Merge pull request #38 from ansible-lockdown/benchmark_v2.0.0

Align latest with public fixes
This commit is contained in:
jjoympg 2025-07-02 11:44:35 -04:00 committed by GitHub
commit eaf5294c1e
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
9 changed files with 73 additions and 36 deletions

View file

@ -42,13 +42,13 @@ repos:
name: Detect Secrets test name: Detect Secrets test
- repo: https://github.com/gitleaks/gitleaks - repo: https://github.com/gitleaks/gitleaks
rev: v8.26.0 rev: v8.27.2
hooks: hooks:
- id: gitleaks - id: gitleaks
name: Run Gitleaks test name: Run Gitleaks test
- repo: https://github.com/ansible-community/ansible-lint - repo: https://github.com/ansible-community/ansible-lint
rev: v25.5.0 rev: v25.6.1
hooks: hooks:
- id: ansible-lint - id: ansible-lint
name: Ansible-lint name: Ansible-lint

View file

@ -8,7 +8,6 @@
- Improved documentation and variable compilation for crypto policies - Improved documentation and variable compilation for crypto policies
- Addresses #318 - Thank you @kodebach & @bgro - Addresses #318 - Thank you @kodebach & @bgro
- Improved logic for 5.2.4 to exclude rhel9cis_sudoers_exclude_nopasswd_list in pre-check tasks/main.yml - Improved logic for 5.2.4 to exclude rhel9cis_sudoers_exclude_nopasswd_list in pre-check tasks/main.yml
- rule_6.3.3.5 updated for missing checks
## 2.0.1 - Based on CIS v2.0.0 ## 2.0.1 - Based on CIS v2.0.0
@ -20,9 +19,8 @@
## 2.0.0 - Based on CIS v2.0.0 ## 2.0.0 - Based on CIS v2.0.0
- #325 - thanks to @mindrb - #322, #325 - thanks to @mindrb
- May 2025 QA Fixes - #320 - thanks to @anup-ad
- Typo fixes and Banner verbiage
## 1.1.6 - Based on CIS v1.0.0 ## 1.1.6 - Based on CIS v1.0.0
@ -38,7 +36,7 @@
- updated controls 6.2.10-6.2.14 - updated controls 6.2.10-6.2.14
- audit - audit
- steps moved to prelim - steps moved to prelim
- update to copy and archive logic and variables - update to coipy and archive logic and variables
- removed vars not used - removed vars not used
- updated quotes used in mode tasks - updated quotes used in mode tasks
- pre-commit update - pre-commit update
@ -72,7 +70,7 @@
- lint updates - lint updates
- .secrets updated - .secrets updated
- file mode quoted - file mode quoted
- updated 5.6.5 thanks to feedback from S!ghs on discord community - updated 5.6.5 thansk to feedback from S!ghs on discord community
## 1.1.1 - Based on CIS v1.0.0 ## 1.1.1 - Based on CIS v1.0.0
@ -104,7 +102,7 @@
## 1.0.10 ## 1.0.10
- [#72](https://github.com/ansible-lockdown/RHEL9-CIS/issues/72) - [#72](https://github.com/ansible-lockdown/RHEL9-CIS/issues/72)
- Only run check when playbook user not a superuser - Only run check when paybook user not a superuser
- fix for 5.5.3 thanks to @nrg-fv - fix for 5.5.3 thanks to @nrg-fv
## 1.0.9 ## 1.0.9
@ -176,7 +174,7 @@ Jan-2023 release
- updated ansible minimum to 2.10 - updated ansible minimum to 2.10
- Lint file updates and improvements - Lint file updates and improvements
- auditd now shows diff after initial template added - auditd now shows diff ater initial template added
- many control rewritten - many control rewritten
- Many controls moved ID references - Many controls moved ID references
- Audit updates aligned - Audit updates aligned
@ -241,11 +239,11 @@ Jan-2023 release
- not all controls work with rhel8 releases any longer - not all controls work with rhel8 releases any longer
- selinux disabled 1.6.1.4 - selinux disabled 1.6.1.4
- logrotate - 4.3.x - logrotate - 4.3.x
- updated to rhel8cis v2.0 benchmark requirements - updated to rhel8cis v2.0 benchamrk requirements
- removed iptables firewall controls (not valid on rhel9) - removed iptables firewall controls (not valid on rhel9)
- added more to logrotate 4.3.x - sure to logrotate now a separate package - added more to logrotate 4.3.x - sure to logrotate now a seperate package
- grub path now standard to /boot/grub2/grub.cfg - grub path now standard to /boot/grub2/grub.cfg
- 1.6.1.4 from rh8 removed as selinux.cfg doesn't disable selinux any longer - 1.6.1.4 from rh8 removed as selinux.cfg doesnt disable selinux any longer
- workflow update - workflow update
- removed doc update - removed doc update

