1scap-security-guide(8) System Manager's Manual scap-security-guide(8)
2
3
4
6 SCAP Security Guide - Delivers security guidance, baselines, and asso‐
7 ciated validation mechanisms utilizing the Security Content Automation
8 Protocol (SCAP).
9
10
11
13 The project provides practical security hardening advice for Red Hat
14 products, and also links it to compliance requirements in order to ease
15 deployment activities, such as certification and accreditation. These
16 include requirements in the U.S. government (Federal, Defense, and
17 Intelligence Community) as well as of the financial services and health
18 care industries. For example, high-level and widely-accepted policies
19 such as NIST 800-53 provides prose stating that System Administrators
20 must audit "privileged user actions," but do not define what "privi‐
21 leged actions" are. The SSG bridges the gap between generalized policy
22 requirements and specific implementation guidance, in SCAP formats to
23 support automation whenever possible.
24
25 The projects homepage is located at: https://www.open-scap.org/secu‐
26 rity-policies/scap-security-guide
27
28
29
31 Source Datastream: ssg-firefox-ds.xml
32
33 The Guide to the Secure Configuration of Firefox is broken into 'pro‐
34 files', groupings of security settings that correlate to a known pol‐
35 icy. Available profiles are:
36
37
38
39 Upstream Firefox STIG
40
41 Profile ID: xccdf_org.ssgproject.content_profile_stig-firefox-
42 upstream
43
44 This profile is developed under the DoD consensus model and DISA
45 FSO Vendor STIG process, serving as the upstream development
46 environment for the Firefox STIG.
47
48 As a result of the upstream/downstream relationship between the
49 SCAP Security Guide project and the official DISA FSO STIG base‐
50 line, users should expect variance between SSG and DISA FSO con‐
51 tent. For official DISA FSO STIG content, refer to
52 http://iase.disa.mil/stigs/app-security/browser-guid‐
53 ance/Pages/index.aspx.
54
55 While this profile is packaged by Red Hat as part of the SCAP
56 Security Guide package, please note that commercial support of
57 this SCAP content is NOT available. This profile is provided as
58 example SCAP content with no endorsement for suitability or pro‐
59 duction readiness. Support for this profile is provided by the
60 upstream SCAP Security Guide community on a best-effort basis.
61 The upstream project homepage is https://www.open-scap.org/secu‐
62 rity-policies/scap-security-guide/.
63
64
65
66
67
69 Source Datastream: ssg-jre-ds.xml
70
71 The Guide to the Secure Configuration of Java Runtime Environment is
72 broken into 'profiles', groupings of security settings that correlate
73 to a known policy. Available profiles are:
74
75
76
77 Java Runtime Environment (JRE) STIG
78
79 Profile ID: xccdf_org.ssgproject.content_profile_stig-java-
80 upstream
81
82 The Java Runtime Environment (JRE) is a bundle developed and
83 offered by Oracle Corporation which includes the Java Virtual
84 Machine (JVM), class libraries, and other components necessary
85 to run Java applications and applets. Certain default settings
86 within the JRE pose a security risk so it is necessary to deploy
87 system wide properties to ensure a higher degree of security
88 when utilizing the JRE.
89
90 The IBM Corporation also develops and bundles the Java Runtime
91 Environment (JRE) as well as Red Hat with OpenJDK.
92
93
94
95
96
98 Source Datastream: ssg-rhel6-ds.xml
99
100 The Guide to the Secure Configuration of Red Hat Enterprise Linux 6 is
101 broken into 'profiles', groupings of security settings that correlate
102 to a known policy. Available profiles are:
103
104
105
106 Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
107
108 Profile ID: xccdf_org.ssgproject.content_profile_rht-ccp
109
110 This is a *draft* SCAP profile for Red Hat Certified Cloud
111 Providers
112
113
114 United States Government Configuration Baseline (USGCB)
115
116 Profile ID: xccdf_org.ssgproject.content_profile_usgcb-
117 rhel6-server
118
119 This profile is a working draft for a USGCB submission against
120 RHEL6 Server.
121
122
123 CNSSI 1253 Low/Low/Low Control Baseline
124
125 Profile ID: xccdf_org.ssgproject.content_profile_nist-CL-IL-AL
126
127 This profile follows the Committee on National Security Systems
128 Instruction (CNSSI) No. 1253, "Security Categorization and Con‐
129 trol Selection for National Security Systems" on security con‐
130 trols to meet low confidentiality, low integrity, and low assur‐
131 ance.
132
133
134 Standard System Security Profile for Red Hat Enterprise Linux 6
135
136 Profile ID: xccdf_org.ssgproject.content_profile_standard
137
138 This profile contains rules to ensure standard security baseline
139 of a Red Hat Enterprise Linux 6 system. Regardless of your sys‐
140 tem's workload all of these checks should pass.
141
142
143 DISA STIG for Red Hat Enterprise Linux 6
144
145 Profile ID: xccdf_org.ssgproject.content_profile_stig-
146 rhel6-disa
147
148 This profile contains configuration checks that align to the
149 DISA STIG for Red Hat Enterprise Linux 6.
150
151 In addition to being applicable to RHEL6, DISA recognizes this
152 configuration baseline as applicable to the operating system
153 tier of Red Hat technologies that are based off RHEL6, such as
154 RHEL Server, RHV-H, RHEL for HPC, RHEL Workstation, and Red Hat
155 Storage deployments.
156
157
158 Server Baseline
159
160 Profile ID: xccdf_org.ssgproject.content_profile_server
161
162 This profile is for Red Hat Enterprise Linux 6 acting as a
163 server.
