Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: PCI or other openscap profiles? #13

Open
symgryph opened this issue May 8, 2017 · 6 comments
Open

Feature Request: PCI or other openscap profiles? #13

symgryph opened this issue May 8, 2017 · 6 comments
Assignees

Comments

@symgryph
Copy link

symgryph commented May 8, 2017

I would be willing to work on this but don't know how to convert say a PCI or a HIPAA compliance profile in the script. Would be willing to work for food.

@fcaviggia fcaviggia self-assigned this May 13, 2017
@fcaviggia
Copy link
Owner

I had planned to add them in here shortly - now that the RHEL STIG is finalized I can add them to the menu and update the classification banners for PCI and HIPPA profiles.

@fcaviggia
Copy link
Owner

There is color scheme associated with the DoD/IC for classification levels - I was thinking about using a light grey or white background with black text for PCI or HIPPA. Any opinions?

@symgryph
Copy link
Author

symgryph commented May 16, 2017 via email

@fcaviggia
Copy link
Owner

Thomas - I'm just going to try to work in the profiles built-in to SCAP Security Guide (SSG) :

# oscap info /usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml

https://static.open-scap.org/openscap-1.0/oscap_user_manual.html#_displaying_information_scap_content

I will also add the classification banners for PCI and HIPPA data on the classification-banner. Selecting those profiles would not allow anything above 'Unclassified' as the STIG would be the general requirement for that.

@symgryph
Copy link
Author

symgryph commented May 17, 2017 via email

@fcaviggia
Copy link
Owner

Thomas,

It's probably something good to think about - I've extended these scripts at MITRE with packer to handle VMs (QEMU/KVM/Xen, VirtualBox, VMware) and AMIs (AWS) - I just have to do all the work to get legal happy (re-doing banners, etc.) with me open sourcing the scripts. I think that might be a good direction to take things as it worked out extremely well for the MITRE project I extended them for.

I have had to redress misconfigurations in SCAP Security Guide hardening quite a bit (usually in the supplemental.sh script) - I haven't had the time to go back and deal with all of those issues in the upstream, which constantly change with every release. I think it's partly a limitation with SCAP, XCCDF, and OVAL (even though they are MITRE standards, it is my opinion that those standards are over-complicated and hard to maintain) - I've been working with Aaron at MITRE (@aaronlippold) to make Chef InSpec as tie in between the security scanning engine and the CM tie in (via Kitchen to Chef, Ansible, Puppet, etc.) after installation. Also Steven (@stephenwb) has some great ideas that I'm interested in implementing in a re-design at some point. I might even totally revamp the hardening scripts that I developed for RHEL 6 into something that work work for RHEL 6/8 - something Steven and I discussed at one point.

At some point, maybe next month I think we need to organize a meet up in DC and try to figure out where things are going and how we can re-organize things

I really only intended that this install be the initial installation proper patching, CM tooling, and continuous monitoring are required to make systems maintainable long term. Just my two cents.

-Frank

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants