Skip to content

Latest commit

 

History

History
132 lines (104 loc) · 5.26 KB

CONTRIBUTING.md

File metadata and controls

132 lines (104 loc) · 5.26 KB

ansible-role-rhel7-stig

If you're reading this, hopefully you are considering helping out with the Lockdown project.

Herein lies the contribution guidelines for helping out with this project. Do take the guidelines here literally, if you find issue with any of them or you see room for improvement, please let us know via a GitHub issue or via the Lockdown mailing list.

Reference

Rules

  • Should you find any security exploit, please contact [email protected] immediately.
  • The Ansible Code of Conduct still applies.
  • Should you wish to work on a completely new standard, GREAT, but please contact the mailing list first as we would want to make a repo for you to work from.
  • To contribute, fork and make a pull request against the devel branch.

Style Guide

All tasks should be in YAML literal.

# This
- name: Create a directory
  file:
      state: directory
      path: /tmp/deletethis

# Not this
- name: Create a directory
  file: state=directory path=/tmpt/deletethis

There should be no space before a task hyphen.

# This
- name: Do something

# Not this
   - name: Do something

Module arguments should be indented four spaces.

# This
- name: Create a directory
  file:
      state: directory
      path: /tmp/deletethis

# Not This
- name: Create a directory
  file:
    state: directory
    path: /tmp/deletethis
  • There should be a single line break between tasks
  • Every task (except prelim tasks) should have, at a minimum and when applicable, the following tags in the following order:
    • Category level (cat1, cat2, cat3)
    • Severity level (high, medium, low)
    • audit or patch to match the task name
    • STIG ID (example, the vulnerability ID number in the case of RHEL7 STIG)
    • Descriptive tags to help with granual execution of tasks
  • Tags should be in multi-line format and indented four spaces just like module arguments above
# This
- name: "HIGH | RHEL-07-040550 | AUDIT | There must be no shosts.equiv files on the system."
  find:
      paths: /
      recurse: yes
      patterns: shosts.equiv
  register: rhel_07_040550_audit
  tags:
      - cat1
      - high
      - audit
      - RHEL-07-040550
      - always
# Not This
- name: "HIGH | RHEL-07-040550 | AUDIT | There must be no shosts.equiv files on the system."
  find:
      paths: /
      recurse: yes
      patterns: shosts.equiv
  register: rhel_07_040550_audit
  tags:
    - cat1
    - high
    - audit
    - RHEL-07-040550
    - always
  • Tasks should run sequentially by STIG ID as listed in the given standard.
  • Every task must be named and should adhere to the following convention:
- name: "$severity | $id_number | (PATCH|AUDIT) | $description_provided_by_standard"

- name: "HIGH | RHEL-07-040550 | PATCH | There must be no shosts.equiv files on the system."
  • If a task requires a previous check of some sort, e.g., listing running services on the system, it should be grouped with other check tasks in a single task file rather than spread throughout the role tasks. They should also be tagged with always to ensure they are run every time.
  • There should only be one standard remediated or checked per task, even if several remediations could be combined into a single task. The goal is granular remediation at the expense of efficiency.
  • If multiple standards must be combined into a single task, the name should adhere to the following convention:
- name: |
        "HIGH | RHEL-07-010480 | PATCH | Systems with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes."
        "HIGH | RHEL-07-010490 | PATCH | Systems using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes."
  • All fact gathering tasks should:
    • have changed_when: no
    • have tag - always
    • should include ignore_errors when necessary.
    • register verbose variable names that end with _audit

Running arbitrary commands

When using command, shell, raw, or script, an appropriate changed_when and/or failed_when must be set on the task rather than ignore_errors. Do not simply ignore errors on a task unless absolutely necessary. Take the time to properly evaluate and define change and failure conditions.

Configuration Validation

It is quite common to modify critical system configuration files during the course of security hardening. These include things such as sudoers, PAM settings, and sshd_config. All these files have the potential to lock you out of the system completely if a syntax error is introduced into the file. When modifying the configuration of critical components such as those listed above, all tasks should use the validate parameter to ensure the file is syntactically correct before being put in to place. This will save you from the need to bake a cake.