os/guide/services/ssh/package_openssh-clients_installed/rule.yml b/linux_os/guide/services/ssh/package_openssh-clients_installed/rule.yml
54c0d5
new file mode 100644
54c0d5
index 0000000000..9b3c55f23b
54c0d5
--- /dev/null
54c0d5
+++ b/linux_os/guide/services/ssh/package_openssh-clients_installed/rule.yml
54c0d5
@@ -0,0 +1,26 @@
54c0d5
+documentation_complete: true
54c0d5
+
54c0d5
+prodtype: rhel8
54c0d5
+
54c0d5
+title: 'Install OpenSSH client software'
54c0d5
+
54c0d5
+description: |-
54c0d5
+    {{{ describe_package_install(package="openssh-clients") }}}
54c0d5
+
54c0d5
+rationale: 'The <tt>openssh-clients</tt> package needs to be installed to meet OSPP criteria.'
54c0d5
+
54c0d5
+severity: medium
54c0d5
+
54c0d5
+identifiers:
54c0d5
+    cce@rhel8: 82722-0
54c0d5
+
54c0d5
+references:
54c0d5
+    srg: SRG-OS-000480-GPOS-00227
54c0d5
+    ospp: FIA_UAU.5,FTP_ITC_EXT.1
54c0d5
+
54c0d5
+{{{ complete_ocil_entry_package(package='openssh-clients') }}}
54c0d5
+
54c0d5
+template:
54c0d5
+    name: package_installed
54c0d5
+    vars:
54c0d5
+        pkgname: openssh-clients
54c0d5
diff --git a/linux_os/guide/services/ssh/package_openssh-server_installed/rule.yml b/linux_os/guide/services/ssh/package_openssh-server_installed/rule.yml
54c0d5
index c18e604a5c..ba013ec509 100644
54c0d5
--- a/linux_os/guide/services/ssh/package_openssh-server_installed/rule.yml
54c0d5
+++ b/linux_os/guide/services/ssh/package_openssh-server_installed/rule.yml
54c0d5
@@ -28,6 +28,7 @@ references:
54c0d5
     cobit5: APO01.06,DSS05.02,DSS05.04,DSS05.07,DSS06.02,DSS06.06
54c0d5
     iso27001-2013: A.10.1.1,A.11.1.4,A.11.1.5,A.11.2.1,A.13.1.1,A.13.1.3,A.13.2.1,A.13.2.3,A.13.2.4,A.14.1.2,A.14.1.3,A.6.1.2,A.7.1.1,A.7.1.2,A.7.3.1,A.8.2.2,A.8.2.3,A.9.1.1,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4,A.9.4.5
54c0d5
     cis-csc: 13,14
54c0d5
+    ospp: FIA_UAU.5,FTP_ITC_EXT.1
54c0d5
 
