mitre / canonical-ubuntu-18.04-lts-stig-baseline

(WIP) canonical-ubuntu-18.04-lts-stig-baseline
Other
9 stars 4 forks source link

Add rules and checks for more audit_path V-219273 to V-219277 first /var/log checks V-219213 and V-219214 #43

Closed ghexp closed 3 years ago

aaronlippold commented 3 years ago

I’d like to start setting up the CICD pipeline for this. Are we able to start on the ansible content as part of these pool requests?

I have a fairly decent kitchen ci set up we can borrow from in the other repos.

It’s also a great way to test the profile

Aaron

On Mon, Apr 5, 2021 at 9:54 PM Greg @.***> wrote:


You can view, comment on, or merge this pull request online at:

https://github.com/mitre/canonical-ubuntu-18.04-lts-stig-baseline/pull/43 Commit Summary

  • Add rules and checks for more audit_path V-219273 to V-219277
  • Rules and checks for first of var/log checks V-219213 and V-219214

File Changes

Patch Links:

- https://github.com/mitre/canonical-ubuntu-18.04-lts-stig-baseline/pull/43.patch

https://github.com/mitre/canonical-ubuntu-18.04-lts-stig-baseline/pull/43.diff

— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/mitre/canonical-ubuntu-18.04-lts-stig-baseline/pull/43, or unsubscribe https://github.com/notifications/unsubscribe-auth/AALK42F4K44HV44XKDZACMDTHJSXBANCNFSM42NZAP7Q .

--

Aaron Lippold

@.***

260-255-4779

twitter/aim/yahoo,etc. 'aaronlippold'

ghexp commented 3 years ago

I’d like to start setting up the CICD pipeline for this. Are we able to start on the ansible content as part of these pool requests? I have a fairly decent kitchen ci set up we can borrow from in the other repos. It’s also a great way to test the profile Aaron

The ansible content is included with these PRs by updating the jinja file that gets used. The one ansible rule uses the audit.rules.j2 file that has all the updates to /etc/audit/rules.d/stig.rules. So I've been bumping up the threshold. Are you talking about some other CI/CD that actually tests whether a command generates an audit record properly?