Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

added kexec pkg check to 213115 #7

Merged
merged 4 commits into from
Apr 20, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions tasks/Cat2/RHEL-09-21xxxx.yml
Original file line number Diff line number Diff line change
Expand Up @@ -808,6 +808,7 @@
- name: "MEDIUM | RHEL-09-213115 | PATCH | The kdump service on RHEL 9 must be disabled."
when:
- rhel_09_213115
- "'kexec-tools' in ansible_facts.packages"
tags:
- RHEL-09-213115
- CAT2
Expand Down
8 changes: 5 additions & 3 deletions tasks/Cat2/RHEL-09-25xxxx.yml
Original file line number Diff line number Diff line change
Expand Up @@ -195,16 +195,18 @@
- name: "MEDIUM | RHEL-09-251040 | PATCH | RHEL 9 network interfaces must not be in promiscuous mode."
when:
- not rhel9stig_disruption_high
- item not in rhel9stig_promisc_if
- item in rhel9stig_promisc_if
ansible.builtin.debug:
msg: "Warning!! You have interfaces set to promicious mode no in the exception list"
loop: "{{ ansible_facts.interfaces }}"

- name: "MEDIUM | RHEL-09-251040 | PATCH | RHEL 9 network interfaces must not be in promiscuous mode."
when:
- not rhel9stig_disruption_high
- item not in rhel9stig_promisc_if
ansible.builtin.import_tasks:
- item in rhel9stig_promisc_if
ansible.builtin.include_tasks:
file: warning_facts.yml
loop: "{{ ansible_facts.interfaces }}"

- name: "MEDIUM | RHEL-09-251045 | PATCH | RHEL 9 must enable hardening for the Berkeley Packet Filter just-in-time compiler."
when:
Expand Down
22 changes: 7 additions & 15 deletions tasks/Cat2/RHEL-09-65xxxx.yml
Original file line number Diff line number Diff line change
Expand Up @@ -177,7 +177,7 @@

- name: "MEDIUM | RHEL-09-652025 | PATCH | RHEL 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation."
when:
- rhel9stig_rsyslog_conf.matched > 0
- rhel9stig_rsyslog_conf.matched > 1
ansible.builtin.lineinfile:
backrefs: true
line: '#\1\2\3'
Expand Down Expand Up @@ -635,7 +635,8 @@
msg:
- "WARNING!! Below is the path and size of the partition for the audit logs."
- "Please make sure there is enough disk space for 1 week of logs"
- "Path: {{ rhel9stig_audit_conf.logfile }}"
- "Munt: {{ rhel9stig_audit_log_filesystem }}"
- "Logfile: {{ discovered_auditd_logfile.stdout }}"
- "Disk Space remaining: {{ audit_filesystem_space_left }}MB"

- name: "MEDIUM | RHEL-09-653030 | WARN | RHEL 9 must allocate audit record storage capacity to store at least one week's worth of audit records."
Expand Down Expand Up @@ -850,7 +851,7 @@
- auditd
ansible.builtin.file:
owner: root
path: "{{ rhel9stig_audit_log_filesystem }}"
path: "{{ discovered_auditd_logfile.stdout }}"

- name: "MEDIUM | RHEL-09-653090 | PATCH | RHEL 9 audit logs file must have mode 0600 or less permissive to prevent unauthorized access to the audit log."
when:
Expand All @@ -869,18 +870,9 @@
- NIST800-53R4_AU-9
- NIST800-53R4_SI-11
- auditd
block:
- name: "MEDIUM | RHEL-09-653090 | PATCH | RHEL 9 audit logs file must have mode 0600 or less permissive to prevent unauthorized access to the audit log."
ansible.builtin.file:
mode: '0600'
path: "{{ rhel9stig_audit_conf.logfile }}"

- name: "MEDIUM | RHEL-09-653090 | PATCH | RHEL 9 audit logs file must have mode 0600 or less permissive to prevent unauthorized access to the audit log."
ansible.builtin.file:
mode: '0440'
path: "{{ item }}"
with_fileglob:
- "{{ rhel9stig_audit_conf.logfile }}*"
ansible.builtin.file:
mode: go-rwx
path: "{{ discovered_auditd_logfile.stdout }}"

- name: "MEDIUM | RHEL-09-653095 | PATCH | RHEL 9 must periodically flush audit records to disk to prevent the loss of audit records."
when:
Expand Down
11 changes: 11 additions & 0 deletions tasks/prelim.yml
Original file line number Diff line number Diff line change
Expand Up @@ -158,6 +158,17 @@
- SRG-OS-000475-GPOS-00220
- auditd

- name: "PRELIM | Discover auditd_logfile_path"
when:
- rhel_09_653085 or
rhel_09_653085 or
rhel_09_653090
tags:
- always
ansible.builtin.shell: grep ^log_file /etc/audit/auditd.conf | awk '{ print $NF }'
changed_when: false
register: discovered_auditd_logfile

# - name: "PRELIM | Audit conf and rules files | list files"
# ansible.builtin.find:
# path: /etc/audit
Expand Down