No problem. We'll take Ansible ports of the code into the project as well
but there are some things that Ansible can't do around (that I know of)
around compliance introspection of the codebase that keeps us with puppet
so far.

Thanks,

Trevor

On Fri, Mar 6, 2020 at 10:05 AM James Cassell <fedoraproj...@cyberpear.com>
wrote:

>
> On Fri, Mar 6, 2020, at 8:48 AM, Trevor Vaughan wrote:
> > Hi James,
> >
> > From what I've seen of the project (someone please correct me if I'm
> > wrong), the Ansible code from the SSG was meant to help you address
> > individual items without really being a cohesive infrastructure.
> > Cohesive infrastructures take a LOT of time to build and test.
> >
> > What you're asking for is what we do in the FOSS SIMP project
> > https://simp-project.com and we actually run the SSG tests against our
> > enforcement components on a regular basis as well as InSpect tests and
> > compare the two. By doing this, we've found issues in our code, the SSG
> > rules, and the InSpec rules over time.
> >
> > We'd love more interested people to take a look and help us close the
> > feedback loop between the two projects.
> >
>
> Looks like a nice project. I'm just not interested in puppet these days.
> I'll recommend your project to folks who are puppet shops if I come across
> them. (Everyone I work with is using ansible these days.)
>
> V/r,
> James Cassell
>
> > Thanks,
> >
> > Trevor
> >
> >
> > On Fri, Mar 6, 2020 at 12:14 AM James Cassell
> > <fedoraproj...@cyberpear.com> wrote:
> > > On Thu, Mar 5, 2020, at 9:57 PM, Shawn Wells wrote:
> > >  >
> > >  >
> > >  > On 3/5/20 1:00 PM, James Cassell wrote:
> > >  > > On Thu, Mar 5, 2020, at 12:57 PM, Jeff Bachtel wrote:
> > >  > >> Good day. I am trying to apply current RHEL7 STIG guidance to
> AWS EC2
> > >  > instances and have run into issues. Could someone check my
> conclusions
> > >  > below and let me know if I missed something?
> > >  >
> > >  > - OpenSCAP doesn't yet support RHEL7 STIG V2R6 in its in-tree code
> > >  > (including remediation code)
> > >  > - The NIST NCP for RHEL7 from
> > >  > >> https://github.com/ComplianceAsCode/content/tree/master/rhel7
> doesn't
> > >  > yet include STIG V2R4 remediations
> > >  > - The actual DISA RHEL7 STIG XCCDF file does not include fixes,
> such
> > >  > that OpenSCAP could use it to generate remediation scripts
> > >  > - https://github.com/MindPointGroup/RHEL7-STIG is probably the
> best
> > >  > RHEL7 STIG remediation script that's publicly available
> > >  >
> > >  > > All correct from my perspective.
> > >  >
> > >  >
> > >  > To the best of our knowledge there haven't been any substantive
> changes
> > >  > to the DISA content. At least we haven't been informed of any (eg
> rule
> > >  > selections/removals, changing variables like password length, etc).
> > >  >
> > >  > That said, could be interesting to run the Red Hat provided
> > >  > remediations and then re-scan with the DISA-provided content. Goal
> > >
> > >  It's concerning that this hasn't already been done.
> > >
> > >  > would be to see if anything fails... in theory showing any gaps
> between
> > >  > the content.
> > >  >
> > >  > Would you be interested/able to help do that? Here's the ansible
> content:
> > >  >
> > >  > https://galaxy.ansible.com/RedHatOfficial/rhel7_stig
> > >  >
> > >
> > >  Unfortunately, that "RedHatOfficial" ansible role has some problems:
> > >
> > >  1. It does not follow ansible best practices such as prefixing each
> role variable with a variable namespace unique to the role, such as a
> `rhel7_stig_` prefix.
> > >
> > >  2. It is not idempotent
> > >
> > >  3. There is no explanation for any of the variables.
> > >
> > >  4. It's nearly impossible to audit any changes:
> https://github.com/RedHatOfficial/ansible-role-rhel7-stig/commit/3cdf26b66cc723d34ba5dd3ed3d39410f48ae89c
> > >
> > >  >>>> "7,176 additions, 8,160 deletions not shown because the diff is
> too large. Please use a local Git client to view these changes. "
