Update DISA supplemental roles for RHEL STIG (#238)
This commit is contained in:
@@ -3,7 +3,7 @@ rhel8STIG_stigrule_230225_Manage: True
|
||||
rhel8STIG_stigrule_230225_banner_Line: banner /etc/issue
|
||||
# R-230226 RHEL-08-010050
|
||||
rhel8STIG_stigrule_230226_Manage: True
|
||||
rhel8STIG_stigrule_230226__etc_dconf_db_local_d_01_banner_message_Value: '''You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only.\nBy using this IS (which includes any device attached to this IS), you consent to the following conditions:\n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.\n-At any time, the USG may inspect and seize data stored on this IS.\n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.\n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.'''
|
||||
rhel8STIG_stigrule_230226__etc_dconf_db_local_d_01_banner_message_Value: "''You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only.\nBy using this IS (which includes any device attached to this IS), you consent to the following conditions:\n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.\n-At any time, the USG may inspect and seize data stored on this IS.\n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.\n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.''"
|
||||
# R-230227 RHEL-08-010060
|
||||
rhel8STIG_stigrule_230227_Manage: True
|
||||
rhel8STIG_stigrule_230227__etc_issue_Dest: /etc/issue
|
||||
@@ -43,9 +43,6 @@ rhel8STIG_stigrule_230241_policycoreutils_State: installed
|
||||
# R-230244 RHEL-08-010200
|
||||
rhel8STIG_stigrule_230244_Manage: True
|
||||
rhel8STIG_stigrule_230244_ClientAliveCountMax_Line: ClientAliveCountMax 1
|
||||
# R-230252 RHEL-08-010291
|
||||
rhel8STIG_stigrule_230252_Manage: True
|
||||
rhel8STIG_stigrule_230252__etc_sysconfig_sshd_Line: '# CRYPTO_POLICY='
|
||||
# R-230255 RHEL-08-010294
|
||||
rhel8STIG_stigrule_230255_Manage: True
|
||||
rhel8STIG_stigrule_230255__etc_crypto_policies_back_ends_opensslcnf_config_Line: 'MinProtocol = TLSv1.2'
|
||||
@@ -138,16 +135,9 @@ rhel8STIG_stigrule_230346__etc_security_limits_conf_Line: '* hard maxlogins 10'
|
||||
# R-230347 RHEL-08-020030
|
||||
rhel8STIG_stigrule_230347_Manage: True
|
||||
rhel8STIG_stigrule_230347__etc_dconf_db_local_d_00_screensaver_Value: 'true'
|
||||
# R-230348 RHEL-08-020040
|
||||
rhel8STIG_stigrule_230348_Manage: True
|
||||
rhel8STIG_stigrule_230348_ensure_tmux_is_installed_State: installed
|
||||
rhel8STIG_stigrule_230348__etc_tmux_conf_Line: 'set -g lock-command vlock'
|
||||
# R-230352 RHEL-08-020060
|
||||
rhel8STIG_stigrule_230352_Manage: True
|
||||
rhel8STIG_stigrule_230352__etc_dconf_db_local_d_00_screensaver_Value: 'uint32 900'
|
||||
# R-230353 RHEL-08-020070
|
||||
rhel8STIG_stigrule_230353_Manage: True
|
||||
rhel8STIG_stigrule_230353__etc_tmux_conf_Line: 'set -g lock-after-time 900'
|
||||
# R-230354 RHEL-08-020080
|
||||
rhel8STIG_stigrule_230354_Manage: True
|
||||
rhel8STIG_stigrule_230354__etc_dconf_db_local_d_locks_session_Line: '/org/gnome/desktop/screensaver/lock-delay'
|
||||
@@ -335,8 +325,8 @@ rhel8STIG_stigrule_230438__etc_audit_rules_d_audit_rules_init_module_b32_Line: '
|
||||
rhel8STIG_stigrule_230438__etc_audit_rules_d_audit_rules_init_module_b64_Line: '-a always,exit -F arch=b64 -S init_module,finit_module -F auid>=1000 -F auid!=unset -k module_chng'
|
||||
# R-230439 RHEL-08-030361
|
||||
rhel8STIG_stigrule_230439_Manage: True
|
||||
rhel8STIG_stigrule_230439__etc_audit_rules_d_audit_rules_rename_b32_Line: '-a always,exit -F arch=b32 -S rename -F auid>=1000 -F auid!=unset -k module_chng'
|
||||
rhel8STIG_stigrule_230439__etc_audit_rules_d_audit_rules_rename_b64_Line: '-a always,exit -F arch=b64 -S rename -F auid>=1000 -F auid!=unset -k module_chng'
|
||||
rhel8STIG_stigrule_230439__etc_audit_rules_d_audit_rules_rename_b32_Line: '-a always,exit -F arch=b32 -S rename,unlink,rmdir,renameat,unlinkat -F auid>=1000 -F auid!=unset -k delete'
|
||||
rhel8STIG_stigrule_230439__etc_audit_rules_d_audit_rules_rename_b64_Line: '-a always,exit -F arch=b64 -S rename,unlink,rmdir,renameat,unlinkat -F auid>=1000 -F auid!=unset -k delete'
|
||||
# R-230444 RHEL-08-030370
|
||||
rhel8STIG_stigrule_230444_Manage: True
|
||||
rhel8STIG_stigrule_230444__etc_audit_rules_d_audit_rules__usr_bin_gpasswd_Line: '-a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-gpasswd'
|
||||
@@ -432,7 +422,8 @@ rhel8STIG_stigrule_230527_Manage: True
|
||||
rhel8STIG_stigrule_230527_RekeyLimit_Line: RekeyLimit 1G 1h
|
||||
# R-230529 RHEL-08-040170
|
||||
rhel8STIG_stigrule_230529_Manage: True
|
||||
rhel8STIG_stigrule_230529_systemctl_mask_ctrl_alt_del_target_Command: systemctl mask ctrl-alt-del.target
|
||||
rhel8STIG_stigrule_230529_ctrl_alt_del_target_disable_Enabled: false
|
||||
rhel8STIG_stigrule_230529_ctrl_alt_del_target_mask_Masked: true
|
||||
# R-230531 RHEL-08-040172
|
||||
rhel8STIG_stigrule_230531_Manage: True
|
||||
