Blame SOURCES/scap-security-guide-0.1.58-RHEL_08_010360-PR_7209.patch

362bfa
From 386f9787ceac9b0fc732bcd5fd5f7174254922b3 Mon Sep 17 00:00:00 2001
362bfa
From: Matthew Burket <mburket@redhat.com>
362bfa
Date: Thu, 15 Jul 2021 14:33:44 -0500
362bfa
Subject: [PATCH]  Update 'Configure Notification of Post-AIDE Scan Details'
362bfa
362bfa
Added
362bfa
- Ansible fix for this rule
362bfa
- Configurable email for sending notification email for AIDE alerts
362bfa
---
362bfa
 .../aide_scan_notification/ansible/shared.yml | 28 +++++++++++++++++++
362bfa
 .../aide_scan_notification/bash/shared.sh     | 18 ++++++++----
362bfa
 .../aide/aide_scan_notification/rule.yml      |  2 ++
362bfa
 .../var_aide_scan_notification_email.var      | 16 +++++++++++
362bfa
 4 files changed, 58 insertions(+), 6 deletions(-)
362bfa
 create mode 100644 linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/ansible/shared.yml
362bfa
 create mode 100644 linux_os/guide/system/software/integrity/software-integrity/var_aide_scan_notification_email.var
362bfa
362bfa
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/ansible/shared.yml b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/ansible/shared.yml
362bfa
new file mode 100644
362bfa
index 00000000000..5c11fc1719e
362bfa
--- /dev/null
362bfa
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/ansible/shared.yml
362bfa
@@ -0,0 +1,28 @@
362bfa
+# platform = Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Virtualization 4,multi_platform_wrlinux,multi_platform_ol,multi_platform_sle
362bfa
+# reboot = false
362bfa
+# strategy = restrict
362bfa
+# complexity = low
362bfa
+# disruption = low
362bfa
+{{% if product in ["sle12", "sle15"] %}}
362bfa
+    {{% set aide_path = "/usr/bin/aide" %}}
362bfa
+{{% else %}}
362bfa
+    {{% set aide_path = "/usr/sbin/aide" %}}
362bfa
+{{% endif %}}
362bfa
+
362bfa
+- (xccdf-var var_aide_scan_notification_email)
362bfa
+
362bfa
+- name: "Ensure AIDE is installed"
362bfa
+  package:
362bfa
+    name: "{{ item }}"
362bfa
+    state: present
362bfa
+  with_items:
362bfa
+    - aide
362bfa
+
362bfa
+- name: "{{{ rule_title }}}"
362bfa
+  cron:
362bfa
+    name: "run AIDE check"
362bfa
+    minute: 05
362bfa
+    hour: 04
362bfa
+    weekday: 0
362bfa
+    user: root
362bfa
+    job: '{{{aide_path}}}  --check | /bin/mail -s "$(hostname) - AIDE Integrity Check" {{ var_aide_scan_notification_email }}'
362bfa
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/bash/shared.sh b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/bash/shared.sh
362bfa
index 2f129e568b2..3cb8b72a0bd 100644
362bfa
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/bash/shared.sh
362bfa
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/bash/shared.sh
362bfa
@@ -1,6 +1,16 @@
362bfa
 # platform = multi_platform_all
362bfa
 
362bfa
+. /usr/share/scap-security-guide/remediation_functions
362bfa
+
362bfa
 {{{ bash_package_install("aide") }}}
362bfa
+{{{ bash_instantiate_variables("var_aide_scan_notification_email") }}}
362bfa
+{{% if product in ["sle12", "sle15"] %}}
362bfa
+    {{% set aide_path = "/usr/bin/aide" %}}
362bfa
+{{% else %}}
362bfa
+    {{% set aide_path = "/usr/sbin/aide" %}}
362bfa
+{{% endif %}}
362bfa
+
362bfa
+
362bfa
 
362bfa
 CRONTAB=/etc/crontab
362bfa
 CRONDIRS='/etc/cron.d /etc/cron.daily /etc/cron.weekly /etc/cron.monthly'
362bfa
@@ -14,11 +24,7 @@ if [ -f /var/spool/cron/root ]; then
362bfa
 	VARSPOOL=/var/spool/cron/root
362bfa
 fi
362bfa
 
362bfa
-if ! grep -qR '^.*\/usr\/sbin\/aide\s*\-\-check.*|.*\/bin\/mail\s*-s\s*".*"\s*root@.*$' $CRONTAB_EXIST $VARSPOOL $CRONDIRS; then
362bfa
-{{% if product in ["sle12", "sle15"] %}}
362bfa
-	echo '0 5 * * * root /usr/bin/aide  --check | /bin/mail -s "$(hostname) - AIDE Integrity Check" root@localhost' >> $CRONTAB
362bfa
-{{% else %}}
362bfa
-	echo '0 5 * * * root /usr/sbin/aide  --check | /bin/mail -s "$(hostname) - AIDE Integrity Check" root@localhost' >> $CRONTAB
362bfa
-{{% endif %}}
362bfa
+if ! grep -qR '^.*{{{aide_path}}}\s*\-\-check.*|.*\/bin\/mail\s*-s\s*".*"\s*.*@.*$' $CRONTAB_EXIST $VARSPOOL $CRONDIRS; then
362bfa
+	echo "0 5 * * * root {{{ aide_path }}}  --check | /bin/mail -s \"\$(hostname) - AIDE Integrity Check\" $var_aide_scan_notification_email" >> $CRONTAB
362bfa
 fi
362bfa
 
362bfa
diff --git a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/rule.yml b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/rule.yml
362bfa
index 51dae72ee6d..cb35c5c642d 100644
362bfa
--- a/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/rule.yml
362bfa
+++ b/linux_os/guide/system/software/integrity/software-integrity/aide/aide_scan_notification/rule.yml
362bfa
@@ -57,3 +57,5 @@ ocil: |-
362bfa
     
$ grep aide /etc/crontab
362bfa
     The output should return something similar to the following:
362bfa
     
05 4 * * * root /usr/sbin/aide --check | /bin/mail -s "$(hostname) - AIDE Integrity Check" root@localhost
362bfa
+    The email address that the notifications are sent to can be changed by overriding
362bfa
+    
<sub idref="var_aide_scan_notification_email" />
.
362bfa
diff --git a/linux_os/guide/system/software/integrity/software-integrity/var_aide_scan_notification_email.var b/linux_os/guide/system/software/integrity/software-integrity/var_aide_scan_notification_email.var
362bfa
new file mode 100644
362bfa
index 00000000000..75b9f5d2650
362bfa
--- /dev/null
362bfa
+++ b/linux_os/guide/system/software/integrity/software-integrity/var_aide_scan_notification_email.var
362bfa
@@ -0,0 +1,16 @@
362bfa
+documentation_complete: true
362bfa
+
362bfa
+title: Integrity Scan Notification Email Address
362bfa
+
362bfa
+description: |-
362bfa
+    Specify the email address for designated personnel if baseline
362bfa
+    configurations are changed in an unauthorized manner.
362bfa
+
362bfa
+type: string
362bfa
+
362bfa
+operator: equals
362bfa
+
362bfa
+interactive: true
362bfa
+
362bfa
+options:
362bfa
+    default: root@localhost