View file

@ -101,7 +101,7 @@
ansible.builtin.assert: ansible.builtin.assert:
that: (not prelim_ansible_user_password_set.stdout.startswith("!")) or (ansible_env.SUDO_USER in rhel9cis_sudoers_exclude_nopasswd_list) that: (not prelim_ansible_user_password_set.stdout.startswith("!")) or (ansible_env.SUDO_USER in rhel9cis_sudoers_exclude_nopasswd_list)
fail_msg: "You have {{ sudo_password_rule }} enabled but the user = {{ ansible_env.SUDO_USER }} is locked - It can break access" fail_msg: "You have {{ sudo_password_rule }} enabled but the user = {{ ansible_env.SUDO_USER }} is locked - It can break access"
success_msg: "The local account is not locked for {{ ansible_env.SUDO_USER }} is not locked or included in the exception list for rule 5.2.4" success_msg: "The local account {{ ansible_env.SUDO_USER }} is not locked or included in the exception list for rule 5.2.4"
- name: "Check authselect profile is selected" - name: "Check authselect profile is selected"
when: rhel9cis_allow_authselect_updates when: rhel9cis_allow_authselect_updates
@ -131,6 +131,7 @@
- name: "Ensure root password is set" - name: "Ensure root password is set"
ansible.builtin.shell: passwd -S root | grep -E "(Password set, SHA512 crypt|Password locked)" ansible.builtin.shell: passwd -S root | grep -E "(Password set, SHA512 crypt|Password locked)"
changed_when: false changed_when: false
failed_when: prelim_root_passwd_set.rc not in [ 0, 1 ]
register: prelim_root_passwd_set register: prelim_root_passwd_set
- name: "Ensure root password is set" - name: "Ensure root password is set"

View file

@ -305,6 +305,7 @@
tags: always tags: always
ansible.builtin.shell: grep ^log_file /etc/audit/auditd.conf | awk '{ print $NF }' ansible.builtin.shell: grep ^log_file /etc/audit/auditd.conf | awk '{ print $NF }'
changed_when: false changed_when: false
check_mode: false
register: prelim_auditd_logfile register: prelim_auditd_logfile
- name: "PRELIM | AUDIT | Audit conf and rules files | list files" - name: "PRELIM | AUDIT | Audit conf and rules files | list files"

View file

@ -123,7 +123,6 @@
/usr/sbin/aureport p+i+n+u+g+s+b+acl+xattrs+sha512 /usr/sbin/aureport p+i+n+u+g+s+b+acl+xattrs+sha512
/usr/sbin/ausearch p+i+n+u+g+s+b+acl+xattrs+sha512 /usr/sbin/ausearch p+i+n+u+g+s+b+acl+xattrs+sha512
/usr/sbin/autrace p+i+n+u+g+s+b+acl+xattrs+sha512 /usr/sbin/autrace p+i+n+u+g+s+b+acl+xattrs+sha512
validate: aide -D --config %s
register: aide_file_integrity_check register: aide_file_integrity_check
failed_when: failed_when:
- not ansible_check_mode - not ansible_check_mode

