Update RHEL 8 STIG control file to align with DISA STIG v2r6#14375
Update RHEL 8 STIG control file to align with DISA STIG v2r6#14375Mab879 merged 21 commits intoComplianceAsCode:masterfrom
Conversation
|
Skipping CI for Draft Pull Request. |
|
Something is up with the base of this PR. Please review before moving to ready for review. |
|
/packit retest-failed |
40e3731 to
4585e61
Compare
…rver cryptopolicy
handled by special STIG subpolicy
4585e61 to
726cc9f
Compare
|
/packit retest-failed |
Is this expected? |
Per the STIG prose, the requirement does not exist there anymore. Or more exactly, it is covered by implementing proper FIPS crypto policy.
264a30c to
61a9ce6
Compare
|
Make sure you update the profile versions as well. |
|
@vojtapolasek: The following test failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Description:
RHEL-08-010015(high) requiring thecrypto-policiespackage to be installed.RHEL-08-010020with the latest STIG update: replace individual cryptographic policy rules (configure_bind_crypto_policy,enable_dracut_fips_module,sysctl_crypto_fips_enabled, etc.) withfips_crypto_subpolicy,fips_custom_stig_sub_policy, andvar_system_crypto_policy=fips_stig.RHEL-08-010270(cryptographic policy must not be overridden),RHEL-08-010275(DOD-approved encryption in bind), andRHEL-08-010280(FIPS 140-3 for IP tunnels) as separate controls broken out from the previous combinedRHEL-08-010020.RHEL-08-010290,RHEL-08-010291,RHEL-08-010296, andRHEL-08-010297to implement SSH MACs and ciphers via STIG subpolicy instead of individualharden_sshd_*rules.RHEL-08-010293(OpenSSL crypto policy),RHEL-08-010294(OpenSSL TLS crypto policy),RHEL-08-010295(GnuTLS TLS crypto policy),RHEL-08-010287(SSH daemon crypto policy), andRHEL-08-040342(SSH FIPS KEX algorithms).harden_sshd_ciphers_opensshserver_conf_crypto_policy,harden_sshd_macs_opensshserver_conf_crypto_policy,sysctl_crypto_fips_enabled,configure_gnutls_tls_crypto_policy,configure_openssl_tls_crypto_policy,sshd_use_approved_kex_ordered_stig) todefault.profileto keep them in the data stream.stigandstig_guiprofiles and product stability data for rhel8, rhel9, and rhel10.CCE-86459-5) to thefips_custom_stig_sub_policyrule.Rationale:
fips_custom_stig_sub_policy) that enforces all cryptographic requirements through the system-wide crypto policy mechanism. This is a more robust approach that prevents policy drift between components.Review Hints:
./build_product --datastream-only rhel8products/rhel8/controls/stig_rhel8.yml— core STIG control updatesproducts/rhel8/profiles/default.profile— rules moved here to stay in data streamtests/data/profile_stability/rhel8/stig.profile— stability test expectationsshared/references/disa-stig-rhel8-v2r6-xccdf-manual.xml— updated DISA reference contentshared/references/disa-stig-rhel8-v2r6-xccdf-scap.xml— updated DISA reference contentupdate official STIG manual and SCAP content from v2r5 to v2r6Fix cce id conflict with master branchadd new control RHEL-08-010015align RHEL-08-010020 with the latest STIG updatecreate RHEL-08-010275,create RHEL-08-010280,add RHEL-08-010270remove rules from generic control, they were duplicates or no longer neededmodify controls which check for STIG-specific modifications to ssh server cryptopolicymodify controls regarding SSH client macs and ciphers handled by special STIG subpolicyadd rhel8 cce to ruleupdate the default profile to prevent removing rules from datastreamdrop RHEL-08-010287,drop RHEL-08-010293,drop RHEL-08-010294,drop RHEL-08-010295,drop RHEL-08-040342update default profile to keep rules in the data stream