Bug 1958789

Summary: Update rhel7 DISA STIG profile to v3r3
Product: Red Hat Enterprise Linux 7 Reporter: Vojtech Polasek <vpolasek>
Component: scap-security-guideAssignee: Vojtech Polasek <vpolasek>
Status: CLOSED ERRATA QA Contact: Matus Marhefka <mmarhefk>
Severity: high Docs Contact: Jan Fiala <jafiala>
Priority: high    
Version: 7.9CC: ggasparb, jafiala, jreznik, mhaicman, mlysonek, wsato
Target Milestone: rcKeywords: Triaged, ZStream
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: scap-security-guide-0.1.54-4.el7_9 Doc Type: Enhancement
Doc Text:
.Profiles for DISA STIG version v3r3 The Defense Information Systems Agency (DISA) has published an updated version of the Secure Technical Implementation Guide (STIG) for RHEL 7 version 3, release 3. The update available with the link:https://access.redhat.com/errata/RHBA-2021:2803[RHBA-2021:2803] advisory: * Aligns all rules within the existing `xccdf_org.ssgproject.content_profile_stig` profile with the latest STIG release. * Adds a new profile `xccdf_org.ssgproject.content_profile_stig_gui` for systems with a graphical user interface (GUI).
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-07-21 01:06:27 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
HTML report from scan of a system installed with STIG profile (minimal install) none

Comment 23 Matus Marhefka 2021-06-23 13:28:03 UTC
Created attachment 1793472 [details]
HTML report from scan of a system installed with STIG profile (minimal install)

Comment 24 Matus Marhefka 2021-06-23 13:31:03 UTC
Verified for scap-security-guide-0.1.54-6.el7_9

Status of STIG profile v3r3:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Rules without Bash and Ansible remediations (remediations are omitted on purpose):
grub2_password
package_MFEhiplsm_installed
install_antivirus
set_firewalld_default_zone
network_configure_name_resolution

Rules with missing Ansible remediations:
aide_verify_ext_attributes
aide_verify_acls
aide_use_fips_hashes
aide_scan_notification
configure_firewalld_ports
postfix_prevent_unrestricted_relay
chronyd_or_ntpd_set_maxpoll
smartcard_auth

Known issues:
rpm_verify_hashes - fails because rule require_singleuser_auth modifies /usr/lib/systemd/system/rescue.service

HTML report from scan of a system installed with STIG profile is attached as
stig.html (minimal install).

Comment 33 errata-xmlrpc 2021-07-21 01:06:27 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (scap-security-guide bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2021:2803