Applying DISA STIG hardening to SLES installations | SUSE Communities

Applying DISA STIG hardening to SLES installations

Share
Share

Introduction

The DISA and SUSE have authored a STIG (Secure Technical Implementation Guide) that describes how to harden a SUSE Linux Enterprise system.

The STIG is a long list of rules, each containing description, detection of problems and how to remediate problems on a per rule basis.

While originally STIGs are supposed to applied manually, a large percentage of the rules can be and were automated in so called SCAP format (Secure Content Automation Protocol), in a specifically created format called XCCDF (Extensible Configuration Checklist Definition Format).

What does SUSE provide?

SUSE provides the following variants:

  • XCCDF format rules based on ComplianceAsCode, doing detection and also automated remediation
  • single bash script to apply system hardening
  • ansible playbook to apply system hardening

These are all contained in the “scap-security-guide” RPM package delivered for SUSE Linux Enterprise 12 SP5, and all SUSE Linux Enterprise 15 Service Packs.

Classification

We can classify rules into multiple cases:

  • rules that need to be applied during installation of a system
  • rules where remediation can be automatically applied after installation
  • rules that are not able to be checked automatically nor remediated
  • rules without automated remediation

Rules that need to be applied during installation of a system

The following currently needs to be observed manually during installation of a system:

Rule CCEID Description Note
SLES-15-010190 SLES-15-010200 CCE-83274-1 CCE-83275-8 A boot password must be set. A bootloader password (for grub2) must be configured during installation. In YAST this can be done in the bootloader setup dialog.
SLES-15-030660 CCE-85697-1 There needs to be sufficient storage capacity in which to write the audit logs /var/log/audit/ The partition size needed to capture a week of audit records is based on the activity level of the system and the total storage capacity available. In normal circumstances, 10.0 GB of storage space for audit records in /var/log/ will be sufficient.
SLES-15-040200

SLES-15-040210

SLES-15-030810

CCE-85639-3

CCE-85640-1

CCE-85618-7

Separate partitions for /home, /var and /var/log/audit. These rules avoid attackers able to fill the disk by flooding home directory, logging or audit data.

Note that you should also give sufficient space to /var and /var/log/audit (see above)

SLES-15-010330 CCE-85719-3 All persistent disk partitions must be encrypted. You must install the system with full system encryption for all persistent disks. If using YAST, please setup a respective full disk encryption partitioning proposal.

Rules where remediation can be automatically applied after installation

To apply the automated rules, multiple ways to do so are available.
Via openscap

Install the scap-security-guide and openscap-utils packages.

For evaluation and reporting only:

oscap xccdf eval --profile stig /usr/share/xml/scap/ssg/content/ssg-sle15-ds.xml

For evaluation and remediation:

oscap xccdf eval --profile stig --remediate /usr/share/xml/scap/ssg/content/ssg-sle15-ds.xml

Only the single ssg-sle15-ds.xml file is needed to run above commands, which can be extracted out of the scap-security-guide RPM if there are size constraints on your installation.
Via shell script

Install scap-security-guide and run:

/usr/share/scap-security-guide/bash/sle15-script-stig.sh

The shell script is standalone and can also be copied out of the RPM if you do not want the full installation size of the RPM.

Rules that are not able to be checked automatically nor remediated

Some STIG rules that can not be checked automatically nor remediated.

Rule ID Description Note
SLES-15-030800 audispd’s Plugin disk_full_action When Disk Is Full Configure audispd’s Plugin disk_full_action When Disk Is Full
SLES-15-030790 Configure audispd’s Plugin network_failure_action On Network Failure Taking appropriate action when there is an error sending audit records to a remote system will minimize the possibility of losing audit records.
SLES-15-030620 Verify Permissions of Local Logs of audit Tools Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit information.
SLES-15-030600 Verify that Local Logs of the audit Daemon are not World-Readable Verify that Local Logs of the audit Daemon are not World-Readable

Rules without automated remediation

This section includes the rules where our SCAP profile does not offer automated remediation for various reasons. The table list all those rules and why it is not possible.

