>From a24d2de6ee4536a7a7faf5de75c70e5d81d73760 Mon Sep 17 00:00:00 2001
From: Shawn Wells <[email protected]>
Date: Sat, 29 Dec 2012 02:52:45 -0500
Subject: [PATCH 13/17] Initial profile for NIST low/low/low
 Initial profile for NIST low/low/low
 Much work left to do!

---
 RHEL6/input/profiles/nist-CL-IL-AL.xml |  490 ++++++++++++++++++++++++++++++++
 1 files changed, 490 insertions(+), 0 deletions(-)
 create mode 100644 RHEL6/input/profiles/nist-CL-IL-AL.xml

diff --git a/RHEL6/input/profiles/nist-CL-IL-AL.xml 
b/RHEL6/input/profiles/nist-CL-IL-AL.xml
new file mode 100644
index 0000000..fb30e5f
--- /dev/null
+++ b/RHEL6/input/profiles/nist-CL-IL-AL.xml
@@ -0,0 +1,490 @@
+<Profile id="stig-rhel6-server" extends="common" 
xmlns="http://checklists.nist.gov/xccdf/1.1"; >
+<title>CNSSI 1253 Low/Low/Low</title>
+<description>This profile follows the Committee on National Security Systems 
Instruction
+(CNSSI) No. 1253, "Security Categorization and Control Selection for National 
Security
+Systems" on security controls to meet low confidentiality, low integrity, and 
low
+assurance."</description>
+
+<!-- 
---------------------------------------------------------------------------------
 -->
+<!-- 
---------------------------------------------------------------------------------
 -->
+<!-- The following variables must be configured against organization-defined 
settings  -->
+
+<!--   AC-2(2): The information system automatically terminates temporary and 
emergency
+       accounts after [Assignment: organization-defined time period for each 
type of
+       account].
+
+       AC-2(3): The information system automatically disables inactive 
accounts after
+       [Assignment: organization-defined time period] -->
+<refine-value idref="var_account_disable_post_pw_expiration" selector="60" \>
+
+<!--   AC-3:   "Access control policies... and access control mechanisms... are
+       employed by organizations to control access between users... and 
objects.
+
+       To meet this, SELinux *must* be enabled and configured against either
+       "targeted" or "mls" mode -->
+<refine-value idref="var_selinux_state_name" selector="enforcing" \>
+<refine-value idref="var_selinux_policy_name" selector="targeted" \>
+
+<!--   AC-6: Least privilege
+
+       Optional values for the umask are "022" or "027" -->
+<refine-value idref="var_umask_for_daemons" selector="022" \>
+
+<!--   AC-7(a): Enforces a limit of [Assignment: organization-defined number]
+       consecutive invalid login attempts by a user during a [Assignment: 
organization-
+       defined time period]; and
+
+       Valid options for the consecutive invalid login attempts: 3, 5, or 10
+       (var_accounts_passwords_pam_faillock_deny)
+
+       Valid options for time interval:
+       (var_accounts_passwords_pam_faillock_fail_interval) 
+               - 900           (15 minutes)
+               - 1800          (30 minutes)
+               - 3600          (1 hour)
+               - 86400         (1 day)
+               - 100000000     (3.1 years) -->
+<refine-value idref="var_accounts_passwords_pam_faillock_deny" selector="3" \>
+<refine-value idref="var_accounts_passwords_pam_faillock_fail_interval" 
selector="900" \>
+
+<!--   AC-7(b): Automatically [Selection: locks the account/node for an 
[Assignment:
+       organization-defined time period]; locks the account/node until 
