Skip to content
Open

Rhel9 #101

Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
42 commits
Select commit Hold shift + click to select a range
651d3ec
Resource 'file' replaced with 'file_line' to avoid duplicate declarat…
sglusnevs Jun 28, 2023
878e88b
Disabled rules description fixed for the last Hiera
sglusnevs Jun 28, 2023
972dc6f
Rocky Linux 8 rules added
sglusnevs Jun 28, 2023
a70f7c8
Rocky Linux 9 rules added
sglusnevs Jun 28, 2023
c3b19f6
RHEL9 Linux initial rules added
sglusnevs Jun 28, 2023
09a3abf
New rules for RHEL/Rocky 9 added
sglusnevs Jun 28, 2023
2b3f0e5
package_configuration info added
sglusnevs Jun 29, 2023
9e5e6c4
Added Rule Ensure 'audit log files are mode 0640 or less permissive'
sglusnevs Jun 29, 2023
aa931f0
Added benchmark 'Ensure the audit log directory is 0750 or more restr…
sglusnevs Jun 29, 2023
1bc17a6
Added rule 'Ensure audit tools are 755 or more restrictive'
Jul 14, 2023
9d24342
Rule added 'Ensure SSH X11 forwarding is disabled'
Jul 14, 2023
e4d2fc6
Rules added 'Ensure SSH MaxAuthTries is set to 4 or less' and 'Ensure…
Jul 14, 2023
e229e65
Added Rule 'Ensure users must provide password for escalation'
Jul 16, 2023
9de12ef
Fixed rule: 'Ensure re-authentication for privilege escalation is not…
Jul 16, 2023
8e03e76
Added Hiera for RedHat 9 and Rocky 9
sglusnevs Jul 16, 2023
3c65018
Added 'Ensure audit configuration files are 640 or more restrictive'
Jul 14, 2023
411133d
Rule 'Ensure sudo authentication timeout is configured correctly' imp…
Jul 23, 2023
47cb417
Added Rule 'Ensure password hashing algorithm is SHA-512 or yescrypt'
Jul 23, 2023
cd08464
Added Rule 'Ensure local interactive user home directories are mode 7…
Jul 24, 2023
d1d342e
Typo fix
Jul 24, 2023
6df3c83
Rule added: 'Ensure root is the only UID 0 account'
Jul 24, 2023
91f598f
Rule added: 'Ensure root password is set'
Jul 24, 2023
1c9a5d6
Added rule: 'Ensure a single firewall configuration utility is in use'
Jul 24, 2023
b4ce8a9
Added rule: 'Ensure host based firewall loopback traffic is configured'
Jul 24, 2023
03b6cfe
File rights fixed
Jul 24, 2023
172f97d
Rule ensure_host_based_firewall_loopback_traffic_is_configured added
Jul 24, 2023
34f97ac
Rule Added: 'Ensure at least one nftables table exists'
Jul 24, 2023
30445a2
Update for RHEL9
Jul 24, 2023
f2e6b50
Bugfix for issue #96 'crypto_policy_sshd.rb unexpected return'
Jul 24, 2023
2037aea
Rule Added: 'Ensure default user shell timeout is 900 seconds or less'
Jul 25, 2023
4400977
Bugfix in profile files
Jul 25, 2023
bfe739e
Rule Added: 'Ensure default user umask is 027 or more restrictive'
Jul 25, 2023
84a801c
Typo fix
Jul 25, 2023
16720d7
Hardening schedule removed
Aug 15, 2023
c233df2
Escaping fixed
Aug 15, 2023
facb0f3
Fix to suppress error message on absent AIDE tools
Aug 15, 2023
7d598e1
Rule added: Ensure accounts in /etc/passwd use shadowed passwords (Au…
Aug 15, 2023
105b70f
Rule Added: 'Ensure authselect includes with-faillock'
Aug 15, 2023
562e510
Creation of recursive directories enabled
Sep 21, 2023
f679222
some legacy benchmarks removed
Sep 21, 2023
05d90e7
Workaround for exec errors
Sep 21, 2023
3b1a6d4
RHEL/Rocky 9 added to readme
Sep 21, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .plan_cache.json

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion .task_cache.json

Large diffs are not rendered by default.

