Bug 1921643
| Summary: | Latest RHEL7 STIG (V3R2) is not present in latest version of scap-security-guide. [rhel-7.9.z] | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Gabriel Gaspar Becker <ggasparb> |
| Component: | scap-security-guide | Assignee: | Gabriel Gaspar Becker <ggasparb> |
| Status: | CLOSED ERRATA | QA Contact: | Milan Lysonek <mlysonek> |
| Severity: | medium | Docs Contact: | |
| Priority: | high | ||
| Version: | 7.9 | CC: | ggasparb, jafiala, jreznik, matyc, mhaicman, mlysonek, wsato |
| Target Milestone: | rc | Keywords: | Triaged, ZStream |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | scap-security-guide-0.1.54-2.el7_9 | Doc Type: | Enhancement |
| Doc Text: |
.The RHEL 7 STIG security profile updated to version V3R2
With the RHBA-2021:69417-02 advisory, the `DISA STIG for Red Hat Enterprise Linux 7` profile in the SCAP Security Guide has been updated to the latest version `V3R2`. The profile is now more stable and better aligns with the RHEL7 STIG manual benchmark provided by the Defense Information Systems Agency (DISA).
The following rules have been changed:
CCE-27455-5:: Replaced by CCE-83636-1
CCE-27295-5:: Replaced by CCE-83398-8
CCE-80226-4:: Replaced by CCE-83359-0
CCE-83404-4:: Added to the profile
Use only the current version of this profile because the older versions of this profile are no longer valid. Some rules have been replaced/added, and scans using the `V3R2` version will fail for systems that were hardened using older versions of SCAP Security Guide. You can fix the rules automatically by running the remediation with the new version of SCAP Security Guide.
WARNING: Automatic remediation might render the system non-functional. Run the remediation in a test environment first.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2021-04-27 11:30:11 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Gabriel Gaspar Becker
2021-01-28 11:18:48 UTC
We understand the scope of the changes needed to realign the profile and can act on them. The following upstream pull requests bring the latest STIG V3R2 changes to scap-security-guide package: https://github.com/ComplianceAsCode/content/pull/6541 https://github.com/ComplianceAsCode/content/pull/6546 https://github.com/ComplianceAsCode/content/pull/6537 https://github.com/ComplianceAsCode/content/pull/6534 https://github.com/ComplianceAsCode/content/pull/6564 https://github.com/ComplianceAsCode/content/pull/6576 One last minor fix to STIG ID reference: https://github.com/ComplianceAsCode/content/pull/6628 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (scap-security-guide bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2021:1383 |