rhel8STIG_stigrule_230531__etc_systemd_system_conf_Value: 'none'
|
||||
@@ -514,6 +505,9 @@ rhel8STIG_stigrule_244523__usr_lib_systemd_system_emergency_service_Value: '-/us
|
||||
# R-244525 RHEL-08-010201
|
||||
rhel8STIG_stigrule_244525_Manage: True
|
||||
rhel8STIG_stigrule_244525_ClientAliveInterval_Line: ClientAliveInterval 600
|
||||
# R-244526 RHEL-08-010287
|
||||
rhel8STIG_stigrule_244526_Manage: True
|
||||
rhel8STIG_stigrule_244526__etc_sysconfig_sshd_Line: '# CRYPTO_POLICY='
|
||||
# R-244527 RHEL-08-010472
|
||||
rhel8STIG_stigrule_244527_Manage: True
|
||||
rhel8STIG_stigrule_244527_rng_tools_State: installed
|
||||
@@ -526,9 +520,6 @@ rhel8STIG_stigrule_244535__etc_dconf_db_local_d_00_screensaver_Value: 'uint32 5'
|
||||
# R-244536 RHEL-08-020032
|
||||
rhel8STIG_stigrule_244536_Manage: True
|
||||
rhel8STIG_stigrule_244536__etc_dconf_db_local_d_02_login_screen_Value: 'true'
|
||||
# R-244537 RHEL-08-020039
|
||||
rhel8STIG_stigrule_244537_Manage: True
|
||||
rhel8STIG_stigrule_244537_tmux_State: installed
|
||||
# R-244538 RHEL-08-020081
|
||||
rhel8STIG_stigrule_244538_Manage: True
|
||||
rhel8STIG_stigrule_244538__etc_dconf_db_local_d_locks_session_idle_delay_Line: '/org/gnome/desktop/session/idle-delay'
|
||||
|
||||
File diff suppressed because one or more lines are too long
@@ -6,6 +6,25 @@
|
||||
service:
|
||||
name: sshd
|
||||
state: restarted
|
||||
- name: rsyslog_restart
|
||||
service:
|
||||
name: rsyslog
|
||||
state: restarted
|
||||
- name: sysctl_load_settings
|
||||
command: sysctl --system
|
||||
- name: daemon_reload
|
||||
systemd:
|
||||
daemon_reload: true
|
||||
- name: networkmanager_reload
|
||||
service:
|
||||
name: NetworkManager
|
||||
state: reloaded
|
||||
- name: logind_restart
|
||||
service:
|
||||
name: systemd-logind
|
||||
state: restarted
|
||||
- name: with_faillock_enable
|
||||
command: authselect enable-feature with-faillock
|
||||
- name: do_reboot
|
||||
reboot:
|
||||
pre_reboot_delay: 60
|
||||
|
||||
@@ -88,16 +88,6 @@
|
||||
when:
|
||||
- rhel8STIG_stigrule_230244_Manage
|
||||
- "'openssh-server' in packages"
|
||||
# R-230252 RHEL-08-010291
|
||||
- name: stigrule_230252__etc_sysconfig_sshd
|
||||
lineinfile:
|
||||
path: /etc/sysconfig/sshd
|
||||
regexp: '^# CRYPTO_POLICY='
|
||||
line: "{{ rhel8STIG_stigrule_230252__etc_sysconfig_sshd_Line }}"
|
||||
create: yes
|
||||
notify: do_reboot
|
||||
when:
|
||||
- rhel8STIG_stigrule_230252_Manage
|
||||
# R-230255 RHEL-08-010294
|
||||
- name: stigrule_230255__etc_crypto_policies_back_ends_opensslcnf_config
|
||||
lineinfile:
|
||||
@@ -111,6 +101,7 @@
|
||||
- name: stigrule_230256__etc_crypto_policies_back_ends_gnutls_config
|
||||
lineinfile:
|
||||
path: /etc/crypto-policies/back-ends/gnutls.config
|
||||
regexp: '^\+VERS'
|
||||
line: "{{ rhel8STIG_stigrule_230256__etc_crypto_policies_back_ends_gnutls_config_Line }}"
|
||||
create: yes
|
||||
when:
|
||||
@@ -422,20 +413,6 @@
|
||||
when:
|
||||
- rhel8STIG_stigrule_230347_Manage
|
||||
- "'dconf' in packages"
|
||||
# R-230348 RHEL-08-020040
|
||||
- name: stigrule_230348_ensure_tmux_is_installed
|
||||
yum:
|
||||
name: tmux
|
||||
state: "{{ rhel8STIG_stigrule_230348_ensure_tmux_is_installed_State }}"
|
||||
when: rhel8STIG_stigrule_230348_Manage
|
||||
# R-230348 RHEL-08-020040
|
||||
- name: stigrule_230348__etc_tmux_conf
|
||||
lineinfile:
|
||||
path: /etc/tmux.conf
|
||||
line: "{{ rhel8STIG_stigrule_230348__etc_tmux_conf_Line }}"
|
||||
create: yes
|
||||
when:
|
||||
- rhel8STIG_stigrule_230348_Manage
|
||||
# R-230352 RHEL-08-020060
|
||||
- name: stigrule_230352__etc_dconf_db_local_d_00_screensaver
|
||||
ini_file:
|
||||
@@ -448,20 +425,13 @@
|
||||
when:
|
||||
- rhel8STIG_stigrule_230352_Manage
|
||||
- "'dconf' in packages"
|
||||
# R-230353 RHEL-08-020070
|
||||
- name: stigrule_230353__etc_tmux_conf
|
||||
lineinfile:
|
||||
path: /etc/tmux.conf
|
||||
line: "{{ rhel8STIG_stigrule_230353__etc_tmux_conf_Line }}"
|
||||
create: yes
|
||||
when:
|
||||
- rhel8STIG_stigrule_230353_Manage
|
||||
# R-230354 RHEL-08-020080
|
||||
- name: stigrule_230354__etc_dconf_db_local_d_locks_session
|
||||
lineinfile:
|
||||
path: /etc/dconf/db/local.d/locks/session
|
||||
line: "{{ rhel8STIG_stigrule_230354__etc_dconf_db_local_d_locks_session_Line }}"
|
||||
create: yes
|
||||
notify: dconf_update
|
||||
when:
|
||||
- rhel8STIG_stigrule_230354_Manage
|
||||
# R-230357 RHEL-08-020110
|
||||
@@ -610,7 +580,7 @@
|
||||
when:
|
||||
- rhel8STIG_stigrule_230383_Manage
|
||||
# R-230386 RHEL-08-030000
|
||||
- name : stigrule_230386__etc_audit_rules_d_audit_rules_execve_euid_b32
|
||||
- name: stigrule_230386__etc_audit_rules_d_audit_rules_execve_euid_b32
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k execpriv$'
|
||||
@@ -618,7 +588,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230386_Manage
|
||||
# R-230386 RHEL-08-030000
|
||||
- name : stigrule_230386__etc_audit_rules_d_audit_rules_execve_euid_b64
