Skip to content

Commit 4bb5f79

Browse files
authored
Merge pull request #41597 from kmccarron-rh/AvailProfiles
OSDOCS-3262: Update Understanding the Compliance Operator with the latest information
2 parents 1d5271a + d35b231 commit 4bb5f79

File tree

1 file changed

+153
-113
lines changed

1 file changed

+153
-113
lines changed

modules/compliance-profiles.adoc

Lines changed: 153 additions & 113 deletions
Original file line numberDiff line numberDiff line change
@@ -5,36 +5,56 @@
55
[id="compliance_profiles_{context}"]
66
= Compliance Operator profiles
77

8-
There are several profiles available as part of the Compliance Operator installation.
9-
10-
View the available profiles:
8+
There are several profiles available as part of the Compliance Operator installation. You can use the `oc get` command to view available profiles, profile details, and specific rules.
119

10+
* View the available profiles:
11+
+
1212
[source,terminal]
1313
----
1414
$ oc get -n <namespace> profiles.compliance
1515
----
16-
16+
+
17+
This example displays the profiles in the default `openshift-compliance` namespace:
18+
+
19+
[source,terminal]
20+
----
21+
$ oc get -n openshift-compliance profiles.compliance
22+
----
23+
+
1724
.Example output
1825
[source,terminal]
1926
----
20-
NAME AGE
21-
ocp4-cis 4h52m
22-
ocp4-cis-node 4h52m
23-
ocp4-e8 4h52m
24-
ocp4-moderate 4h52m
25-
rhcos4-e8 4h52m
26-
rhcos4-moderate 4h52m
27+
NAME AGE
28+
ocp4-cis 32m
29+
ocp4-cis-node 32m
30+
ocp4-e8 32m
31+
ocp4-moderate 32m
32+
ocp4-moderate-node 32m
33+
ocp4-nerc-cip 32m
34+
ocp4-nerc-cip-node 32m
35+
ocp4-pci-dss 32m
36+
ocp4-pci-dss-node 32m
37+
rhcos4-e8 32m
38+
rhcos4-moderate 32m
39+
rhcos4-nerc-cip 32m
2740
----
41+
+
42+
These profiles represent different compliance benchmarks. Each profile has the product name that it applies to added as a prefix to the profile’s name. `ocp4-e8` applies the Essential 8 benchmark to the {product-title} product, while `rhcos4-e8` applies the Essential 8 benchmark to the {op-system-first} product.
2843