released by an
+       administrator; delays next login prompt according to [Assignment: 
organization-
+       defined delay algorithm]] when the maximum number of unsuccessful 
attempts is
+       exceeded. The control applies regardless of whether the login occures 
via a
+       local or network connection
+
+       The accepted behavior is to issue an "account lock" for an 
organization-defined
+       time period. Valid options for time interval:
+       (var_accounts_passwords_pam_faillock_unlock_time)
+                       - 900           (15 minutes)
+                       - 1800          (30 minutes)
+                       - 3600          (1 hour)
+                       - 86400         (1 day)
+                       - 100000000     (3.1 years) -->
+<refine-value idref="var_accounts_passwords_pam_faillock_unlock_time" 
selector="900" \>
+
+<!--   AC-11(a): Prevents furtuer access to the system by initiating a session 
lock
+       after [Assignment: organization-defined time period] of inactivity or 
upon
+       receiving a request from a user;
+
+       The accepted inactivity timeout values are:
+       (inactivity_timeout_value)
+               - 5     (minutes)
+               - 10    (minutes)
+               - 15    (minutes) -->
+<refine-value idref="inactivity_timeout_value" selector="15" \>
+
+
+<!-- 
---------------------------------------------------------------------------------
 -->
+<!-- STATIC VARIABLES: DO NOT ALTER -->
+<refine-value idref="login_banner_text" selector="usgcb_default" \>
+<!-- 
---------------------------------------------------------------------------------
 -->
+
+
+<!-- MAYBE
+     AC-2(1) -->
+
+<!-- AC-2(2), AC-2(3) -->
+<select idref="account_temp_expire_date" selected="true" />
+<select id=ref"account_disable_post_pw_expiration" selected="true" \>
+
+<!-- AC-2(4) -->
+<select idref="audit_account_changes" selected="true" \>
+     
+<!-- AC-2(7)(b) -->
+<select idref="audit_sysadmin_action" selected="true" \>
+
+<!--  AC-3 -->
+<select idref="sshd_use_approved_ciphers" selected="true" \>
+<select idref="enable_selinux_bootloader" selected="true" \>
+<select idref="set_selinux_state" selected="true" \>
+<select idref="set_selinux_policy" selected="true" \>
+<select idref="service_restorecond_enabled" selected="true" \>
+
+<!-- AC-4 -->
+<select idref="service_rdisc_disabled" selected="true" \>
+<select idref="disable_sysctl_ipv4_default_send_redirects" selected="true" \>
+<select idref="set_sysctl_net_ipv4_conf_all_secure_redirects" selected="true" 
\>
+<select idref="set_sysctl_net_ipv4_conf_default_accept_source_route" 
selected="true" \>
+<select idref="set_sysctl_net_ipv4_conf_default_accept_redirects" 
selected="true" \>
+<select idref="set_sysctl_net_ipv4_conf_default_secure_redirects" 
selected="true" \>
+<select idref="set_sysctl_net_ipv4_conf_all_rp_filter" selected="true" \>
+<select idref"set_sysctl_net_ipv4_conf_default_rp_filter" selected="true" \>
+<select idref="enable_ip6tables" selected="true" \>
+<select idref="enable_iptables" selected="true" \>
+
+<!-- AC-6 -->
+<select idref="service_oddjobd_disabled" selected="true" \>
+<select idref="rpm_verify_permissions" selected="true" \>
+<select idref="audit_logs_permissions" selected="true" \>
+<select idref="audit_logs_rootowner" selected="true" \>