Rule ID CCE ID rule_name Reason of why there is no remediation
SLES-15-010000 CCE-83260-0 installed_OS_is_vendor_supported Justification: Many possible OS

There can be no automatic remediation as remediation is update of the OS or switching to another OS

SLES-15-030790 CCE-85705-2 auditd_audispd_network_failure_action Justification: Cannot guarantee the location of the file in question, or its contents

There is no one option to handle the network failure it can be ‘syslog’,’single’ for switching to single user or ‘halt’ to halt the system on failure, so it is better user to decide, knowing system specifics

SLES-15-020060 CCE-85559-3 account_emergency_admin Justification: Not possible as we cannot know what customer set up of Emergency accounts is
SLES-15-020180 CCE-85566-8 accounts_password_all_shadowed_sha512

Justification: Not Possible

The recommended fix for that vulnerability is to

“Lock all interactive user accounts not using SHA-512 hashing until the passwords can be regenerated with SHA-512.”
Obviously this may cause the system to stop function correctly so it should not be automated

SLES-15-040120 CCE-85631-0 accounts_user_home_paths_only The recommended remediation in this case is:

“Edit the local interactive user initialization files to change any PATH variable statements that reference directories other than their home directory.”
Again this might cause one or many of the users not to be able to operate on the system, so should be done manually

SLES-15-020000 CCE-85553-6 account_temp_expire_date Justification: Not possible as we cannot know how many accounts or info of those accounts clients have enabled
SLES-15-010230 CCE-83277-4 account_unique_id Justification: Not possible as we don’t have info on accounts such which are safe for deletion or how UIDs are changed
SLES-15-030660 CCE-85697-1 auditd_audispd_configure_sufficiently_large_partition Justification: There are many different possibilities for how a client may have computer storage set up
SLES-15-030800 CCE-85617-9 auditd_audispd_disk_full_action

Justification: Requires manual remediation
There is no one option to handle the disk failure it can be ‘syslog’,’single’ for switching to single user or ‘halt’ to halt the system on failure, so it is better user to decide, knowing system specifics

SLES-15-040180 CCE-85637-7 dir_perms_world_writable_system_owned_group

Justification: Many different accounts and configurations possible, depending on the client.

The risk is here again to break a working system if some custom software or setup is currently working with world writable directories owned by non-system account users

SLES-15-010330 CCE-85719-3 encrypt_partitions Justification: Automatic remediation of disk encryption risks breaking system and requires interactive operation
SLES-15-040410 CCE-85658-3 file_permissions_ungroupowned Justification: Cannot know which group or owner files should be assigned to.
SLES-15-040110 CCE-85630-2 file_permission_user_init_files

Justification: Cannot know accounts on a clients system

Changing the permissions of init files might break the initialization of user’s operation so it hides of risk of breaking system operation

SLES-15-010190 CCE-83274-1 grub2_password Justification: To prevent hard-coded passwords, automatic remediation of this control is not available.
SLES-15-010200 CCE-83275-8 grub2_uefi_password Justification: To prevent hard-coded passwords, automatic remediation of this control is not available.
SLES-15-010510 CCE-85763-1 is_fips_mode_enabled Justification: Cannot know if there is a reason for why a client would not have FIPS mode enabled.
SLES-15-040390 CCE-85656-7 network_sniffer_disabled Justification: Cannot know if promiscuous mode is enabled for a valid reason.
SLES-15-040400 CCE-85657-5 no_files_unowned_by_user

Justification: Remediation impossible as we cannot know all the users on any system.

Remediation of this would require knowledge to which user to give ownership of unowned files
Also there is very interesting scenario that the check of this rule might not work in case of centralized user accounts

SLES-15-020091 CCE-85672-4 no_shelllogin_for_systemaccounts Justification: We can’t know all the user accounts on a clients system, or why they may want to give certain users specific permissions
SLES-15-030600 CCE-85607-0 permissions_local_var_log_audit

Justification: We can’t know all the user accounts on a clients system, or why they may want to give certain users specific permissions

In general it is a risky remediation but we have implemented automatic remediation for similar cases, and from what I see at the time of importing this rule remediations were not a priority at all so we kind of skipped it later, also possibly due to risk factor

SLES-15-020101 CCE-85712-8 sudo_restrict_privilege_elevation_to_authorized

Justification:

In the rule it is documented:

“This rule doesn’t come with a remediation, as the exact requirement allows exceptions, and removing lines from the sudoers file can make the system non-administrable.”

SLES-15-010354 CCE-85735-9 dir_ownership_library_dirs

Justification: Bash remediation not implemented, since at the time of implementing the rule only ansible was priority. Later on we missed to go back here and implement bash remediation

Comments: Has Ansible remediation, only missing Bash

SLES-15-010340 CCE-85755-7 permissions_local_var_log Comments: Has Ansible remediation, only missing Bash
SLES-15-020180 CCE-85567-6 set_password_hashing_min_rounds_logindefs Comments: Has Ansible remediation, only missing Bash
SLES-15-040200 CCE-85639-3 partition_for_home

Remediation of this rule depends on partitioning scheme so most cases depends on installation phase decisions

SLES-15-040210 CCE-85640-1 partition_for_var

same reasoning as partition_for_home rule

Share
Avatar photo
4,875 views