cookbook 'stig', '= 0.4.2'
stig
(39) Versions
0.4.2
-
Follow10
Installs/Configures CIS STIG benchmarks
cookbook 'stig', '= 0.4.2', :supermarket
knife supermarket install stig
knife supermarket download stig
STIG Cookbook
Installs and configures the CIS CentOS Linux 6 benchmark.
These sets of recipes aim to harden the operating system in order to pass all scored CIS benchmarks and optionally all unscored CIS benchmarks.
More information about CIS benchmarks may be found at http://benchmarks.cisecurity.org
Requirements
Platforms
- CentOS 6.6
Cookbooks
- logrotate
Suggests
- auditd, ~> 0.1.8
[Changelog](CHANGELOG.md)
Attributes
node['stig']['grub']['hashedpassword']
= The hashed grub password to use. Ex: openssl passwd -1 ChangeMe (String (MD5 Hash))node['stig']['limits']
= A hash of items that go into /etc/security/limits.conf (Array of Hashes of Hashes)node['stig']['auditd']
= See: Auditd Configurationnode['stig']['mount_disable']['cramfs']
= Disable cramfs filesystem (Boolean)node['stig']['mount_disable']['freevxfs']
= Disable freevxfs filesystem (Boolean)node['stig']['mount_disable']['jffs2']
= Disable jffs2 filesystem (Boolean)node['stig']['mount_disable']['hfs']
= Disable hfs filesystem (Boolean)node['stig']['mount_disable']['hfsplus']
= Disable hfsplus filesystem (Boolean)node['stig']['mount_disable']['squashfs']
= Disable squashfs filesystem (Boolean)node['stig']['mount_disable']['udf']
= Disable udf filesystem (Boolean)node['stig']['mail_transfer_agent']['inet_interfaces']
= Configure Mail Transfer Agent for Local-Only Mode - If the system is intended to be a mail server, change from "localhost" (String)node['stig']['network']['zeroconf']
= Disable Avahi Server (true = disabled, false = enabled) (Boolean)node['stig']['network']['ip_forwarding']
= Disable IP Forwarding (true = enabled, false = disabled) (Boolean)node['stig']['network']['packet_redirects']
= Disable Send Packet Redirects (true = enabled, false = disabled) (Boolean)node['stig']['network']['icmp_redirect_accept']
= Disable ICMP Redirect Acceptance (true = enabled, false = disabled) (Boolean)node['stig']['network']['icmp_all_secure_redirect_accept']
= Disable Secure ICMP Redirect Acceptance (true = enabled, false = disabled) (
Boolean)node['stig']['network']['log_suspicious_packets']
= Log Suspicious Packets (true = enabled, false = disabled) (Boolean)node['stig']['network']['rfc_source_route_validation']
= Enable RFC-recommended Source Route Validation (true = enabled, false = disabled) (Boolean)node['stig']['network']['ipv6_redirect_accept']
= Disable IPv6 Redirect Acceptance (true = enabled, false = disabled) (Boolean)node['stig']['network']['hosts_allow']
= Create /etc/hosts.allow - An array of <net>/<mask> combinations or 'ALL' (Array of String)node['stig']['network']['hosts_deny']
= Create /etc/hosts.deny - An array of <net>/<mask> combinations or 'ALL' (Array of String)node['stig']['network']['disable_dcpp']
= Disable DCCP (true = disable, false = enable) (Boolean)node['stig']['network']['disable_sctp']
= Disable SCTP (true = disable, false = enable) (Boolean)node['stig']['network']['disable_rds']
= Disable RDS (true = disable, false = enable) (Boolean)node['stig']['network']['disable_tipc']
= Disable TIPC (true = disable, false = enable) (Boolean)node['stig']['network']['ipv6']
= Disable IPV6 ("no" = disable, "yes" = enable) (String)node['stig']['logging']['rsyslog_rules']
= Configure /etc/rsyslog.conf - Include rules for logging in array with space separating rule with log location (Array of String)node['stig']['logging']['rsyslog_rules_rhel']
= Configure /etc/rsyslog.conf for RHEL - Include rules for logging in array with space separating rule with log location (Array of String)node['stig']['logging']['rsyslog_rules_debian']
= Configure /etc/rsyslog.conf for Debian - Include rules for logging in array with space separating rule with log location (Array of String)node['stig']['selinux']['enabled']
= By default, SELinux is enabled. However, there may be reasons to shut it off (Boolean)node['stig']['selinux']['status']
= Possible values: enforcing, permissive (String)node['stig']['selinux']['type']
= Possible values: targeted, mls (String)node['stig']['sshd_config']['log_level']
