Bug 2162803
Summary: | Two CIS Level 2 Benchmarks are listed in scap-security-guide under CIS Level 1 Profile | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | ckrell | |
Component: | scap-security-guide | Assignee: | Vojtech Polasek <vpolasek> | |
Status: | CLOSED ERRATA | QA Contact: | Jiri Jaburek <jjaburek> | |
Severity: | high | Docs Contact: | Jan Fiala <jafiala> | |
Priority: | high | |||
Version: | 8.7 | CC: | abjoshi, ggasparb, jafiala, jjaburek, mhaicman, mlysonek, vpolasek, wsato | |
Target Milestone: | rc | Keywords: | AutoVerified, Triaged, ZStream | |
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | scap-security-guide-0.1.66-1.el8 | Doc Type: | Bug Fix | |
Doc Text: |
.Rules for CIS profiles in `scap-security-guide` are better aligned
Previously, some rules were incorrectly assigned to certain Center for Internet Security (CIS) profiles (`cis`, `cis_server_l1`, `cis_workstation_1`, and `cis_workstation_l2`). As a consequence, scanning according to some CIS profiles could skip rules from the CIS benchmark or check for unnecessary rules.
The following rules were assigned to incorrect profiles:
* Rules `kernel_module_udf_disabled`, `sudo_require_authentication` and `kernel_module_squashfs_disabled` were incorrectly placed in CIS Server Level 1 and CIS Workstation Level 1.
* Rules `package_libselinux_installed`, `grub2_enable_selinux`, `selinux_policytype`, `selinux_confinement_of_daemons`, `rsyslog_nolisten`, `service_systemd-journald_enabled` were missing from CIS Server Level 1 and CIS Workstation Level 1 profiles.
* Rules `package_setroubleshoot_removed` and `package_mcstrans_removed` were missing from the CIS Server Level 1 profile.
This update assigns the misaligned rules to the correct CIS profiles, but does not introduce new rules or entirely removes any rules. As a result, SCAP CIS profiles are better aligned with the original CIS benchmark.
|
Story Points: | --- | |
Clone Of: | ||||
: | 2168072 2168073 2168074 (view as bug list) | Environment: | ||
Last Closed: | 2023-05-16 08:39:41 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 2168072, 2168073, 2168074 |
Description
ckrell
2023-01-21 00:20:46 UTC
Fixed upstrea: https://github.com/ComplianceAsCode/content/pull/10109 Additional fixes relevant to this BZ are in upstream: https://github.com/ComplianceAsCode/content/pull/10155 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (scap-security-guide bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:2869 |