Bug 1755447 - DISA STIG profile for RHEL-8
Summary: DISA STIG profile for RHEL-8
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: scap-security-guide
Version: 8.4
Hardware: x86_64
OS: Linux
high
urgent
Target Milestone: rc
: 8.0
Assignee: Watson Yuuma Sato
QA Contact: Jan Černý
Jan Fiala
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-09-25 14:14 UTC by amitkuma
Modified: 2020-11-14 06:52 UTC (History)
21 users (show)

Fixed In Version: scap-security-guide-0.1.48-6.el8
Doc Type: Enhancement
Doc Text:
.RHEL 8 now contains the DISA STIG profile Security Technical Implementation Guides (STIG) are a set of baseline recommendations published by the Defense Information Systems Agency (DISA) to harden the security of information systems and software that might otherwise be vulnerable. This release includes the profile and Kickstart file for this security policy. With this enhancement, users can check systems for compliance, remediate systems to be compliant, and install systems compliant with DISA STIG for Red Hat Enterprise Linux 8.
Clone Of:
Environment:
Last Closed: 2020-04-28 15:30:41 UTC
Type: Bug
Target Upstream Version:
jafiala: needinfo+


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 5177781 0 None None None 2020-07-17 20:55:09 UTC
Red Hat Product Errata RHBA-2020:1583 0 None None None 2020-04-28 15:30:58 UTC

Description amitkuma 2019-09-25 14:14:33 UTC
Description of problem:

RHEL-8 does not contain DISA STIG profile separately.

# oscap info --profiles ssg-rhel8-ds.xml
xccdf_org.ssgproject.content_profile_ospp:Protection Profile for General Purpose Operating Systems
xccdf_org.ssgproject.content_profile_pci-dss:PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 

But some rules in ssg-rhel8-ds.xml are written with DISA STIG in mind example:
1. xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification
2. xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading
etc

a. Being said, DISA STIG is more of a derivative of the OSPP profile, Can customer's use OSPP for hardening systems for DISA-STIG standards?
b. if ospp is being worked on to make DISA STIG complaint
    -> In which RHEL version, scap-security-guide version(Current version:0.1.46-1.el8) OSPP profile will contain all rules defined by DISA STIG standards?
c. Or Can we say current scap-security-guide(scap-security-guide-0.1.42-11.el8.noarch.rpm) is fully DISA STIG complaint, If customers harden their system with ospp, their systems are DISA STIG complaint?

Version-Release number of selected component (if applicable):
scap-security-guide-0.1.42-11.el8.noarch.rpm

How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:
RHEL-8 should contain a DISA-STIG complaint profile

Additional info:

Comment 25 errata-xmlrpc 2020-04-28 15:30:41 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:1583


Note You need to log in before you can comment on or make changes to this bug.