View file

@ -50,7 +50,7 @@
- name: "6.2.2.3 | PATCH | Ensure journald Compress is configured | comment out current entries" - name: "6.2.2.3 | PATCH | Ensure journald Compress is configured | comment out current entries"
ansible.builtin.replace: ansible.builtin.replace:
path: /etc/systemd/journald.conf path: /etc/systemd/journald.conf
regexp: ^(?i)(\s*compress=) regexp: (?i)(\s*compress=)
replace: '#\1' replace: '#\1'
- name: "6.2.2.4 | PATCH | Ensure journald Storage is configured" - name: "6.2.2.4 | PATCH | Ensure journald Storage is configured"
@ -76,5 +76,5 @@
- name: "6.2.2.4 | PATCH | Ensure journald Storage is configured | comment out current entries" - name: "6.2.2.4 | PATCH | Ensure journald Storage is configured | comment out current entries"
ansible.builtin.replace: ansible.builtin.replace:
path: /etc/systemd/journald.conf path: /etc/systemd/journald.conf
regexp: ^(?i)(\s*storage=) regexp: (?i)(\s*storage=)
replace: '#\1' replace: '#\1'

View file

@ -286,8 +286,8 @@
vars: vars:
warn_control_id: '7.2.9' warn_control_id: '7.2.9'
block: block:
- name: "7.2.9 | AUDIT | Ensure local interactive user dot files access is configured | Check for files" - name: "7.2.9 | AUDIT | Ensure local interactive user dot files access is configured"
ansible.builtin.shell: find /home/ -name "\.*" ansible.builtin.shell: find {{ prelim_interactive_users_home.stdout_lines | list | join(' ') }} -name "\.*" -type f
changed_when: false changed_when: false
failed_when: discovered_homedir_hidden_files.rc not in [ 0, 1 ] failed_when: discovered_homedir_hidden_files.rc not in [ 0, 1 ]
check_mode: false check_mode: false
@ -296,25 +296,63 @@
- name: "7.2.9 | AUDIT | Ensure local interactive user dot files access is configured | Warning on files found" - name: "7.2.9 | AUDIT | Ensure local interactive user dot files access is configured | Warning on files found"
when: when:
- discovered_homedir_hidden_files.stdout | length > 0 - discovered_homedir_hidden_files.stdout | length > 0
- rhel9cis_dotperm_ansiblemanaged - not rhel9cis_dotperm_ansiblemanaged
ansible.builtin.debug: ansible.builtin.debug:
msg: msg:
- "Warning!! We have discovered group or world-writable dot files on your system and this host is configured for manual intervention. Please investigate these files further." - "Warning!! Please investigate that hidden files found in users home directories match control requirements."
- name: "7.2.9 | PATCH | Ensure local interactive user dot files access is configured | Set warning count" - name: "7.2.9 | AUDIT | Ensure local interactive user dot files access is configured | Set warning count"
when: when:
- discovered_homedir_hidden_files.stdout | length > 0 - discovered_homedir_hidden_files.stdout | length > 0
- rhel9cis_dotperm_ansiblemanaged - not rhel9cis_dotperm_ansiblemanaged
ansible.builtin.import_tasks: ansible.builtin.import_tasks:
file: warning_facts.yml file: warning_facts.yml
- name: "7.2.9 | PATCH | Ensure local interactive user dot files access is configured | Changes files if configured" - name: "7.2.9 | AUDIT | Ensure local interactive user dot files access is configured"
when: when:
- discovered_homedir_hidden_files.stdout | length > 0 - discovered_homedir_hidden_files.stdout | length > 0
- rhel9cis_dotperm_ansiblemanaged - rhel9cis_dotperm_ansiblemanaged
ansible.builtin.file: block:
path: '{{ item }}' - name: "7.2.9 | AUDIT | Ensure local interactive user dot files access is configured | Changes files if configured .bash_history & .netrc"
mode: 'go-w' when:
owner: "{{ prelim_captured_passwd_data | selectattr('dir', 'in', prelim_interactive_users_raw.stdout_lines) | selectattr('dir', 'in', item) | map(attribute='uid') | last }}" - discovered_homedir_hidden_files.stdout | length > 0
group: "{{ prelim_captured_passwd_data | selectattr('dir', 'in', prelim_interactive_users_raw.stdout_lines) | selectattr('dir', 'in', item) | map(attribute='gid') | last }}" - item | basename in ['.bash_history','.netrc']
with_items: "{{ discovered_homedir_hidden_files.stdout_lines }}" ansible.builtin.file:
path: "{{ item }}"
mode: 'u-x,go-rwx'
failed_when: discovered_dot_bash_history_to_change.state not in '[ file, absent ]'
register: discovered_dot_bash_history_to_change
loop: "{{ discovered_homedir_hidden_files.stdout_lines }}"
- name: "7.2.9 | AUDIT | Ensure local interactive user dot files access is configured | Changes files if configured file mode"
ansible.builtin.file:
path: '{{ item }}'
mode: 'u-x,go-wx'
failed_when: discovered_dot_bash_history_to_change.state not in '[ file, absent ]'
register: discovered_dot_bash_history_to_change
loop: "{{ discovered_homedir_hidden_files.stdout_lines }}"
- name: "7.2.9 | AUDIT | Ensure local interactive user dot files access is configured | Changes files ownerships"
ansible.builtin.file:
path: "{{ item }}"
owner: "{{ prelim_captured_passwd_data | selectattr('dir', 'in', prelim_interactive_users_home.stdout_lines) | selectattr('dir', 'in', item) | map(attribute='uid') | last }}"
group: "{{ prelim_captured_passwd_data | selectattr('dir', 'in', prelim_interactive_users_home.stdout_lines) | selectattr('dir', 'in', item) | map(attribute='gid') | last }}"
failed_when: discovered_dot_bash_history_to_change.state not in '[ file, absent ]'
register: discovered_dot_bash_history_to_change
loop: "{{ discovered_homedir_hidden_files.stdout_lines }}"
- name: "7.2.9 | PATCH | Ensure local interactive user dot files access is configured | Changes files if configured"
ansible.builtin.file:
path: '{{ item }}'
mode: 'go-w'
owner: "{{ prelim_captured_passwd_data | selectattr('dir', 'in', prelim_interactive_users_home.stdout_lines) | selectattr('dir', 'in', item) | map(attribute='uid') | last }}"
group: "{{ prelim_captured_passwd_data | selectattr('dir', 'in', prelim_interactive_users_home.stdout_lines) | selectattr('dir', 'in', item) | map(attribute='gid') | last }}"
with_items: "{{ discovered_homedir_hidden_files.stdout_lines }}"
- name: "7.2.9 | AUDIT | Ensure local interactive user dot files access is configured | rename .forward or .rhosts files"
when:
- item | basename in ['.forward','.rhosts']
- item is not search ("CIS")
ansible.builtin.command: "mv {{ item }} {{ item }}_CIS_TOBEREVIEWED"
changed_when: true
loop: "{{ discovered_homedir_hidden_files.stdout_lines }}"