29-
These profiles represent different compliance benchmarks.
30-
31-
View the details of a profile:
32-
44+
* View the details of a profile:
45+
+
3346
[source,terminal]
3447
----
3548
$ oc get -n <namespace> -oyaml profiles.compliance <profile name>
3649
----
37-
50+
+
51+
This example displays the details of the `rhcos4-e8` profile:
52+
+
53+
[source,terminal]
54+
----
55+
$ oc get -n openshift-compliance -oyaml profiles.compliance rhcos4-e8
56+
----
57+
+
3858
.Example output
3959
[source,yaml]
4060
----
@@ -45,113 +65,133 @@ description: |-
4565
Cyber Security Centre (ACSC) Essential Eight.
4666
A copy of the Essential Eight in Linux Environments guide can
4767
be found at the ACSC website: ...
48-
id: xccdf_org.ssgproject.content_profile_e8
49-
kind: Profile
50-
metadata:
51-
annotations:
52-
compliance.openshift.io/product: redhat_enterprise_linux_coreos_4
53-
compliance.openshift.io/product-type: Node
54-
creationTimestamp: "2020-09-07T11:42:51Z"
55-
generation: 1
56-
labels:
57-
compliance.openshift.io/profile-bundle: rhcos4
58-
name: rhcos4-e8
59-
namespace: openshift-compliance
60-
rules:
61-
- rhcos4-accounts-no-uid-except-zero
62-
- rhcos4-audit-rules-dac-modification-chmod
63-
- rhcos4-audit-rules-dac-modification-chown
64-
- rhcos4-audit-rules-execution-chcon
65-
- rhcos4-audit-rules-execution-restorecon
66-
- rhcos4-audit-rules-execution-semanage
67-
- rhcos4-audit-rules-execution-setfiles
68-
- rhcos4-audit-rules-execution-setsebool
69-
- rhcos4-audit-rules-execution-seunshare
70-
- rhcos4-audit-rules-kernel-module-loading
71-
- rhcos4-audit-rules-login-events
72-
- rhcos4-audit-rules-login-events-faillock
73-
- rhcos4-audit-rules-login-events-lastlog
74-
- rhcos4-audit-rules-login-events-tallylog
75-
- rhcos4-audit-rules-networkconfig-modification
76-
- rhcos4-audit-rules-sysadmin-actions
77-
- rhcos4-audit-rules-time-adjtimex
78-
- rhcos4-audit-rules-time-clock-settime
79-
- rhcos4-audit-rules-time-settimeofday
80-
- rhcos4-audit-rules-time-stime
81-
- rhcos4-audit-rules-time-watch-localtime
82-
- rhcos4-audit-rules-usergroup-modification
83-
- rhcos4-auditd-data-retention-flush
84-
- rhcos4-auditd-freq
85-
- rhcos4-auditd-local-events
86-
- rhcos4-auditd-log-format
87-
- rhcos4-auditd-name-format
88-
- rhcos4-auditd-write-logs
89-
- rhcos4-configure-crypto-policy
90-
- rhcos4-configure-ssh-crypto-policy
91-
- rhcos4-no-empty-passwords
92-
- rhcos4-selinux-policytype
93-
- rhcos4-selinux-state
94-
- rhcos4-service-auditd-enabled
95-
- rhcos4-sshd-disable-empty-passwords
96-
- rhcos4-sshd-disable-gssapi-auth
97-
- rhcos4-sshd-disable-rhosts
98-
- rhcos4-sshd-disable-root-login
99-
- rhcos4-sshd-disable-user-known-hosts
100-
- rhcos4-sshd-do-not-permit-user-env
101-
- rhcos4-sshd-enable-strictmodes
102-
- rhcos4-sshd-print-last-log
103-
- rhcos4-sshd-set-loglevel-info
104-
- rhcos4-sshd-use-priv-separation
105-
- rhcos4-sysctl-kernel-dmesg-restrict
106-
- rhcos4-sysctl-kernel-kexec-load-disabled
107-
- rhcos4-sysctl-kernel-kptr-restrict
108-