54c0d5
 ocil_clause: 'the package is not installed'
54c0d5
 
54c0d5
diff --git a/linux_os/guide/system/selinux/package_policycoreutils-python-utils_installed/rule.yml b/linux_os/guide/system/selinux/package_policycoreutils-python-utils_installed/rule.yml
54c0d5
new file mode 100644
54c0d5
index 0000000000..6025f0cd33
54c0d5
--- /dev/null
54c0d5
+++ b/linux_os/guide/system/selinux/package_policycoreutils-python-utils_installed/rule.yml
54c0d5
@@ -0,0 +1,32 @@
54c0d5
+documentation_complete: true
54c0d5
+
54c0d5
+prodtype: rhel8
54c0d5
+
54c0d5
+title: 'Install policycoreutils-python-utils package'
54c0d5
+
54c0d5
+description: |-
54c0d5
+    {{{ describe_package_install(package="policycoreutils-python-utils") }}}
54c0d5
+
54c0d5
+rationale: |-
54c0d5
+    Security-enhanced Linux is a feature of the Linux kernel and a number of utilities
54c0d5
+    with enhanced security functionality designed to add mandatory access controls to Linux.
54c0d5
+    The Security-enhanced Linux kernel contains new architectural components originally
54c0d5
+    developed to improve security of the Flask operating system. These architectural components
54c0d5
+    provide general support for the enforcement of many kinds of mandatory access control
54c0d5
+    policies, including those based on the concepts of Type Enforcement, Role-based Access
54c0d5
+    Control, and Multi-level Security. 
54c0d5
+
54c0d5
+severity: medium
54c0d5
+
54c0d5
+identifiers:
54c0d5
+    cce@rhel8: 82724-6
54c0d5
+
54c0d5
+references:
54c0d5
+    srg: SRG-OS-000480-GPOS-00227 
54c0d5
+
54c0d5
+{{{ complete_ocil_entry_package(package='policycoreutils-python-utils') }}}
54c0d5
+
54c0d5
+template:
54c0d5
+    name: package_installed
54c0d5
+    vars:
54c0d5
+        pkgname: policycoreutils-python-utils
54c0d5
diff --git a/linux_os/guide/system/software/integrity/crypto/package_crypto-policies_installed/rule.yml b/linux_os/guide/system/software/integrity/crypto/package_crypto-policies_installed/rule.yml
54c0d5
new file mode 100644
54c0d5
index 0000000000..c418518e7a
54c0d5
--- /dev/null
54c0d5
+++ b/linux_os/guide/system/software/integrity/crypto/package_crypto-policies_installed/rule.yml
54c0d5
@@ -0,0 +1,29 @@
54c0d5
+documentation_complete: true
54c0d5
+
54c0d5
+prodtype: rhel8
54c0d5
+
54c0d5
+title: 'Install crypto-policies package'
54c0d5
+
54c0d5
+description: |-
54c0d5
+    {{{ describe_package_install(package="crypto-policies") }}}
54c0d5
+
54c0d5
+rationale: |-
54c0d5
+    The <tt>crypto-policies</tt> package provides configuration and tools to
54c0d5
+    apply centralizet cryptographic policies for backends such as SSL/TLS libraries.
54c0d5
+    
54c0d5
+
54c0d5
+severity: medium
54c0d5
+
54c0d5
+identifiers:
54c0d5
+    cce@rhel8: 82723-8
54c0d5
+
54c0d5
+references:
54c0d5
+    ospp: FCS_COP*
54c0d5
+    srg: SRG-OS-000396-GPOS-00176,SRG-OS-000393-GPOS-00173,SRG-OS-000394-GPOS-00174
54c0d5
+
54c0d5
+{{{ complete_ocil_entry_package(package='crypto-policies') }}}
54c0d5
+
54c0d5
+template:
54c0d5
+    name: package_installed
54c0d5
+    vars:
54c0d5
+        pkgname: crypto-policies
54c0d5
From 0c54cbf24a83e38c89841d4dc65a5fbe51fd2f99 Mon Sep 17 00:00:00 2001
54c0d5
From: Vojtech Polasek <vpolasek@redhat.com>
54c0d5
Date: Mon, 10 Feb 2020 16:18:03 +0100
54c0d5
Subject: [PATCH 2/4] modify ospp profile
54c0d5
54c0d5
---
54c0d5
 rhel8/profiles/ospp.profile | 10 +++++-----
54c0d5
 1 file changed, 5 insertions(+), 5 deletions(-)
54c0d5
54c0d5
diff --git a/rhel8/profiles/ospp.profile b/rhel8/profiles/ospp.profile
54c0d5
index 4d5a9edd8e..c672066050 100644
54c0d5
--- a/rhel8/profiles/ospp.profile
54c0d5
+++ b/rhel8/profiles/ospp.profile
54c0d5
@@ -169,17 +169,17 @@ selections:
54c0d5
     - package_dnf-plugin-subscription-manager_installed
54c0d5
     - package_firewalld_installed
54c0d5
     - package_iptables_installed
54c0d5
-    - package_libcap-ng-utils_installed
54c0d5
     - package_openscap-scanner_installed
54c0d5
     - package_policycoreutils_installed
54c0d5
     - package_rng-tools_installed
54c0d5
     - package_sudo_installed
54c0d5
     - package_usbguard_installed
54c0d5
-    - package_audispd-plugins_installed
54c0d5
     - package_scap-security-guide_installed
54c0d5
     - package_audit_installed
54c0d5
-    - package_gnutls-utils_installed
54c0d5
-    - package_nss-tools_installed
54c0d5
+    - package_crypto-policies_installed
54c0d5
+    - package_openssh-server_installed
54c0d5
+    - package_openssh-clients_installed
54c0d5
+    - package_policycoreutils-python-utils_installed
54c0d5
 