|
||||
- name: stigrule_230386__etc_audit_rules_d_audit_rules_execve_euid_b64
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k execpriv$'
|
||||
@@ -626,7 +596,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230386_Manage
|
||||
# R-230386 RHEL-08-030000
|
||||
- name : stigrule_230386__etc_audit_rules_d_audit_rules_execve_egid_b32
|
||||
- name: stigrule_230386__etc_audit_rules_d_audit_rules_execve_egid_b32
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k execpriv$'
|
||||
@@ -634,7 +604,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230386_Manage
|
||||
# R-230386 RHEL-08-030000
|
||||
- name : stigrule_230386__etc_audit_rules_d_audit_rules_execve_egid_b64
|
||||
- name: stigrule_230386__etc_audit_rules_d_audit_rules_execve_egid_b64
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k execpriv$'
|
||||
@@ -719,7 +689,7 @@
|
||||
when:
|
||||
- rhel8STIG_stigrule_230395_Manage
|
||||
# R-230402 RHEL-08-030121
|
||||
- name : stigrule_230402__etc_audit_rules_d_audit_rules_e2
|
||||
- name: stigrule_230402__etc_audit_rules_d_audit_rules_e2
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-e 2$'
|
||||
@@ -727,7 +697,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230402_Manage
|
||||
# R-230403 RHEL-08-030122
|
||||
- name : stigrule_230403__etc_audit_rules_d_audit_rules_loginuid_immutable
|
||||
- name: stigrule_230403__etc_audit_rules_d_audit_rules_loginuid_immutable
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^--loginuid-immutable$'
|
||||
@@ -735,7 +705,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230403_Manage
|
||||
# R-230404 RHEL-08-030130
|
||||
- name : stigrule_230404__etc_audit_rules_d_audit_rules__etc_shadow
|
||||
- name: stigrule_230404__etc_audit_rules_d_audit_rules__etc_shadow
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-w /etc/shadow -p wa -k identity$'
|
||||
@@ -743,7 +713,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230404_Manage
|
||||
# R-230405 RHEL-08-030140
|
||||
- name : stigrule_230405__etc_audit_rules_d_audit_rules__etc_security_opasswd
|
||||
- name: stigrule_230405__etc_audit_rules_d_audit_rules__etc_security_opasswd
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-w /etc/security/opasswd -p wa -k identity$'
|
||||
@@ -751,7 +721,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230405_Manage
|
||||
# R-230406 RHEL-08-030150
|
||||
- name : stigrule_230406__etc_audit_rules_d_audit_rules__etc_passwd
|
||||
- name: stigrule_230406__etc_audit_rules_d_audit_rules__etc_passwd
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-w /etc/passwd -p wa -k identity$'
|
||||
@@ -759,7 +729,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230406_Manage
|
||||
# R-230407 RHEL-08-030160
|
||||
- name : stigrule_230407__etc_audit_rules_d_audit_rules__etc_gshadow
|
||||
- name: stigrule_230407__etc_audit_rules_d_audit_rules__etc_gshadow
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-w /etc/gshadow -p wa -k identity$'
|
||||
@@ -767,7 +737,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230407_Manage
|
||||
# R-230408 RHEL-08-030170
|
||||
- name : stigrule_230408__etc_audit_rules_d_audit_rules__etc_group
|
||||
- name: stigrule_230408__etc_audit_rules_d_audit_rules__etc_group
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-w /etc/group -p wa -k identity$'
|
||||
@@ -775,7 +745,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230408_Manage
|
||||
# R-230409 RHEL-08-030171
|
||||
- name : stigrule_230409__etc_audit_rules_d_audit_rules__etc_sudoers
|
||||
- name: stigrule_230409__etc_audit_rules_d_audit_rules__etc_sudoers
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-w /etc/sudoers -p wa -k identity$'
|
||||
@@ -783,7 +753,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230409_Manage
|
||||
# R-230410 RHEL-08-030172
|
||||
- name : stigrule_230410__etc_audit_rules_d_audit_rules__etc_sudoers_d_
|
||||
- name: stigrule_230410__etc_audit_rules_d_audit_rules__etc_sudoers_d_
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-w /etc/sudoers.d/ -p wa -k identity$'
|
||||
@@ -797,7 +767,7 @@
|
||||
state: "{{ rhel8STIG_stigrule_230411_audit_State }}"
|
||||
when: rhel8STIG_stigrule_230411_Manage
|
||||
# R-230412 RHEL-08-030190
|
||||
- name : stigrule_230412__etc_audit_rules_d_audit_rules__usr_bin_su
|
||||
- name: stigrule_230412__etc_audit_rules_d_audit_rules__usr_bin_su
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/su -F perm=x -F auid>=1000 -F auid!=unset -k privileged-priv_change$'
|
||||
@@ -805,7 +775,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230412_Manage
|
||||
# R-230413 RHEL-08-030200
|
||||
- name : stigrule_230413__etc_audit_rules_d_audit_rules_lremovexattr_b32_unset
|
||||
- name: stigrule_230413__etc_audit_rules_d_audit_rules_lremovexattr_b32_unset
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b32 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid>=1000 -F auid!=unset -k perm_mod$'
