@@ -18,26 +18,53 @@ benchmark: UBUNTU20-CIS
1818# # metadata for Audit benchmark
1919benchmark_version : ' v2.0.1'
2020
21- # ## Audit Binary is required on the remote host
21+ # #########################################
22+ # ## Goss is required on the remote host ###
23+ # # Refer to vars/auditd.yml for any other settings ##
24+
25+ # Allow audit to setup the requirements including installing git (if option chosen and downloading and adding goss binary to system)
2226setup_audit : false
27+
28+ # enable audits to run - this runs the audit and get the latest content
29+ run_audit : false
30+
31+ # Only run Audit do not remediate
32+ audit_only : false
33+ # As part of audit_only
34+ # This will enable files to be copied back to control node
35+ fetch_audit_files : false
36+ # Path to copy the files to will create dir structure
37+ audit_capture_files_dir : /some/location to copy to on control node
38+
2339# How to retrieve audit binary
2440# Options are copy or download - detailed settings at the bottom of this file
2541# you will need to access to either github or the file already dowmloaded
2642get_audit_binary_method : download
2743
44+ # # if get_audit_binary_method - copy the following needs to be updated for your environment
45+ # # it is expected that it will be copied from somewhere accessible to the control node
46+ # # e.g copy from ansible control node to remote host
47+ audit_bin_copy_location : /some/accessible/path
48+
2849# how to get audit files onto host options
2950# options are git/copy/get_url other e.g. if you wish to run from already downloaded conf
3051audit_content : git
3152
32- # enable audits to run - this runs the audit and get the latest content
33- run_audit : false
53+ # archive or copy:
54+ audit_conf_copy : " some path to copy from"
55+
56+ # get_url:
57+ audit_files_url : " some url maybe s3?"
3458
3559# Run heavy tests - some tests can have more impact on a system enabling these can have greater impact on a system
3660audit_run_heavy_tests : true
37- # Timeout for those cmds that take longer to run where timeout set
38- audit_cmd_timeout : 60000
3961
40- # ## End Audit enablements ####
62+ # This variable specifies the timeout (in ms) for audit commands that
63+ # take a very long time: if a command takes too long to complete,
64+ # it will be forcefully terminated after the specified duration.
65+ audit_cmd_timeout : 120000
66+
67+ # ## End Goss enablements ####
4168
4269# We've defined complexity-high to mean that we cannot automatically remediate
4370# the rule in question. In the future this might mean that the remediation
@@ -415,7 +442,7 @@ ubtu20cis_dovecot_server: false
415442ubtu20cis_smb_server : false
416443ubtu20cis_squid_server : false
417444ubtu20cis_snmp_server : false
418- ubtu20cis_rsync_server : false
445+ ubtu20cis_rsync_server : mask # Can be set to true, mask or remove depending on requirements
419446ubtu20cis_nis_server : false
420447ubtu20cis_nfs_client : false
421448# rpcbind is required by nfs-common which is required on client and server
@@ -467,15 +494,17 @@ ubtu20cis_aide_cron:
467494 aide_weekday : ' *'
468495
469496# Control 1.4.1
470- # THIS VARIABLE SHOULD BE CHANGED
497+ # THESE VARIABLES SHOULD BE CHANGED
471498# This will fail assertion if not changed and rule 1.4.2 is enabled
472499# insert password as per output of running grub-mkpasswd-pbkdf2
473500# refers to https://help.ubuntu.com/community/Grub2/Passwords
474501
502+ # You maybe changing the root password if grub user root - Ensure you understand the risks
503+ ubtu20cis_set_grub_user_password : false
504+ ubtu20cis_grub_user : root
505+ ubtu20cis_grub_user_passwd : ' $y$j9T$MBA5l/tQyWifM869nQjsi.$cTy0ConcNjIYOn6Cppo5NAky20osrkRxz4fEWA8xac6' # Set to changeme
475506ubtu20cis_set_boot_pass : false
476- ubtu20cis_set_grub_password : true
477507ubtu20cis_grub_user_file : /etc/grub.d/40_custom
478- ubtu20cis_grub_user : root
479508ubtu20cis_grub_file : /boot/grub/grub.cfg
480509
481510# This is used to set the password in grub the full string is required.
@@ -739,51 +768,3 @@ ubtu20cis_sgid_adjust: false
739768# Control 6.2.5 Allow ansible to adjust world-writable files. False will just display world-writable files, True will remove world-writable
740769# ubtu20cis_passwd_label: "{{ (this_item | default(item)).id }}: {{ (this_item | default(item)).dir }}"
741770ubtu20cis_passwd_label : " {{ (this_item | default(item)).id }}: {{ (this_item | default(item)).dir }}"
742-
743- # ### Audit Configuration Settings ####
744-
745- # ## Audit binary settings ###
746- audit_bin_version :
747- release : v0.3.23
748- checksum : ' sha256:9e9f24e25f86d6adf2e669a9ffbe8c3d7b9b439f5f877500dea02ba837e10e4d'
749- audit_bin_path : /usr/local/bin/
750- audit_bin : " {{ audit_bin_path }}goss"
751- audit_format : json
752-
753- # if get_audit_binary_method == download change accordingly
754- audit_bin_url : " https://github.com/aelsabbahy/goss/releases/download/{{ audit_bin_version.release }}/goss-linux-amd64"
755-
756- # # if get_audit_binary_method - copy the following needs to be updated for your environment
757- # # it is expected that it will be copied from somewhere accessible to the control node
758- # # e.g copy from ansible control node to remote host
759- audit_bin_copy_location : /some/accessible/path
760-
761- # ## Goss Audit Benchmark file ###
762- # # managed by the control audit_content
763- # git
764- audit_file_git : " https://github.com/ansible-lockdown/{{ benchmark }}-Audit.git"
765- audit_git_version : " benchmark_{{ benchmark_version }}"
766-
767- # archive or copy:
768- audit_conf_copy : " some path to copy from"
769-
770- # get_url:
771- audit_files_url : " some url maybe s3?"
772-
773- # # Goss configuration information
774- # Where the goss configs and outputs are stored
775- audit_out_dir : ' /opt'
776- # Where the goss audit configuration will be stored
777- audit_conf_dir : " {{ audit_out_dir }}/{{ benchmark }}-Audit/"
778-
779- # If changed these can affect other products
780- pre_audit_outfile : " {{ audit_out_dir }}/{{ ansible_hostname }}-{{ benchmark }}_pre_scan_{{ ansible_date_time.epoch }}.{{ audit_format }}"
781- post_audit_outfile : " {{ audit_out_dir }}/{{ ansible_hostname }}-{{ benchmark }}_post_scan_{{ ansible_date_time.epoch }}.{{ audit_format }}"
782-
783- # # The following should not need changing
784- audit_control_file : " {{ audit_conf_dir }}goss.yml"
785- audit_vars_path : " {{ audit_conf_dir }}/vars/{{ ansible_hostname }}.yml"
786- audit_results : |
787- The pre remediation results are: {{ pre_audit_summary }}.
788- The post remediation results are: {{ post_audit_summary }}.
789- Full breakdown can be found in {{ audit_out_dir }}
0 commit comments