View file

@ -34,7 +34,7 @@ rhel9cis_selinux_disable: {{ rhel9cis_selinux_disable }}
# UEFI boot('/etc/grub2-efi.cfg') or in case of BIOS legacy-boot('/etc/grub2.cfg'). # UEFI boot('/etc/grub2-efi.cfg') or in case of BIOS legacy-boot('/etc/grub2.cfg').
rhel9cis_legacy_boot: {{ rhel9cis_legacy_boot }} rhel9cis_legacy_boot: {{ rhel9cis_legacy_boot }}
## Benchmark name used by audting control role ## Benchmark name used by auditing control role
# The audit variable found at the base # The audit variable found at the base
## metadata for Audit benchmark ## metadata for Audit benchmark
benchmark_version: 'v2.0.0' benchmark_version: 'v2.0.0'
@ -151,7 +151,7 @@ rhel9cis_rule_1_8_8: {{ rhel9cis_rule_1_8_8 }}
rhel9cis_rule_1_8_9: {{ rhel9cis_rule_1_8_9 }} rhel9cis_rule_1_8_9: {{ rhel9cis_rule_1_8_9 }}
rhel9cis_rule_1_8_10: {{ rhel9cis_rule_1_8_10 }} rhel9cis_rule_1_8_10: {{ rhel9cis_rule_1_8_10 }}
# Section 2 rules are controling Services (Special Purpose Services, and service clients) # Section 2 rules are controlling Services (Special Purpose Services, and service clients)
## Configure Server Services ## Configure Server Services
rhel9cis_rule_2_1_1: {{ rhel9cis_rule_2_1_1 }} rhel9cis_rule_2_1_1: {{ rhel9cis_rule_2_1_1 }}
rhel9cis_rule_2_1_2: {{ rhel9cis_rule_2_1_2 }} rhel9cis_rule_2_1_2: {{ rhel9cis_rule_2_1_2 }}
@ -625,21 +625,21 @@ rhel9cis_authselect_custom_profile_name: {{ rhel9cis_authselect_custom_profile_n
# These are discovered via logins.def if set true # These are discovered via logins.def if set true
rhel9cis_discover_int_uid: {{ rhel9cis_discover_int_uid }} rhel9cis_discover_int_uid: {{ rhel9cis_discover_int_uid }}
# This variable sets the minimum number from which to search for UID # This variable sets the minimum number from which to search for UID
# Note that the value will be dynamically overwritten if variable `dicover_int_uid` has # Note that the value will be dynamically overwritten if variable `discover_int_uid` has
# been set to `true`. # been set to `true`.
min_int_uid: 1000 min_int_uid: 1000
### Controls: ### Controls:
# - Ensure local interactive user home directories exist # - Ensure local interactive user home directories exist
# - Ensure local interactive users own their home directories # - Ensure local interactive users own their home directories
# This variable sets the maximum number at which the search stops for UID # This variable sets the maximum number at which the search stops for UID
# Note that the value will be dynamically overwritten if variable `dicover_int_uid` has # Note that the value will be dynamically overwritten if variable `discover_int_uid` has
# been set to `true`. # been set to `true`.
max_int_uid: 65533 max_int_uid: 65533
## Section6 vars ## Section6 vars
## Control 6.1.2 AIDE schedule ## Control 6.1.2 AIDE schedule
# how aide sceduler runs can be one of cron or timer # how aide scheduler runs can be one of cron or timer
rhel9cis_aide_scan: {{ rhel9cis_aide_scan }} rhel9cis_aide_scan: {{ rhel9cis_aide_scan }}
# These are the crontab settings for periodical checking of the filesystem's integrity using AIDE. # These are the crontab settings for periodical checking of the filesystem's integrity using AIDE.

View file

@ -1,4 +1,4 @@
# This is a subpolicy to disable weak ciphers # This is a subpolicy to disable weak ciphers
# for the SSH protocol (libssh and OpenSSH) # for the SSH protocol (libssh and OpenSSH)
# Carried out as part of CIS Benchmark rules combined 1.6.6 and 5.1.4 # Carried out as part of CIS Benchmark rules combined 1.6.6 and 5.1.4
cipher@SSH ={% if rhel9cis_rule_1_6_6 %} -CHACHA20-POLY1305{% endif %}{% if rhel9cis_rule_5_1_5 %} -3DES-CBC -AES-128-CBC -AES-192-CBC -AES-256-CBC{% endif %} cipher@SSH ={% if rhel9cis_rule_1_6_6 %} -CHACHA20-POLY1305{% endif %}{% if rhel9cis_rule_5_1_4 %} -3DES-CBC -AES-128-CBC -AES-192-CBC -AES-256-CBC{% endif %}