|
||||
@@ -813,7 +783,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230413_Manage
|
||||
# R-230413 RHEL-08-030200
|
||||
- name : stigrule_230413__etc_audit_rules_d_audit_rules_lremovexattr_b64_unset
|
||||
- name: stigrule_230413__etc_audit_rules_d_audit_rules_lremovexattr_b64_unset
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b64 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid>=1000 -F auid!=unset -k perm_mod$'
|
||||
@@ -821,7 +791,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230413_Manage
|
||||
# R-230413 RHEL-08-030200
|
||||
- name : stigrule_230413__etc_audit_rules_d_audit_rules_lremovexattr_b32
|
||||
- name: stigrule_230413__etc_audit_rules_d_audit_rules_lremovexattr_b32
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b32 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid=0 -k perm_mod$'
|
||||
@@ -829,7 +799,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230413_Manage
|
||||
# R-230413 RHEL-08-030200
|
||||
- name : stigrule_230413__etc_audit_rules_d_audit_rules_lremovexattr_b64
|
||||
- name: stigrule_230413__etc_audit_rules_d_audit_rules_lremovexattr_b64
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b64 -S setxattr,fsetxattr,lsetxattr,removexattr,fremovexattr,lremovexattr -F auid=0 -k perm_mod$'
|
||||
@@ -837,7 +807,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230413_Manage
|
||||
# R-230418 RHEL-08-030250
|
||||
- name : stigrule_230418__etc_audit_rules_d_audit_rules__usr_bin_chage
|
||||
- name: stigrule_230418__etc_audit_rules_d_audit_rules__usr_bin_chage
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/chage -F perm=x -F auid>=1000 -F auid!=unset -k privileged-chage$'
|
||||
@@ -845,7 +815,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230418_Manage
|
||||
# R-230419 RHEL-08-030260
|
||||
- name : stigrule_230419__etc_audit_rules_d_audit_rules__usr_bin_chcon
|
||||
- name: stigrule_230419__etc_audit_rules_d_audit_rules__usr_bin_chcon
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/chcon -F perm=x -F auid>=1000 -F auid!=unset -k perm_mod$'
|
||||
@@ -853,7 +823,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230419_Manage
|
||||
# R-230421 RHEL-08-030280
|
||||
- name : stigrule_230421__etc_audit_rules_d_audit_rules__usr_bin_ssh_agent
|
||||
- name: stigrule_230421__etc_audit_rules_d_audit_rules__usr_bin_ssh_agent
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/ssh-agent -F perm=x -F auid>=1000 -F auid!=unset -k privileged-ssh$'
|
||||
@@ -861,7 +831,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230421_Manage
|
||||
# R-230422 RHEL-08-030290
|
||||
- name : stigrule_230422__etc_audit_rules_d_audit_rules__usr_bin_passwd
|
||||
- name: stigrule_230422__etc_audit_rules_d_audit_rules__usr_bin_passwd
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/passwd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-passwd$'
|
||||
@@ -869,7 +839,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230422_Manage
|
||||
# R-230423 RHEL-08-030300
|
||||
- name : stigrule_230423__etc_audit_rules_d_audit_rules__usr_bin_mount
|
||||
- name: stigrule_230423__etc_audit_rules_d_audit_rules__usr_bin_mount
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/mount -F perm=x -F auid>=1000 -F auid!=unset -k privileged-mount$'
|
||||
@@ -877,7 +847,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230423_Manage
|
||||
# R-230424 RHEL-08-030301
|
||||
- name : stigrule_230424__etc_audit_rules_d_audit_rules__usr_bin_umount
|
||||
- name: stigrule_230424__etc_audit_rules_d_audit_rules__usr_bin_umount
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/umount -F perm=x -F auid>=1000 -F auid!=unset -k privileged-mount$'
|
||||
@@ -885,7 +855,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230424_Manage
|
||||
# R-230425 RHEL-08-030302
|
||||
- name : stigrule_230425__etc_audit_rules_d_audit_rules_mount_b32
|
||||
- name: stigrule_230425__etc_audit_rules_d_audit_rules_mount_b32
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b32 -S mount -F auid>=1000 -F auid!=unset -k privileged-mount$'
|
||||
@@ -893,7 +863,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230425_Manage
|
||||
# R-230425 RHEL-08-030302
|
||||
- name : stigrule_230425__etc_audit_rules_d_audit_rules_mount_b64
|
||||
- name: stigrule_230425__etc_audit_rules_d_audit_rules_mount_b64
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b64 -S mount -F auid>=1000 -F auid!=unset -k privileged-mount$'
|
||||
@@ -901,7 +871,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230425_Manage
|
||||
# R-230426 RHEL-08-030310
|
||||
- name : stigrule_230426__etc_audit_rules_d_audit_rules__usr_sbin_unix_update
|
||||
- name: stigrule_230426__etc_audit_rules_d_audit_rules__usr_sbin_unix_update
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/sbin/unix_update -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update$'
|
||||