+<select idref="userowner_shadow_file" selected="true" \>
+<select idref="groupowner_shadow_file" selected="true" \>
+<select idref="perms_shadow_file" selected="true" \>
+<select idref="userowner_group_file" selected="true" \>
+<select idref="groupowner_group_file" selected="true" \>
+<select idref="perms_group_file" selected="true" \>
+<select idref="userowner_gshadow_file" selected="true" \>
+<select idref="groupowner_gshadow_file" selected="true" \>
+<select idref="perms_gshadow_file" selected="true" \>
+<select idref="userowner_passwd_file" selected="true" \>
+<select idref="groupowner_passwd_file" selected="true" \>
+<select idref="file_permissions_etc_passwd" selected="true" \>
+<select idref="selinux_confinement_of_daemons" selected="true" \>
+<select idref="permissions_within_important_dirs" selected="true" \>
+<select idref="file_ownership_library_dirs" selected="true" \>
+<select idref="file_permissions_binary_dirs" selected="true" \>
+<select idref="file_ownership_binary_dirs" selected="true" \>
+<select idref="sticky_world_writable_dirs" selected="true" \>
+<select idref="world_writeable_files" selected="true" \>
+<select idref="no_files_unowned_by_user" selected="true" \>
+<select idref="no_files_unowned_by_group" selected="true" \>
+<select idref="world_writable_files_system_ownership" selected="true" \>
+<select idref="set_daemon_umask" selected="true" \>
+<select idref="no_uidzero_except_root" selected="true" \>
+<select idref="userowner_rsyslog_files" selected="true" \>
+<select idref="groupowner_rsyslog_files" selected="true" \>
+
+<!-- AC-6(2) -->
+<select idref="restrict_root_console_logins" selected="true" \>
+<select idref="restrict_serial_port_logins" selected="true" \>
+<select idref="sshd_disable_root_login" selected="true" \>
+
+<!-- AC-7(a) -->
+<select idref="deny_password_attempts" selected="true" \>
+<select idref="deny_password_attempts_fail_interval" selected="true" \>
+
+<!-- AC-7(b) -->
+<select idref="deny_password_attempts_unlock_time" selected="true" \>
+
+<!-- AC-8(a), AC-8(c) -->
+<select idref="set_system_login_banner" selected="true" \>
+<select idref="enable_gdm_login_banner" selected="true" \>
+<select idref="set_gdm_login_banner_text" selected="true" \>
+
+<!-- AC-11(a) -->
+<select idref="set_screensaver_inactivity_timeout" selected="true" \>
+<select idref="enable_screensaver_after_idle" selected="true" \>
+<select idref="enable_screensaver_password_lock" selected="true" \>
+
+<!-- AC-11(1) -->
+<select idref="set_blank_screensaver" selected="true" \>
+
+<!-- TODO: 
+     AC-17
+     AC-17(1)
+     AC-17(2)
+     AC-17(3)
+     AC-17(4)
+     AC-17(5)
+     AC-17(6)
+     AC-17(7)
+     AC-17(8)
+     AC-18
+     AC-18(1)
+     AC-18(2)
+     AC-18(3)
+     AC-18(4)
+     AC-18(5)
+     AC-19
+     AC-19(1)
+     AC-19(2)
+     AC-19(3)
+     AC-19(4)
+     AC-20
+     AC-20(1)
+     AC-20(2)    
+     AC-21
+     AC-21(1)
+     AC-22
+     AT-1
+     AT-2
+     AT-3
+     AT-3(2)
+     AT-4
+     AT-5
+     AU-1
+     AU-2
+     AU-2(3)
+     AU-2(4)
+     AU-3
+     AU-3(1)
+     AU-3(2)
+     AU-6
+     AU-6(3)
+     AU-8
+     AU-8(1)
+     AU-9
+     AU-9(4)
+     AU-11
+     AU-12
+     CA-1
+     CA-2
+     CA-2(1)
+     CA-2(2)
+     CA-3
+     CA-3(1)
+     CA-3(2)
+     CA-5
+     CA-6
+     CA-7
+     CA-7(1)
+     CA-7(2)
+     CM-1
+     CM-2
+     CM-2(1)