54c0d5
     ### Remove Prohibited Packages
54c0d5
     - package_sendmail_removed
54c0d5
@@ -316,7 +316,7 @@ selections:
54c0d5
     ## Configure the System to Offload Audit Records to a Log
54c0d5
     ##  Server
54c0d5
     ## AU-4(1) / FAU_GEN.1.1.c
54c0d5
-    - auditd_audispd_syslog_plugin_activated
54c0d5
+    # temporarily dropped
54c0d5
 
54c0d5
     ## Set Logon Warning Banner
54c0d5
     ## AC-8(a) / FMT_MOF_EXT.1
54c0d5
54c0d5
From 105efe3a51118eca22c36771ce22d45778a4c34f Mon Sep 17 00:00:00 2001
54c0d5
From: Vojtech Polasek <vpolasek@redhat.com>
54c0d5
Date: Mon, 10 Feb 2020 16:18:52 +0100
54c0d5
Subject: [PATCH 3/4] add rules to rhel8 stig profile
54c0d5
54c0d5
---
54c0d5
 rhel8/profiles/stig.profile | 3 +++
54c0d5
 1 file changed, 3 insertions(+)
54c0d5
54c0d5
diff --git a/rhel8/profiles/stig.profile b/rhel8/profiles/stig.profile
54c0d5
index 821cc26914..7eb1869a3c 100644
54c0d5
--- a/rhel8/profiles/stig.profile
54c0d5
+++ b/rhel8/profiles/stig.profile
54c0d5
@@ -33,6 +33,9 @@ selections:
54c0d5
     - encrypt_partitions
54c0d5
     - sysctl_net_ipv4_tcp_syncookies
54c0d5
     - clean_components_post_updating
54c0d5
+    - package_audispd-plugins_installed
54c0d5
+    - package_libcap-ng-utils_installed
54c0d5
+    - auditd_audispd_syslog_plugin_activated
54c0d5
 
54c0d5
     # Configure TLS for remote logging
54c0d5
     - package_rsyslog_installed
54c0d5
54c0d5
From 1a5e17c9a6e3cb3ad6cc2cc4601ea49f2f6278ce Mon Sep 17 00:00:00 2001
54c0d5
From: Vojtech Polasek <vpolasek@redhat.com>
54c0d5
Date: Mon, 10 Feb 2020 17:42:43 +0100
54c0d5
Subject: [PATCH 4/4] rephrase some rationales, fix SFR
54c0d5
54c0d5
---
54c0d5
 .../ssh/package_openssh-clients_installed/rule.yml       | 4 +++-
54c0d5
 .../rule.yml                                             | 9 ++-------
54c0d5
 .../crypto/package_crypto-policies_installed/rule.yml    | 8 ++++----
54c0d5
 3 files changed, 9 insertions(+), 12 deletions(-)
54c0d5
54c0d5
diff --git a/linux_os/guide/services/ssh/package_openssh-clients_installed/rule.yml b/linux_os/guide/services/ssh/package_openssh-clients_installed/rule.yml
54c0d5
index 9b3c55f23b..f5b29d32e8 100644
54c0d5
--- a/linux_os/guide/services/ssh/package_openssh-clients_installed/rule.yml
54c0d5
+++ b/linux_os/guide/services/ssh/package_openssh-clients_installed/rule.yml
54c0d5
@@ -7,7 +7,9 @@ title: 'Install OpenSSH client software'
54c0d5
 description: |-
54c0d5
     {{{ describe_package_install(package="openssh-clients") }}}
54c0d5
 