@@ -909,7 +879,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230426_Manage
|
||||
# R-230427 RHEL-08-030311
|
||||
- name : stigrule_230427__etc_audit_rules_d_audit_rules__usr_sbin_postdrop
|
||||
- name: stigrule_230427__etc_audit_rules_d_audit_rules__usr_sbin_postdrop
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/sbin/postdrop -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update$'
|
||||
@@ -917,7 +887,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230427_Manage
|
||||
# R-230428 RHEL-08-030312
|
||||
- name : stigrule_230428__etc_audit_rules_d_audit_rules__usr_sbin_postqueue
|
||||
- name: stigrule_230428__etc_audit_rules_d_audit_rules__usr_sbin_postqueue
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/sbin/postqueue -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update$'
|
||||
@@ -925,7 +895,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230428_Manage
|
||||
# R-230429 RHEL-08-030313
|
||||
- name : stigrule_230429__etc_audit_rules_d_audit_rules__usr_sbin_semanage
|
||||
- name: stigrule_230429__etc_audit_rules_d_audit_rules__usr_sbin_semanage
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/sbin/semanage -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update$'
|
||||
@@ -933,7 +903,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230429_Manage
|
||||
# R-230430 RHEL-08-030314
|
||||
- name : stigrule_230430__etc_audit_rules_d_audit_rules__usr_sbin_setfiles
|
||||
- name: stigrule_230430__etc_audit_rules_d_audit_rules__usr_sbin_setfiles
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/sbin/setfiles -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update$'
|
||||
@@ -941,7 +911,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230430_Manage
|
||||
# R-230431 RHEL-08-030315
|
||||
- name : stigrule_230431__etc_audit_rules_d_audit_rules__usr_sbin_userhelper
|
||||
- name: stigrule_230431__etc_audit_rules_d_audit_rules__usr_sbin_userhelper
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/sbin/userhelper -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update$'
|
||||
@@ -949,7 +919,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230431_Manage
|
||||
# R-230432 RHEL-08-030316
|
||||
- name : stigrule_230432__etc_audit_rules_d_audit_rules__usr_sbin_setsebool
|
||||
- name: stigrule_230432__etc_audit_rules_d_audit_rules__usr_sbin_setsebool
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/sbin/setsebool -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update$'
|
||||
@@ -957,7 +927,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230432_Manage
|
||||
# R-230433 RHEL-08-030317
|
||||
- name : stigrule_230433__etc_audit_rules_d_audit_rules__usr_sbin_unix_chkpwd
|
||||
- name: stigrule_230433__etc_audit_rules_d_audit_rules__usr_sbin_unix_chkpwd
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-unix-update$'
|
||||
@@ -965,7 +935,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230433_Manage
|
||||
# R-230434 RHEL-08-030320
|
||||
- name : stigrule_230434__etc_audit_rules_d_audit_rules__usr_libexec_openssh_ssh_keysign
|
||||
- name: stigrule_230434__etc_audit_rules_d_audit_rules__usr_libexec_openssh_ssh_keysign
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/libexec/openssh/ssh-keysign -F perm=x -F auid>=1000 -F auid!=unset -k privileged-ssh$'
|
||||
@@ -973,7 +943,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230434_Manage
|
||||
# R-230435 RHEL-08-030330
|
||||
- name : stigrule_230435__etc_audit_rules_d_audit_rules__usr_bin_setfacl
|
||||
- name: stigrule_230435__etc_audit_rules_d_audit_rules__usr_bin_setfacl
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/setfacl -F perm=x -F auid>=1000 -F auid!=unset -k perm_mod$'
|
||||
@@ -981,7 +951,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230435_Manage
|
||||
# R-230436 RHEL-08-030340
|
||||
- name : stigrule_230436__etc_audit_rules_d_audit_rules__usr_sbin_pam_timestamp_check
|
||||
- name: stigrule_230436__etc_audit_rules_d_audit_rules__usr_sbin_pam_timestamp_check
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/sbin/pam_timestamp_check -F perm=x -F auid>=1000 -F auid!=unset -k privileged-pam_timestamp_check$'
|
||||
@@ -989,7 +959,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230436_Manage
|
||||
# R-230437 RHEL-08-030350
|
||||
- name : stigrule_230437__etc_audit_rules_d_audit_rules__usr_bin_newgrp
|
||||
- name: stigrule_230437__etc_audit_rules_d_audit_rules__usr_bin_newgrp
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/newgrp -F perm=x -F auid>=1000 -F auid!=unset -k priv_cmd$'
|
||||
@@ -997,7 +967,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230437_Manage
|
||||
# R-230438 RHEL-08-030360
|
||||
- name : stigrule_230438__etc_audit_rules_d_audit_rules_init_module_b32
|
||||
- name: stigrule_230438__etc_audit_rules_d_audit_rules_init_module_b32
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b32 -S init_module,finit_module -F auid>=1000 -F auid!=unset -k module_chng$'