- rhcos4-sysctl-kernel-randomize-va-space
109-
- rhcos4-sysctl-kernel-unprivileged-bpf-disabled
110-
- rhcos4-sysctl-kernel-yama-ptrace-scope
111-
- rhcos4-sysctl-net-core-bpf-jit-harden
112-
title: Australian Cyber Security Centre (ACSC) Essential Eight
68+
id: xccdf_org.ssgproject.content_profile_e8
69+
kind: Profile
70+
metadata:
71+
annotations:
72+
compliance.openshift.io/image-digest: pb-rhcos426smj
73+
compliance.openshift.io/product: redhat_enterprise_linux_coreos_4
74+
compliance.openshift.io/product-type: Node
75+
labels:
76+
compliance.openshift.io/profile-bundle: rhcos4
77+
name: rhcos4-e8
78+
namespace: openshift-compliance
79+
ownerReferences:
80+
- apiVersion: compliance.openshift.io/v1alpha1
81+
blockOwnerDeletion: true
82+
controller: true
83+
kind: ProfileBundle
84+
name: rhcos4
85+
rules:
86+
- rhcos4-accounts-no-uid-except-zero
87+
- rhcos4-audit-rules-dac-modification-chmod
88+
- rhcos4-audit-rules-dac-modification-chown
89+
- rhcos4-audit-rules-execution-chcon
90+
- rhcos4-audit-rules-execution-restorecon
91+
- rhcos4-audit-rules-execution-semanage
92+
- rhcos4-audit-rules-execution-setfiles
93+
- rhcos4-audit-rules-execution-setsebool
94+
- rhcos4-audit-rules-execution-seunshare
95+
- rhcos4-audit-rules-kernel-module-loading-delete
96+
- rhcos4-audit-rules-kernel-module-loading-finit
97+
- rhcos4-audit-rules-kernel-module-loading-init
98+
- rhcos4-audit-rules-login-events
99+
- rhcos4-audit-rules-login-events-faillock
100+
- rhcos4-audit-rules-login-events-lastlog
101+
- rhcos4-audit-rules-login-events-tallylog
102+
- rhcos4-audit-rules-networkconfig-modification
103+
- rhcos4-audit-rules-sysadmin-actions
104+
- rhcos4-audit-rules-time-adjtimex
105+
- rhcos4-audit-rules-time-clock-settime
106+
- rhcos4-audit-rules-time-settimeofday
107+
- rhcos4-audit-rules-time-stime
108+
- rhcos4-audit-rules-time-watch-localtime
109+
- rhcos4-audit-rules-usergroup-modification
110+
- rhcos4-auditd-data-retention-flush
111+
- rhcos4-auditd-freq
112+
- rhcos4-auditd-local-events
113+
- rhcos4-auditd-log-format
114+
- rhcos4-auditd-name-format
115+
- rhcos4-auditd-write-logs
116+
- rhcos4-configure-crypto-policy
117+
- rhcos4-configure-ssh-crypto-policy
118+
- rhcos4-no-empty-passwords
119+
- rhcos4-selinux-policytype
120+
- rhcos4-selinux-state
121+
- rhcos4-service-auditd-enabled
122+
- rhcos4-sshd-disable-empty-passwords
123+
- rhcos4-sshd-disable-gssapi-auth
124+
- rhcos4-sshd-disable-rhosts
125+
- rhcos4-sshd-disable-root-login
126+
- rhcos4-sshd-disable-user-known-hosts
127+
- rhcos4-sshd-do-not-permit-user-env
128+
- rhcos4-sshd-enable-strictmodes
129+
- rhcos4-sshd-print-last-log
130+
- rhcos4-sshd-set-loglevel-info
131+
- rhcos4-sysctl-kernel-dmesg-restrict
132+
- rhcos4-sysctl-kernel-kptr-restrict
133+
- rhcos4-sysctl-kernel-randomize-va-space
134+
- rhcos4-sysctl-kernel-unprivileged-bpf-disabled
135+
- rhcos4-sysctl-kernel-yama-ptrace-scope
136+
- rhcos4-sysctl-net-core-bpf-jit-harden
137+
title: Australian Cyber Security Centre (ACSC) Essential Eight
113138
----
114139

