Thanks, I'll take a look at that.

William B. Boucher, BSEE
Embedded Systems Software Engineer
Information Systems Security Manager
MZA Associates Corporation
4900 Lang Ave. NE, Suite 100
Albuquerque, NM 87109-9708
Phone: 505.245.9970 x166
Fax: 505.245.9971
Cell: 505.459.7620<>

[] On Behalf Of Shawn Wells
Sent: Wednesday, January 30, 2019 2:16 AM
Subject: Re: [Open-scap] Hardening Redhawk 6.5

On 1/29/19 11:14 PM, Boucher, William wrote:
Hi folks,

I've been tasked with applying the RedHat 6 STIG to several RedHawk 6.5 systems.
Running oscap should be relatively easy, to see where a base install sits 
initially (RedHawk is RedHat with modifications for embedded realtime use).
The RedHawk site talks about testing RedHawk performance after applying the 
RedHat STIG (in a white paper), but it makes no mention on how to apply it.

RedHawk Linux doesn't have a STIG or common criteria, so not sure what security 
configuration guides (if any) are available.

If the RHEL STIGs can be applied to it, akin to CentOS, the ComplianceAsCode 
user guide might be helpful:

Specifically remediation section:

Applying it manually is an option, but I'd sure like to automate some.
But my question really concerns adding packages (like selinix). RedHawk 
discourages using yum (with the RedHat repositories) to update packages, as 
there may be incompatibilities between the standard packages and the RedHawk 
modifications to the OS.
Perhaps I should direct this question to RedHawk support, but I thought I'd ask 
it here first to get your input.

Not sure how RedHawk works. If they're layering RedHawk software ontop of Red 
Hat instances, then you'd have a Red Hat subscription for every node (and could 
ask Red Hat support). If RedHawk is distributing their own independent linux 
distro, it'd be appropriate to query them about package management.

Open-scap-list mailing list

Reply via email to