54c0d5
-rationale: 'The <tt>openssh-clients</tt> package needs to be installed to meet OSPP criteria.'
54c0d5
+rationale: |-
54c0d5
+    This package includes utilities to make encrypted connections and transfer
54c0d5
+    files securely to SSH servers. 
54c0d5
 
54c0d5
 severity: medium
54c0d5
 
54c0d5
diff --git a/linux_os/guide/system/selinux/package_policycoreutils-python-utils_installed/rule.yml b/linux_os/guide/system/selinux/package_policycoreutils-python-utils_installed/rule.yml
54c0d5
index 6025f0cd33..7ae7461077 100644
54c0d5
--- a/linux_os/guide/system/selinux/package_policycoreutils-python-utils_installed/rule.yml
54c0d5
+++ b/linux_os/guide/system/selinux/package_policycoreutils-python-utils_installed/rule.yml
54c0d5
@@ -8,13 +8,8 @@ description: |-
54c0d5
     {{{ describe_package_install(package="policycoreutils-python-utils") }}}
54c0d5
 
54c0d5
 rationale: |-
54c0d5
-    Security-enhanced Linux is a feature of the Linux kernel and a number of utilities
54c0d5
-    with enhanced security functionality designed to add mandatory access controls to Linux.
54c0d5
-    The Security-enhanced Linux kernel contains new architectural components originally
54c0d5
-    developed to improve security of the Flask operating system. These architectural components
54c0d5
-    provide general support for the enforcement of many kinds of mandatory access control
54c0d5
-    policies, including those based on the concepts of Type Enforcement, Role-based Access
54c0d5
-    Control, and Multi-level Security. 
54c0d5
+    This package is required to operate and manage an SELinux environment and its policies.
54c0d5
+    It provides utilities such as semanage, audit2allow, audit2why, chcat and sandbox.
54c0d5
 
54c0d5
 severity: medium
54c0d5
 
54c0d5
diff --git a/linux_os/guide/system/software/integrity/crypto/package_crypto-policies_installed/rule.yml b/linux_os/guide/system/software/integrity/crypto/package_crypto-policies_installed/rule.yml
54c0d5
index c418518e7a..bb07f9d617 100644
54c0d5
--- a/linux_os/guide/system/software/integrity/crypto/package_crypto-policies_installed/rule.yml
54c0d5
+++ b/linux_os/guide/system/software/integrity/crypto/package_crypto-policies_installed/rule.yml
54c0d5
@@ -8,9 +8,9 @@ description: |-
54c0d5
     {{{ describe_package_install(package="crypto-policies") }}}
54c0d5
 
54c0d5
 rationale: |-
54c0d5
-    The <tt>crypto-policies</tt> package provides configuration and tools to
54c0d5
-    apply centralizet cryptographic policies for backends such as SSL/TLS libraries.
54c0d5
-    
54c0d5
+    Centralized cryptographic policies simplify applying secure ciphers across an operating system and
54c0d5
+    the applications that run on that operating system. Use of weak or untested encryption algorithms
54c0d5
+    undermines the purposes of utilizing encryption to protect data.
54c0d5
 
54c0d5
 severity: medium
54c0d5
 
54c0d5
@@ -18,7 +18,7 @@ identifiers:
54c0d5
     cce@rhel8: 82723-8
54c0d5
 
54c0d5
 references:
54c0d5
-    ospp: FCS_COP*
54c0d5
+    ospp: FCS_COP.1(1),FCS_COP.1(2),FCS_COP.1(3),FCS_COP.1(4)
54c0d5
     srg: SRG-OS-000396-GPOS-00176,SRG-OS-000393-GPOS-00173,SRG-OS-000394-GPOS-00174
54c0d5
 
54c0d5
 {{{ complete_ocil_entry_package(package='crypto-policies') }}}