= SSHd log level (String)node['stig']['sshd_config']['max_auth_tries']
= SSHd Max auth tries (Integer)node['stig']['sshd_config']['ignore_rhosts']
= SSHd Ignore rhosts (Boolean)node['stig']['sshd_config']['host_based_auth']
= Set SSH HostbasedAuthentication to No (Boolean)node['stig']['sshd_config']['permit_root_login']
= Allow SSH root login (Boolean)node['stig']['sshd_config']['permit_empty_passwords']
= Allow SSH to permit empty passwords (Boolean)node['stig']['sshd_config']['allow_users_set_env_opts']
= Allow Users to Set Environment Options (Boolean)node['stig']['sshd_config']['banner_path']
= Set SSH login banner path (String)node['stig']['sshd_config']['deny_users']
= List of users to deny SSH login to (Array of String)node['stig']['system_auth']['pass_reuse_limit']
= Limit password reuse - Represents the amount of passwords the user is forced to not reuse (Integer)node['stig']['login_defs']['pass_max_days']
= Password expiration in days (Integer)node['stig']['login_defs']['pass_min_days']
= Minimum wait time, in days, before changing password (Integer)node['stig']['login_defs']['pass_warn_age']
= Number of days before password expires where system begins warning user (Integer)node['stig']['login_banner']['motd']
= Login banner (String)node['stig']['login_banner']['issue']
= Login banner (String)node['stig']['login_banner']['issue_net']
= Login banner (String)node["stig"]["mail_transfer_agent"]["inet_interfaces"]
= The address the the mail transfer agent should listen on (String)
Usage
Simply include the default recipe (stig::default) on an instance that needs to be hardened. May also want to include the auditd recipe (stig::auditd) to set a custom auditd configuration file
Authors
- Author:: Ivan Suftin (isuftin@usgs.gov)
- Author:: David Blodgett (dblodgett@usgs.gov)
License
Unless otherwise noted below, this software is in the public domain because it contains
materials that originally came from the United States Geological Survey, an agency of the
United States Department of Interior. For more information, see the official USGS
copyright policy at: http://www.usgs.gov/visual-id/credit_usgs.html#copyright
More information in license file
Dependent cookbooks
logrotate ~> 1.9.2 |
Contingent cookbooks
There are no cookbooks that are contingent upon this one.
Changelog
0.4.2
-- [isuftin@usgs.gov] - Fix most foodcritic errors and warnings
-- [isuftin@usgs.gov] - CIS 1.6.2 (Configure ExecShield) was removed in 2.0.0 of all CIS STIG. No longer testing for it
-- [isuftin@usgs.gov] - Added updates to SSHD config to allow boolean for password authentication
-- [isuftin@usgs.gov] - Updated system auth recipe to be less destructive to /etc/pam.d/system-auth since that may be updated by authconfig
-- [isuftin@usgs.gov] - Fixed a few tests0.4.1
-- [isuftin@usgs.gov] - Updated sshd config to include approved ciphers (RHEL6 STIG 6.2.11)
-- [isuftin@usgs.gov] - Added the ability to changeChallengeResponseAuthentication
in sshd config
-- [isuftin@usgs.gov] - Added the ability to changeUsePAM
in sshd config0.4.0
-- [isuftin@usgs.gov] - Users may now add auditd rules directly as a series of attributes0.3.11
-- [isuftin@usgs.gov] - More Auditd fixes0.3.10
-- [isuftin@usgs.gov] - Fix auditd default parameters which break the build
-- [isuftin@usgs.gov] - Add documentation for new attributes0.3.9
-- [isuftin@usgs.gov] - Fully parameterized auditd configuration file
-- [isuftin@usgs.gov] - No longer calling the auditd cookbook directly from auditd.rb
-- [isuftin@usgs.gov] - Auditd cookbook is no longer a direct dependency of the STIG cookbook. Should be part of an overall runlist0.3.8
-- [isuftin@usgs.gov] - Updated STIG and Audit rules to CIS RHEL Stig 1.4.0
-- [isuftin@usgs.gov] - Added CentOS 6 ruleset 3.2 - "Remove the X Window System"
-- [isuftin@usgs.gov] - Fixed and added many Serverspec tests
-- [isuftin@usgs.gov] - Corrected a typo incheck_duplicate_gid.sh
to correct STIG control number
-- [isuftin@usgs.gov] - Removed CIS wording from audit scripts
-- [isuftin@usgs.gov] - Enforced permissions on /boot/grub/grub.conf as per STIG 1.5.2
-- [isuftin@usgs.gov] - Removed grub.conf template
-- [isuftin@usgs.gov] - Updated mounting of /dev/shm to be idempotent
Foodcritic Metric
0.4.2 passed this metric
0.4.2 passed this metric