Bug 1821633 - Ship CIS aligned profile in RHEL7
Summary: Ship CIS aligned profile in RHEL7
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: scap-security-guide
Version: 7.7
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: rc
: ---
Assignee: Watson Yuuma Sato
QA Contact: Matus Marhefka
Mirek Jahoda
URL:
Whiteboard:
: 1888915 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-04-07 09:27 UTC by Marek Haicman
Modified: 2021-01-13 08:45 UTC (History)
6 users (show)

Fixed In Version: scap-security-guide-0.1.49-12.el7
Doc Type: Enhancement
Doc Text:
.SCAP Security Guide now provides a profile aligned with the CIS RHEL 7 Benchmark v2.2.0 With this update, the `scap-security-guide` packages provide a profile aligned with the CIS Red Hat Enterprise Linux 7 Benchmark v2.2.0. The profile enables you to harden the configuration of the system using the guidelines by the Center for Internet Security (CIS). As a result, you can configure and automate compliance of your RHEL 7 systems with CIS by using the CIS Ansible Playbook and the CIS SCAP profile. Note that the `rpm_verify_permissions` rule in the CIS profile does not work correctly. See the known issue description xref:BZ-1838622[].
Clone Of:
Environment:
Last Closed: 2020-09-29 19:52:42 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2020:3909 0 None None None 2020-09-29 19:53:00 UTC

Description Marek Haicman 2020-04-07 09:27:11 UTC
Description of problem:
CIS (Center for Internet Security) benchmark is used by the companies across the world. Having the profile aligned with CIS is a usability feature meant to ease the costs of hardening. 

Version-Release number of selected component (if applicable):
N/A

How reproducible:
reliably

Steps to Reproduce:
1. oscap info /usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml
2. should list CIS profile
3. the profile should be sufficiently complete (not needed to be 100%, but 70% +)

Actual results:
No profile is shipped

Expected results:
CIS profile is shipped

Additional info:
C2S profile is INSPIRED by CIS, but contains deliberate changes, as it's not meant to replace CIS. As such it cannot be used to fulfill this request, but can be updated to be (re)implemented as an extension of CIS profile. To highlight all the differences.

Comment 31 errata-xmlrpc 2020-09-29 19:52:42 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (scap-security-guide bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:3909

Comment 32 Marek Haicman 2020-12-01 14:19:19 UTC
*** Bug 1888915 has been marked as a duplicate of this bug. ***

Comment 33 James Hartsock 2021-01-12 18:08:32 UTC
This bug, and the rpm indicate v2.2.0

However, the following documentation states v3.0.0 for xccdf_org.ssgproject.content_profile_cis
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/scap-security-guide-profiles-supported-in-rhel-7_scanning-the-system-for-configuration-compliance-and-vulnerabilities

Which is correct ... or am I understanding versions wrong?

Comment 34 Watson Yuuma Sato 2021-01-13 08:45:07 UTC
Hi James, the correct version is 2.2.0.

I'll get the documentation sorted out, thank you for the comment.


Note You need to log in before you can comment on or make changes to this bug.