|
||||
@@ -1005,7 +975,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230438_Manage
|
||||
# R-230438 RHEL-08-030360
|
||||
- name : stigrule_230438__etc_audit_rules_d_audit_rules_init_module_b64
|
||||
- name: stigrule_230438__etc_audit_rules_d_audit_rules_init_module_b64
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b64 -S init_module,finit_module -F auid>=1000 -F auid!=unset -k module_chng$'
|
||||
@@ -1013,23 +983,23 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230438_Manage
|
||||
# R-230439 RHEL-08-030361
|
||||
- name : stigrule_230439__etc_audit_rules_d_audit_rules_rename_b32
|
||||
- name: stigrule_230439__etc_audit_rules_d_audit_rules_rename_b32
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b32 -S rename -F auid>=1000 -F auid!=unset -k module_chng$'
|
||||
regexp: '^-a always,exit -F arch=b32 -S rename,unlink,rmdir,renameat,unlinkat -F auid>=1000 -F auid!=unset -k delete$'
|
||||
line: "{{ rhel8STIG_stigrule_230439__etc_audit_rules_d_audit_rules_rename_b32_Line }}"
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230439_Manage
|
||||
# R-230439 RHEL-08-030361
|
||||
- name : stigrule_230439__etc_audit_rules_d_audit_rules_rename_b64
|
||||
- name: stigrule_230439__etc_audit_rules_d_audit_rules_rename_b64
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b64 -S rename -F auid>=1000 -F auid!=unset -k module_chng$'
|
||||
regexp: '^-a always,exit -F arch=b64 -S rename,unlink,rmdir,renameat,unlinkat -F auid>=1000 -F auid!=unset -k delete$'
|
||||
line: "{{ rhel8STIG_stigrule_230439__etc_audit_rules_d_audit_rules_rename_b64_Line }}"
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230439_Manage
|
||||
# R-230444 RHEL-08-030370
|
||||
- name : stigrule_230444__etc_audit_rules_d_audit_rules__usr_bin_gpasswd
|
||||
- name: stigrule_230444__etc_audit_rules_d_audit_rules__usr_bin_gpasswd
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/gpasswd -F perm=x -F auid>=1000 -F auid!=unset -k privileged-gpasswd$'
|
||||
@@ -1037,7 +1007,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230444_Manage
|
||||
# R-230446 RHEL-08-030390
|
||||
- name : stigrule_230446__etc_audit_rules_d_audit_rules_delete_module_b32
|
||||
- name: stigrule_230446__etc_audit_rules_d_audit_rules_delete_module_b32
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b32 -S delete_module -F auid>=1000 -F auid!=unset -k module_chng$'
|
||||
@@ -1045,7 +1015,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230446_Manage
|
||||
# R-230446 RHEL-08-030390
|
||||
- name : stigrule_230446__etc_audit_rules_d_audit_rules_delete_module_b64
|
||||
- name: stigrule_230446__etc_audit_rules_d_audit_rules_delete_module_b64
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b64 -S delete_module -F auid>=1000 -F auid!=unset -k module_chng$'
|
||||
@@ -1053,7 +1023,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230446_Manage
|
||||
# R-230447 RHEL-08-030400
|
||||
- name : stigrule_230447__etc_audit_rules_d_audit_rules__usr_bin_crontab
|
||||
- name: stigrule_230447__etc_audit_rules_d_audit_rules__usr_bin_crontab
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/crontab -F perm=x -F auid>=1000 -F auid!=unset -k privileged-crontab$'
|
||||
@@ -1061,7 +1031,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230447_Manage
|
||||
# R-230448 RHEL-08-030410
|
||||
- name : stigrule_230448__etc_audit_rules_d_audit_rules__usr_bin_chsh
|
||||
- name: stigrule_230448__etc_audit_rules_d_audit_rules__usr_bin_chsh
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/chsh -F perm=x -F auid>=1000 -F auid!=unset -k priv_cmd$'
|
||||
@@ -1069,7 +1039,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230448_Manage
|
||||
# R-230449 RHEL-08-030420
|
||||
- name : stigrule_230449__etc_audit_rules_d_audit_rules_truncate_EPERM_b32
|
||||
- name: stigrule_230449__etc_audit_rules_d_audit_rules_truncate_EPERM_b32
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b32 -S truncate,ftruncate,creat,open,openat,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access$'
|
||||
@@ -1077,7 +1047,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230449_Manage
|
||||
# R-230449 RHEL-08-030420
|
||||
- name : stigrule_230449__etc_audit_rules_d_audit_rules_truncate_EPERM_b64
|
||||
- name: stigrule_230449__etc_audit_rules_d_audit_rules_truncate_EPERM_b64
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b64 -S truncate,ftruncate,creat,open,openat,open_by_handle_at -F exit=-EPERM -F auid>=1000 -F auid!=unset -k perm_access$'
|
||||
@@ -1085,7 +1055,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230449_Manage
|
||||
# R-230449 RHEL-08-030420
|
||||
- name : stigrule_230449__etc_audit_rules_d_audit_rules_truncate_EACCES_b32
|
||||
- name: stigrule_230449__etc_audit_rules_d_audit_rules_truncate_EACCES_b32
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b32 -S truncate,ftruncate,creat,open,openat,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access$'
