Skip to content
This repository was archived by the owner on Sep 12, 2024. It is now read-only.

Commit 2ff58ad

Browse files
authored
Updated OMS baseline plugin (#902)
1 parent 63acb6d commit 2ff58ad

File tree

10 files changed

+166
-150
lines changed

10 files changed

+166
-150
lines changed

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -541,7 +541,7 @@ nxOMSGenerateInventoryMof:
541541

542542
nxOMSPlugin:
543543
rm -rf output/staging; \
544-
VERSION="3.71"; \
544+
VERSION="3.72"; \
545545
PROVIDERS="nxOMSPlugin"; \
546546
STAGINGDIR="output/staging/$@/DSCResources"; \
547547
cat Providers/Modules/$@.psd1 | sed "s@<MODULE_VERSION>@$${VERSION}@" > intermediate/Modules/$@.psd1; \
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2.19.1-265
1+
2.22.0-191

Providers/Modules/Plugins/SecurityBaseline/plugin/asc_audits.xml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -76,12 +76,12 @@
7676
remediation="Run AuditD service (systemctl start auditd)"
7777
ruleId="c146c4a4-5eb6-4205-88da-5a71a82f2d45">
7878
<check distro="*" command="CheckServiceEnabled" expect="running" service="auditd">
79-
<dependency type="PackageInstalled">audit(?:d)?$</dependency>
79+
<dependency type="PackageInstalled">audit(?:d)?$</dependency>
8080
</check>
8181
</audit>
8282
</audits>
8383
<remediations>
84-
<!--
84+
<!--
8585
Remediations are preformed in the order they appear in this file.
8686
All actions in a remediation that match the distro are performed, and in the order they appear.
8787
-->
@@ -100,7 +100,7 @@
100100
<remediation id="fix-cron-job-allow" msids="98" description="Delete /etc/cron.deny and /etc/at.deny. Create /etc/cron.allow and /etc/at.allow.">
101101
<action distro="*" action="ActionScript">
102102
<script>
103-
<![CDATA[
103+
<![CDATA[
104104
if [ -f /etc/cron.deny ]; then
105105
echo "/etc/cron.deny file exists"
106106

Providers/Modules/Plugins/SecurityBaseline/plugin/cis_audits.xml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -178,8 +178,8 @@
178178
<check distro="SLES" command="CheckMatchingLinesAll" path="/etc/pam.d/common-password" filter="password\s+(?:requisite|required)\s+pam_cracklib\.so" regex="(try_first_pass(?:\s+|$))|(minlen=(?:1[4-9]|[2-9][0-9])(?:\s+|$))|(dcredit=-1(?:\s+|$))|(ucredit=-1(?:\s+|$))|(ocredit=-1(?:\s+|$))|(lcredit=-1(?:\s+|$))"/>
179179
<check distro="CentOS=6|RedHat=6|Oracle=6" command="CheckMatchingLinesAll" path="/etc/pam.d/system-auth" filter="password\s+(?:requisite|required)\s+pam_cracklib\.so" regex="(try_first_pass(?:\s+|$))|(minlen=(?:1[4-9]|[2-9][0-9])(?:\s+|$))|(dcredit=-1(?:\s+|$))|(ucredit=-1(?:\s+|$))|(ocredit=-1(?:\s+|$))|(lcredit=-1(?:\s+|$))"/>
180180
<check distro="CentOS=6|RedHat=6|Oracle=6" command="CheckMatchingLinesAll" path="/etc/pam.d/password-auth" filter="password\s+(?:requisite|required)\s+pam_cracklib\.so" regex="(try_first_pass(?:\s+|$))|(minlen=(?:1[4-9]|[2-9][0-9])(?:\s+|$))|(dcredit=-1(?:\s+|$))|(ucredit=-1(?:\s+|$))|(ocredit=-1(?:\s+|$))|(lcredit=-1(?:\s+|$))"/>
181-
<check distro="CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|Mariner" command="CheckFileExists" path="/etc/security/pwquality.conf"/>
182-
<check distro="CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|Mariner" command="CheckPwQuality" path="/etc/security/pwquality.conf"/>
181+
<check distro="CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|Mariner|AlmaLinux|Rocky" command="CheckFileExists" path="/etc/security/pwquality.conf"/>
182+
<check distro="CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|Mariner|AlmaLinux|Rocky" command="CheckPwQuality" path="/etc/security/pwquality.conf"/>
183183
</audit>
184184

185185
<audit
@@ -202,8 +202,8 @@
202202
<check distro="*" command="CheckUserDirs" expect="exists"/>
203203
</audit>
204204

205-
<audit
206-
description="Ensure users own their home directories"
205+
<audit
206+
description="Ensure users own their home directories"
207207
msid="6.2.9"
208208
impact="Since the user is accountable for files stored in the user home directory, the user must be the owner of the directory."
209209
remediation="Change the ownership of any home directories that are not owned by the defined user to the correct user."
@@ -302,7 +302,7 @@
302302
</audit>
303303
</audits>
304304
<remediations>
305-
<!--
305+
<!--
306306
Remediations are preformed in the order they appear in this file.
307307
All actions in a remediation that match the distro are performed, and in the order they appear.
308308
-->
@@ -316,7 +316,7 @@
316316
<action distro="*" action="ActionEditConfig" name="fs.suid_dumpable" value="0" value-regex="[0-9]+" sep="=" path="/etc/sysctl.conf"/>
317317
<action distro="*" action="ActionScript">
318318
<script>
319-
<![CDATA[
319+
<![CDATA[
320320
sysctl -w fs.suid_dumpable=0
321321
]]>
322322
</script>
@@ -341,8 +341,8 @@ sysctl -w fs.suid_dumpable=0
341341

342342
<remediation id="enable-password-requirements" msids="5.3.1" description="Ensure password creation requirements are configured">
343343
<action distro="Ubuntu|Debian" action="ActionInstallPackage" package="libpam-pwquality"/>
344-
<action distro="CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian" action="ActionEditConfig" path="/etc/security/pwquality.conf" name="minlen" sep=" = " value="14" value-regex="[1-9][0-9]*"/>
345-
<action distro="CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian" action="ActionEditConfig" path="/etc/security/pwquality.conf" name="minclass" sep=" = " value="4" value-regex="[0-4]"/>
344+
<action distro="CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|AlmaLinux|Rocky" action="ActionEditConfig" path="/etc/security/pwquality.conf" name="minlen" sep=" = " value="14" value-regex="[1-9][0-9]*"/>
345+
<action distro="CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|AlmaLinux|Rocky" action="ActionEditConfig" path="/etc/security/pwquality.conf" name="minclass" sep=" = " value="4" value-regex="[0-4]"/>
346346
</remediation>
347347

348348
</remediations>

0 commit comments

Comments
 (0)