61 changes: 31 additions & 30 deletions Puppetfile
Original file line number Diff line number Diff line change
Expand Up @@ -4,34 +4,35 @@
# The following directive installs modules to the managed moduledir.
moduledir '.modules'

mod 'puppetlabs/package', '2.3.0'
mod 'puppetlabs/service', '2.3.0'
mod 'herculesteam/augeasproviders_sysctl', '2.6.2'
mod 'puppet/augeasproviders_pam', '3.0.1'
mod 'puppet/augeasproviders_core', '3.2.0'
mod 'puppetlabs/facts', '1.4.0'
mod 'puppetlabs/apt', '8.5.0'
mod 'camptocamp/augeas', '1.9.0'
mod 'puppet/alternatives', '4.1.0'
mod 'puppet/firewalld', '4.5.1'
mod 'puppet/kmod', '3.2.0'
mod 'puppet/logrotate', '6.1.0'
mod 'puppet/postfix', '3.0.0'
mod 'puppet/selinux', '3.4.1'
mod 'puppet/systemd', '3.10.0'
mod 'puppetlabs/augeas_core', '1.2.0'
mod 'puppetlabs/concat', '7.2.0'
mod 'puppetlabs/firewall', '3.5.0'
mod 'puppetlabs/inifile', '5.3.0'
mod 'puppetlabs/mailalias_core', '1.1.0'
mod 'puppetlabs/ntp', '9.1.1'
mod 'puppetlabs/puppet_agent', '4.12.1'
mod 'puppetlabs/reboot', '4.2.0'
mod 'puppetlabs/stdlib', '6.6.0'
mod 'ubeek/auditd', '1.0.3'
mod 'puppetlabs/mount_core', '1.1.0'
mod 'puppet/cron', '3.0.0'
mod 'puppet/augeasproviders_grub', '4.0.0'
mod 'puppet/augeasproviders_shellvar', '5.0.0'
mod 'puppetlabs/lvm', '1.4.0'
mod 'puppet/chrony', '3.0.0'
mod 'puppetlabs/exec', '2.2.0'
mod 'puppetlabs/lvm', '1.4.0'
mod 'puppet/augeasproviders_shellvar', '5.0.0'
mod 'puppet/augeasproviders_grub', '4.0.0'
mod 'puppet/cron', '3.0.0'
mod 'puppetlabs/mount_core', '1.1.0'
mod 'ubeek/auditd', '1.0.3'
mod 'puppetlabs/stdlib', '6.6.0'
mod 'puppetlabs/reboot', '4.2.0'
mod 'puppetlabs/puppet_agent', '4.12.1'
mod 'puppetlabs/ntp', '9.1.1'
mod 'puppetlabs/mailalias_core', '1.1.0'
mod 'puppetlabs/inifile', '5.3.0'
mod 'puppetlabs/firewall', '3.5.0'
mod 'puppetlabs/concat', '7.2.0'
mod 'puppetlabs/augeas_core', '1.2.0'
mod 'puppet/systemd', '3.10.0'
mod 'puppet/selinux', '3.4.1'
mod 'puppet/postfix', '3.0.0'
mod 'puppet/logrotate', '6.1.0'
mod 'puppet/kmod', '3.2.0'
mod 'puppet/firewalld', '4.5.1'
mod 'puppet/alternatives', '4.1.0'
mod 'camptocamp/augeas', '1.9.0'
mod 'puppetlabs/apt', '8.5.0'
mod 'puppetlabs/facts', '1.4.0'
mod 'puppet/augeasproviders_core', '3.2.0'
mod 'puppet/augeasproviders_pam', '3.0.1'
mod 'herculesteam/augeasproviders_sysctl', '2.6.2'
mod 'puppetlabs/service', '2.3.0'
mod 'puppetlabs/package', '2.3.0'
6 changes: 5 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,8 @@ This Puppet module implements security controls defined in the Center for Intern
| RedHat 7 | 3.1.1 |
| RedHat 8 | 2.0.0 |
| Rocky 8 | 1.0.0 |
| RedHat 9 | 1.0.0 |
| Rocky 9 | 1.0.0 |
| SLES 15 | 1.1.1 |
| Ubuntu 18.04 | 2.1.0 |
| Ubuntu 20.04 | 1.1.0 |
Expand Down Expand Up @@ -120,7 +122,9 @@ As of enforcement for the Redhat 7 OS, there are 223 CIS rules that are either e

```yaml
# hieradata/common.yaml
secure_linux_cis::rules::ensure_mounting_of_squashfs_filesystems_is_disabled::enforced: false
secure_linux_cis::exclude_rules:
- ensure_mounting_of_squashfs_filesystems_is_disabled
- ensure_rsyslog_is_not_configured_to_recieve_logs_from_a_remote_client
```

### Enabling rules with Hiera (Not applicable to 3.0.0 descriptive based 'rules' .pp files)
Expand Down
329 changes: 105 additions & 224 deletions bolt-debug.log

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions bolt-project.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -30,3 +30,4 @@ modules:
- puppetlabs/service
- puppetlabs/exec
- puppetlabs/package
- puppet/chrony
Loading