115-
View the rules within a desired profile:
116-
140+
* View the rules within a desired profile:
141+
+
117142
[source,terminal]
118143
----
119144
$ oc get -n <namespace> -oyaml rules.compliance <rule_name>
120145
----
121-
146+
+
147+
This example displays the `rhcos4-audit-rules-login-events` rule in the `rhcos4` profile:
148+
+
149+
[source,terminal]
150+
----
151+
$ oc get -n openshift-compliance -oyaml rules.compliance rhcos4-audit-rules-login-events
152+
----
153+
+
122154
.Example output
123155
[source,yaml]
124156
----
125-
apiVersion: compliance.openshift.io/v1alpha1
126-
description: '<code>auditd</code><code>augenrules</code><code>.rules</code><code>/etc/audit/rules.d</code><pre>-w /var/log/tallylog -p wa -k logins -w /var/run/faillock -p wa -k logins -w /var/log/lastlog -p wa -k logins</pre><code>auditd</code><code>auditctl</code><code>/etc/audit/audit.rules</code><pre>-w /var/log/tallylog -p wa -k logins -w /var/run/faillock -p wa -k logins -w /var/log/lastlog -p wa -k logins</pre>file in order to watch for unattempted manual edits of files involved in storing logon events:'
127-
id: xccdf_org.ssgproject.content_rule_audit_rules_login_events
128-
kind: Rule
129-
metadata:
130-
annotations:
131-
compliance.openshift.io/rule: audit-rules-login-events
132-
control.compliance.openshift.io/NIST-800-53: AU-2(d);AU-12(c);AC-6(9);CM-6(a)
133-
policies.open-cluster-management.io/controls: AU-2(d),AU-12(c),AC-6(9),CM-6(a)
134-
policies.open-cluster-management.io/standards: NIST-800-53
135-
creationTimestamp: "2020-09-07T11:43:03Z"
136-
generation: 1
137-
labels:
138-
compliance.openshift.io/profile-bundle: rhcos4
139-
name: rhcos4-audit-rules-login-events
140-
namespace: openshift-compliance
141-
rationale: |-
142-
Manual editing of these files may indicate nefarious activity,
143-
such as an attacker attempting to remove evidence of an
144-
intrusion.
157+
apiVersion: compliance.openshift.io/v1alpha1
158+
checkType: Node
159+
description: |-
160+
The audit system already collects login information for all users and root. If the auditd daemon is configured to use the augenrules program to read audit rules during daemon startup (the default), add the following lines to a file with suffix.rules in the directory /etc/audit/rules.d in order to watch for attempted manual edits of files involved in storing logon events:
161+
162+
-w /var/log/tallylog -p wa -k logins
163+
-w /var/run/faillock -p wa -k logins
164+
-w /var/log/lastlog -p wa -k logins
165+
166+
If the auditd daemon is configured to use the auditctl utility to read audit rules during daemon startup, add the following lines to /etc/audit/audit.rules file in order to watch for unattempted manual edits of files involved in storing logon events:
167+
168+
-w /var/log/tallylog -p wa -k logins
169+
-w /var/run/faillock -p wa -k logins
170+
-w /var/log/lastlog -p wa -k logins
171+
id: xccdf_org.ssgproject.content_rule_audit_rules_login_events
172+
kind: Rule
173+
metadata:
174+
annotations:
175+
compliance.openshift.io/image-digest: pb-rhcos426smj
176+
compliance.openshift.io/rule: audit-rules-login-events
177+
control.compliance.openshift.io/NIST-800-53: AU-2(d);AU-12(c);AC-6(9);CM-6(a)
178+
control.compliance.openshift.io/PCI-DSS: Req-10.2.3
179+
policies.open-cluster-management.io/controls: AU-2(d),AU-12(c),AC-6(9),CM-6(a),Req-10.2.3
180+
policies.open-cluster-management.io/standards: NIST-800-53,PCI-DSS
181+
labels:
182+
compliance.openshift.io/profile-bundle: rhcos4
183+
name: rhcos4-audit-rules-login-events
184+
namespace: openshift-compliance
185+
ownerReferences:
186+
- apiVersion: compliance.openshift.io/v1alpha1
187+
blockOwnerDeletion: true
188+
controller: true
189+
kind: ProfileBundle
190+
name: rhcos4
191+
rationale: Manual editing of these files may indicate nefarious activity, such as
192+
an attacker attempting to remove evidence of an intrusion.
145193
severity: medium
146194
title: Record Attempts to Alter Logon and Logout Events
147-
warning: |-
148-
<ul><li><code>audit_rules_login_events_tallylog</code></li>
149-
<li><code>audit_rules_login_events_faillock</code></li>
150-
<li><code>audit_rules_login_events_lastlog</code></li></ul>
151-
This rule checks for multiple syscalls related to login
152-
events and was written with DISA STIG in mind.
153-
Other policies should use separate rule for
154-
each syscall that needs to be checked.
195+
warning: Manual editing of these files may indicate nefarious activity, such as an attacker attempting to remove evidence of an intrusion.
155196
----
156197

157-
Each profile has the product name that it applies to added as a prefix to the profile's name. `ocp4-e8` applies the Essential 8 benchmark to the {product-title} product, while `rhcos4-e8` applies the Essential 8 benchmark to the {op-system-first} product.

0 commit comments

Comments
 (0)