|
||||
@@ -1093,7 +1063,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230449_Manage
|
||||
# R-230449 RHEL-08-030420
|
||||
- name : stigrule_230449__etc_audit_rules_d_audit_rules_truncate_EACCES_b64
|
||||
- name: stigrule_230449__etc_audit_rules_d_audit_rules_truncate_EACCES_b64
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b64 -S truncate,ftruncate,creat,open,openat,open_by_handle_at -F exit=-EACCES -F auid>=1000 -F auid!=unset -k perm_access$'
|
||||
@@ -1101,7 +1071,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230449_Manage
|
||||
# R-230455 RHEL-08-030480
|
||||
- name : stigrule_230455__etc_audit_rules_d_audit_rules_chown_b32
|
||||
- name: stigrule_230455__etc_audit_rules_d_audit_rules_chown_b32
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b32 -S chown,fchown,fchownat,lchown -F auid>=1000 -F auid!=unset -k perm_mod$'
|
||||
@@ -1109,7 +1079,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230455_Manage
|
||||
# R-230455 RHEL-08-030480
|
||||
- name : stigrule_230455__etc_audit_rules_d_audit_rules_chown_b64
|
||||
- name: stigrule_230455__etc_audit_rules_d_audit_rules_chown_b64
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b64 -S chown,fchown,fchownat,lchown -F auid>=1000 -F auid!=unset -k perm_mod$'
|
||||
@@ -1117,7 +1087,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230455_Manage
|
||||
# R-230456 RHEL-08-030490
|
||||
- name : stigrule_230456__etc_audit_rules_d_audit_rules_chmod_b32
|
||||
- name: stigrule_230456__etc_audit_rules_d_audit_rules_chmod_b32
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b32 -S chmod,fchmod,fchmodat -F auid>=1000 -F auid!=unset -k perm_mod$'
|
||||
@@ -1125,7 +1095,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230456_Manage
|
||||
# R-230456 RHEL-08-030490
|
||||
- name : stigrule_230456__etc_audit_rules_d_audit_rules_chmod_b64
|
||||
- name: stigrule_230456__etc_audit_rules_d_audit_rules_chmod_b64
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F arch=b64 -S chmod,fchmod,fchmodat -F auid>=1000 -F auid!=unset -k perm_mod$'
|
||||
@@ -1133,7 +1103,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230456_Manage
|
||||
# R-230462 RHEL-08-030550
|
||||
- name : stigrule_230462__etc_audit_rules_d_audit_rules__usr_bin_sudo
|
||||
- name: stigrule_230462__etc_audit_rules_d_audit_rules__usr_bin_sudo
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/sudo -F perm=x -F auid>=1000 -F auid!=unset -k priv_cmd$'
|
||||
@@ -1141,7 +1111,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230462_Manage
|
||||
# R-230463 RHEL-08-030560
|
||||
- name : stigrule_230463__etc_audit_rules_d_audit_rules__usr_sbin_usermod
|
||||
- name: stigrule_230463__etc_audit_rules_d_audit_rules__usr_sbin_usermod
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/sbin/usermod -F perm=x -F auid>=1000 -F auid!=unset -k privileged-usermod$'
|
||||
@@ -1149,7 +1119,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230463_Manage
|
||||
# R-230464 RHEL-08-030570
|
||||
- name : stigrule_230464__etc_audit_rules_d_audit_rules__usr_bin_chacl
|
||||
- name: stigrule_230464__etc_audit_rules_d_audit_rules__usr_bin_chacl
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/chacl -F perm=x -F auid>=1000 -F auid!=unset -k perm_mod$'
|
||||
@@ -1157,7 +1127,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230464_Manage
|
||||
# R-230465 RHEL-08-030580
|
||||
- name : stigrule_230465__etc_audit_rules_d_audit_rules__usr_bin_kmod
|
||||
- name: stigrule_230465__etc_audit_rules_d_audit_rules__usr_bin_kmod
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-a always,exit -F path=/usr/bin/kmod -F perm=x -F auid>=1000 -F auid!=unset -k modules$'
|
||||
@@ -1165,7 +1135,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230465_Manage
|
||||
# R-230466 RHEL-08-030590
|
||||
- name : stigrule_230466__etc_audit_rules_d_audit_rules__var_log_faillock
|
||||
- name: stigrule_230466__etc_audit_rules_d_audit_rules__var_log_faillock
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-w /var/log/faillock -p wa -k logins$'
|
||||
@@ -1173,7 +1143,7 @@
|
||||
notify: auditd_restart
|
||||
when: rhel8STIG_stigrule_230466_Manage
|
||||
# R-230467 RHEL-08-030600
|
||||
- name : stigrule_230467__etc_audit_rules_d_audit_rules__var_log_lastlog
|
||||
- name: stigrule_230467__etc_audit_rules_d_audit_rules__var_log_lastlog
|
||||
lineinfile:
|
||||
path: /etc/audit/rules.d/audit.rules
|
||||
regexp: '^-w /var/log/lastlog -p wa -k logins$'
|
||||
@@ -1296,7 +1266,7 @@
|
||||
when: rhel8STIG_stigrule_230505_Manage
|
||||
# R-230506 RHEL-08-040110
|
||||
- name: check if wireless network adapters are disabled
|
||||
shell: "[[ $(nmcli radio wifi) == 'enabled' ]]"
|
||||
shell: "[[ $(nmcli radio wifi) == 'enabled' ]]"
|
||||
changed_when: False
|
||||
check_mode: no
|
||||
register: cmd_result
|
||||
@@ -1337,13 +1307,33 @@
|
||||
- rhel8STIG_stigrule_230527_Manage