+     CM-2(5)
+     CM-3
+     CM-3(4)
+     CM-4
+     CM-4(2)
+     CM-5
+     CM-5(2)
+     CM-5(5)
+     CM-5(6)
+     CM-6
+     CM-6(3)
+     CM-7
+     CM-7(1)
+     CM-7(3)
+     CM-8
+     CM-8(1)
+     CM-8(4)
+     CM-8(5)
+     CM-9
+     CP-1
+     CP-2
+     CP-3
+     CP-4
+     CP-9
+     CP-9(1)
+     CP-10(2)
+     IA-1
+     IA-2
+     IA-2(1)
+     IA-2(5)
+     IA-2(8)
+     IA-3
+     IA-3(1)
+     IA-3(2)
+     IA-3(3)
+     IA-4
+     IA-4(4)
+     IA-5
+     IA-5(1)
+     IA-5(2)
+     IA-5(3)
+     IA-5(4)
+     IA-5(6)
+     IA-5(7)
+     IA-5(8)
+     IA-6
+     IA-7
+     IA-8
+     IR-1
+     IR-2
+     IR-3
+     IR-4
+     IR-4(1)
+     IR-4(3)
+     IR-4(4)
+     IR-5
+     IR-6
+     IR-6(1)
+     IR-6(2)
+     IR-7
+     IR-7(1)
+     IR-7(2)
+     IR-8
+     MA-1
+     MA-2
+     MA-2(1)
+     MA-3
+     MA-3(2)
+     MA-3(3)
+     MA-4
+     MA-4(2)
+     MA-4(3)
+     MA-4(5)
+     MA-4(6)
+     MA-4(7)
+     MA-5
+     MA-5(1)
+     MP-1
+     MP-2
+     MP-3
+     MP-4
+     MP-5
+     MP-5(2)
+     MP-6
+     MP-6(2)
+     MP-6(3)
+     MP-6(4)
+     MP-6(5)
+     MP-6(6)
+     PE-1
+     PE-2
+     PE-2(1)
+     PE-2(3)
+     PE-3
+     PE-3(2)
+     PE-3(3)
+     PE-5
+     PE-6
+     PE-7
+     PE-7(1)
+     PE-8
+     PE-9
+     PE-10
+     PE-12
+     PE-13
+     PE-14
+     PE-15
+     PE-16
+     PL-1
+     PL-2
+     PL-2(1)
+     PL-2(2)
+     PL-4
+     PL-5
+     PL-6
+     PS-1
+     PS-2
+     PS-3
+     PS-3(1)
+     PS-3(2)
+     PS-3(3)
+     PS-4
+     PS-5
+     PS-6
+     PS-6(1)
+     PS-6(2)
+     PS-7
+     PS-8
+     RA-1
+     RA-2
+     RA-3
+     RA-5
+     RA-5(1)
+     RA-5(2)
+     RA-5(4)
+     RA-5(5)
+     RA-5(7)
+     SA-1
+     SA-2
+     SA-3
+     SA-4
+     SA-4(6)
+     SA-5
+     SA-5(1)
+     SA-5(2)
+     SA-6
+     SA-7
+     SA-8
+     SA-9
+     SA-9(1)
+     SA-10
+     SA-10(1)
+     SA-11
+     SA-12
+     SA-12(2)
+     SC-1
+     SC-2
+     SC-2(1)
+     SC-4
+     SC-5
+     SC-5(1)
+     SC-7
+     SC-7(1)
+     SC-7(2)
+     SC-7(3)
+     SC-7(4)
+     SC-7(5)
+     SC-7(7)
+     SC-7(8)
+     SC-7(11)
+     SC-7(12)
+     SC-7(3)
+     SC-7(14)
+     SC-7(18)
+     SC-8
+     SC-9
+     SC-9(1)
+     SC-10
+     SC-11
+     SC-12
+     SC-12(1)
+     SC-13
+     SC-14
+     SC-15
+     SC-15(1)
+     SC-15(2)
+     SC-15(3)
+     SC-17
+     SC-18
+     SC-18(1)
+     SC-18(2)
+     SC-18(3)
+     SC-18(4)
+     SC-19
+     SC-20
+     SC-20(1)
+     DC-21
+     SC-21(1)
+     SC-22
+     SC-23
+     SC-23(1)
+     SC-23(2)
+     SC-23(3)
+     SC-23(4)
+     SC-24
+     SC-28
+     SI-1
+     SC-2
+     SC-2(3)
+     SC-2(4)
+     SI-3
+     SI-3(1)
+     SC-3(2)
+     SC-3(3)
+     SI-4
+     SI-4(1)
+     SI-4(2)
+     SI-4(4)
+     SI-4(5)
+     SI-4(6)
+     SI-4(7)
+     SI-4(8)
+     SI-4(9)
+     SI-4(11)
+     SI-4(12)
+     SI-4(14)
+     SI-4(15)
+     SI-4(16)
+     SI-4(17)
+     SI-5
+     SI-5(1)
+     SI-6
+     SI-6(1)
+     SI-6(3)
+     SI-8
+     SI-8(1)
+     SI-8(2)
+     SI-9
+     SI-11
+     SI-12
+     PM-1
+     PM-2
+     PM-3
+     PM-4
+     PM-5
+     PM-6
+     PM-7
+     PM-8
+     PM-9
+     PM-10
+     PM-11 -->
+
+
+</Profile>
-- 
1.7.1

_______________________________________________
scap-security-guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide

Reply via email to