> > >
> > >  5. The thing is a monstrosity at 16K lines for its tasks, so even if
> you audit it once, good luck auditing half of it again next time an update
> is pushed. (The ansible-lockdown (
> https://github.com/ansible/ansible-lockdown ) role currently under the
> MindPointGroup org is also not tiny at 3.8K lines for its tasks.)
> > >
> > >  6. Does not practice DRY (don't repeat yourself), contributing to
> (4). RedHatOfficial show 578 tasks when run with `--list-tasks` whereas
> MindPointGroup shows 314 tasks. (RH lists "only" 84% more unique tasks, but
> has 420% more lines to audit.)
> > >
> > >  7. It's not really an open source project, but generated code from an
> open source project.
> > >
> > >  8. All PRs to the role are being ignored:
> https://github.com/RedHatOfficial/ansible-role-rhel7-stig/pulls
> > >
> > >  9. It clearly hasn't been audited by anyone who is familiar both with
> implementing STIG requirements as a System Administrator and with writing
> and consuming Ansible roles.
> > >
> > >  10. It clearly is not used nor even tested by Red Hat itself. Such
> things as setting the login banner text to the literal REGEX that should
> match the banner, which is completely illegible, and would fail the DISA
> content check. It doesn't look like Red Hat even uses their shipped
> scap-security-guide package to test the "RedHatOfficial" ansible role, as
> this would certainly have been caught.
> > >
> > >  (Yes, they literally set the banner as a regex displayed to the user):
> > >
> `(^You[\s\n]+are[\s\n]+accessing[\s\n]+a[\s\n]+U.S.[\s\n]+Government[\s\n]+`...
> > >
> > >
> > >  I'd previously opened issues against the repo for these and other
> items, but they have been "disappeared", so I can't even refer you to them,
> and it appears that issues have now been turned off entirely for the repo.
> > >
> > >
> > >  Other things I'd be concerned about but haven't checked due to the
> items above:
> > >
> > >  11. Does it remediate a system without bricking it or severely
> disabling it? (scap-security-guide bash remediations did not have this
> property last time I tried 2+ years ago.)
> > >
> > >  12. Does it support ansible check_mode?
> > >
> > >  13. Does check_mode accurately report changes that would be made if
> it were run for real?
> > >
> > >  14. Does every task that reports "OK" (i.e., "not changed") when run
> for real, actually leave the system untouched?
> > >
> > >
> > >  Consider the above my review of the
> https://github.com/RedHatOfficial/ansible-role-rhel7-stig ansible role. I
> Didn't expect to write so much, but there you have it.
> > >
> > >
> > >  V/r,
> > >  James Cassell
> > >  _______________________________________________
> > >  scap-security-guide mailing list --
> scap-security-guide@lists.fedorahosted.org
> > >  To unsubscribe send an email to
> scap-security-guide-le...@lists.fedorahosted.org
> > >  Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > >  List Guidelines:
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> > >  List Archives:
> https://lists.fedorahosted.org/archives/list/scap-security-guide@lists.fedorahosted.org
> >
> >
> > --
> > Trevor Vaughan
> > Vice President, Onyx Point, Inc
> > (410) 541-6699 x788
> >
> _______________________________________________
> scap-security-guide mailing list --
> scap-security-guide@lists.fedorahosted.org
> To unsubscribe send an email to
> scap-security-guide-le...@lists.fedorahosted.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/scap-security-guide@lists.fedorahosted.org
>


-- 
Trevor Vaughan
Vice President, Onyx Point, Inc
(410) 541-6699 x788

-- This account not approved for unencrypted proprietary information --
_______________________________________________
scap-security-guide mailing list -- scap-security-guide@lists.fedorahosted.org
To unsubscribe send an email to scap-security-guide-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/scap-security-guide@lists.fedorahosted.org

Reply via email to