|
||||
- "'openssh-server' in packages"
|
||||
# R-230529 RHEL-08-040170
|
||||
- name: stigrule_230529_systemctl_mask_ctrl_alt_del_target
|
||||
systemd:
|
||||
- name: check if ctrl-alt-del.target is installed
|
||||
shell: ! systemctl list-unit-files | grep "^ctrl-alt-del.target[ \t]\+"
|
||||
changed_when: False
|
||||
check_mode: no
|
||||
register: result
|
||||
failed_when: result.rc > 1
|
||||
- name: stigrule_230529_ctrl_alt_del_target_disable
|
||||
systemd_service:
|
||||
name: ctrl-alt-del.target
|
||||
enabled: no
|
||||
masked: yes
|
||||
enabled: "{{ rhel8STIG_stigrule_230529_ctrl_alt_del_target_disable_Enabled }}"
|
||||
when:
|
||||
- rhel8STIG_stigrule_230529_Manage
|
||||
- result.rc == 0
|
||||
# R-230529 RHEL-08-040170
|
||||
- name: check if ctrl-alt-del.target is installed
|
||||
shell: ! systemctl list-unit-files | grep "^ctrl-alt-del.target[ \t]\+"
|
||||
changed_when: False
|
||||
check_mode: no
|
||||
register: result
|
||||
failed_when: result.rc > 1
|
||||
- name: stigrule_230529_ctrl_alt_del_target_mask
|
||||
systemd_service:
|
||||
name: ctrl-alt-del.target
|
||||
masked: "{{ rhel8STIG_stigrule_230529_ctrl_alt_del_target_mask_Masked }}"
|
||||
when:
|
||||
- rhel8STIG_stigrule_230529_Manage
|
||||
- result.rc == 0
|
||||
# R-230531 RHEL-08-040172
|
||||
- name: stigrule_230531__etc_systemd_system_conf
|
||||
ini_file:
|
||||
@@ -1364,7 +1354,7 @@
|
||||
when: rhel8STIG_stigrule_230533_Manage
|
||||
# R-230535 RHEL-08-040210
|
||||
- name: check if ipv6 is enabled
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
changed_when: False
|
||||
check_mode: no
|
||||
register: cmd_result
|
||||
@@ -1392,7 +1382,7 @@
|
||||
- rhel8STIG_stigrule_230537_Manage
|
||||
# R-230538 RHEL-08-040240
|
||||
- name: check if ipv6 is enabled
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
changed_when: False
|
||||
check_mode: no
|
||||
register: cmd_result
|
||||
@@ -1406,7 +1396,7 @@
|
||||
- cmd_result.rc == 0
|
||||
# R-230539 RHEL-08-040250
|
||||
- name: check if ipv6 is enabled
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
changed_when: False
|
||||
check_mode: no
|
||||
register: cmd_result
|
||||
@@ -1427,7 +1417,7 @@
|
||||
- rhel8STIG_stigrule_230540_Manage
|
||||
# R-230540 RHEL-08-040260
|
||||
- name: check if ipv6 is enabled
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
changed_when: False
|
||||
check_mode: no
|
||||
register: cmd_result
|
||||
@@ -1441,7 +1431,7 @@
|
||||
- cmd_result.rc == 0
|
||||
# R-230541 RHEL-08-040261
|
||||
- name: check if ipv6 is enabled
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
changed_when: False
|
||||
check_mode: no
|
||||
register: cmd_result
|
||||
@@ -1455,7 +1445,7 @@
|
||||
- cmd_result.rc == 0
|
||||
# R-230542 RHEL-08-040262
|
||||
- name: check if ipv6 is enabled
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
changed_when: False
|
||||
check_mode: no
|
||||
register: cmd_result
|
||||
@@ -1476,7 +1466,7 @@
|
||||
- rhel8STIG_stigrule_230543_Manage
|
||||
# R-230544 RHEL-08-040280
|
||||
- name: check if ipv6 is enabled
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
shell: "[[ $(cat /sys/module/ipv6/parameters/disable) == '0' ]]"
|
||||
changed_when: False
|
||||
check_mode: no
|
||||
register: cmd_result
|
||||
@@ -1623,6 +1613,16 @@
|
||||
when:
|
||||
- rhel8STIG_stigrule_244525_Manage
|
||||
- "'openssh-server' in packages"
|
||||
# R-244526 RHEL-08-010287
|
||||
- name: stigrule_244526__etc_sysconfig_sshd
|
||||
lineinfile:
|
||||
path: /etc/sysconfig/sshd
|
||||
regexp: '^# CRYPTO_POLICY='
|
||||
line: "{{ rhel8STIG_stigrule_244526__etc_sysconfig_sshd_Line }}"
|
||||
create: yes
|
||||
notify: do_reboot
|
||||
when:
|
||||
- rhel8STIG_stigrule_244526_Manage
|
||||
# R-244527 RHEL-08-010472
|
||||
- name: stigrule_244527_rng_tools
|
||||
yum:
|
||||
@@ -1663,18 +1663,13 @@
|
||||
when:
|
||||
- rhel8STIG_stigrule_244536_Manage
|
||||
- "'dconf' in packages"
|
||||
# R-244537 RHEL-08-020039
|
||||
- name: stigrule_244537_tmux
|
||||
yum:
|
||||
name: tmux
|
||||
state: "{{ rhel8STIG_stigrule_244537_tmux_State }}"
|
||||
when: rhel8STIG_stigrule_244537_Manage
|
||||
# R-244538 RHEL-08-020081
|
||||
- name: stigrule_244538__etc_dconf_db_local_d_locks_session_idle_delay
|
||||
lineinfile:
|
||||
path: /etc/dconf/db/local.d/locks/session
|
||||
line: "{{ rhel8STIG_stigrule_244538__etc_dconf_db_local_d_locks_session_idle_delay_Line }}"
|
||||
create: yes
|
||||
notify: dconf_update
|
||||
when:
|
||||
- rhel8STIG_stigrule_244538_Manage
|
||||
# R-244539 RHEL-08-020082
|
||||
@@ -1683,6 +1678,7 @@
|
||||
path: /etc/dconf/db/local.d/locks/session
|
||||
line: "{{ rhel8STIG_stigrule_244539__etc_dconf_db_local_d_locks_session_lock_enabled_Line }}"
|
||||
create: yes
|
||||
notify: dconf_update
|
||||
when:
|
||||
- rhel8STIG_stigrule_244539_Manage
|
||||
# R-244542 RHEL-08-030181
|
||||
|
||||
Reference in New Issue
Block a user