164
165
166 CSCF RHEL6 MLS Core Baseline
167
168 Profile ID: xccdf_org.ssgproject.content_profile_CSCF-RHEL6-MLS
169
170 This profile reflects the Centralized Super Computing Facility
171 (CSCF) baseline for Red Hat Enterprise Linux 6. This baseline
172 has received government ATO through the ICD 503 process, utiliz‐
173 ing the CNSSI 1253 cross domain overlay. This profile should be
174 considered in active development. Additional tailoring will be
175 needed, such as the creation of RBAC roles for production
176 deployment.
177
178
179 C2S for Red Hat Enterprise Linux 6
180
181 Profile ID: xccdf_org.ssgproject.content_profile_C2S
182
183 This profile demonstrates compliance against the U.S. Government
184 Commercial Cloud Services (C2S) baseline. nThis baseline was
185 inspired by the Center for Internet Security (CIS) Red Hat
186 Enterprise Linux 6 Benchmark, v1.2.0 - 06-25-2013. For the SCAP
187 Security Guide project to remain in compliance with CIS' terms
188 and conditions, specifically Restrictions(8), note there is no
189 representation or claim that the C2S profile will ensure a sys‐
190 tem is in compliance or consistency with the CIS baseline.
191
192
193 FTP Server Profile (vsftpd)
194
195 Profile ID: xccdf_org.ssgproject.content_profile_ftp-server
196
197 This is a profile for the vsftpd FTP server.
198
199
200 Example Server Profile
201
202 Profile ID: xccdf_org.ssgproject.content_profile_CS2
203
204 This profile is an example of a customized server profile.
205
206
207 Desktop Baseline
208
209 Profile ID: xccdf_org.ssgproject.content_profile_desktop
210
211 This profile is for a desktop installation of Red Hat Enterprise
212 Linux 6.
213
214
215 PCI-DSS v3 Control Baseline for Red Hat Enterprise Linux 6
216
217 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
218
219 This is a *draft* profile for PCI-DSS v3.
220
221
222 FISMA Medium for Red Hat Enterprise Linux 6
223
224 Profile ID: xccdf_org.ssgproject.content_profile_fisma-medium-
225 rhel6-server
226
227 FISMA Medium for Red Hat Enterprise Linux 6.
228
229
230
231
232
234 Source Datastream: ssg-rhel7-ds.xml
235
236 The Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
237 broken into 'profiles', groupings of security settings that correlate
238 to a known policy. Available profiles are:
239
240
241
242 Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
243
244 Profile ID: xccdf_org.ssgproject.content_profile_rht-ccp
245
246 This profile contains the minimum security relevant configura‐
247 tion settings recommended by Red Hat, Inc for Red Hat Enterprise
248 Linux 7 instances deployed by Red Hat Certified Cloud Providers.
249
250
251 Standard System Security Profile for Red Hat Enterprise Linux 7
252
253 Profile ID: xccdf_org.ssgproject.content_profile_standard
254
255 This profile contains rules to ensure standard security baseline
256 of a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
257 tem's workload all of these checks should pass.
258
259
260 Criminal Justice Information Services (CJIS) Security Policy
261
262 Profile ID: xccdf_org.ssgproject.content_profile_cjis
263
264 This profile is derived from FBI's CJIS v5.4 Security Policy. A
265 copy of this policy can be found at the CJIS Security Policy
266 Resource Center:
267
268 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
269 center
270
271
272 Unclassified Information in Non-federal Information Systems and Organi‐
273 zations (NIST 800-171)
274
275 Profile ID: xccdf_org.ssgproject.content_pro‐
276 file_nist-800-171-cui
277
278 From NIST 800-171, Section 2.2: Security requirements for pro‐
279 tecting the confidentiality of CUI in non-federal information
280 systems and organizations have a well-defined structure that
281 consists of:
282
283 (i) a basic security requirements section; (ii) a derived secu‐
284 rity requirements section.
285
286 The basic security requirements are obtained from FIPS Publica‐
287 tion 200, which provides the high-level and fundamental security
288 requirements for federal information and information systems.
289 The derived security requirements, which supplement the basic
290 security requirements, are taken from the security controls in
291 NIST Special Publication 800-53.
292
293 This profile configures Red Hat Enterprise Linux 7 to the NIST
294 Special Publication 800-53 controls identified for securing Con‐
295 trolled Unclassified Information (CUI).
296
297
298 United States Government Configuration Baseline
299
300 Profile ID: xccdf_org.ssgproject.content_profile_ospp
301
302 This compliance profile reflects the core set of security
303 related configuration settings for deployment of Red Hat Enter‐
304 prise Linux 7.x into U.S. Defense, Intelligence, and Civilian
305 agencies. Development partners and sponsors include the U.S.
306 National Institute of Standards and Technology (NIST), U.S.
307 Department of Defense, the National Security Agency, and Red
308 Hat.
309
310 This baseline implements configuration requirements from the
311 following sources:
312
313 - Committee on National Security Systems Instruction No. 1253
314 (CNSSI 1253) - NIST Controlled Unclassified Information (NIST
315 800-171) - NIST 800-53 control selections for MODERATE impact
316 systems (NIST 800-53) - U.S. Government Configuration Baseline
317 (USGCB) - NIAP Protection Profile for General Purpose Operating
318 Systems v4.0 (OSPP v4.0) - DISA Operating System Security
319 Requirements Guide (OS SRG)
320
321 For any differing configuration requirements, e.g. password
322 lengths, the stricter security setting was chosen. Security
323 Requirement Traceability Guides (RTMs) and sample System Secu‐
324 rity Configuration Guides are provided via the scap-security-
325 guide-docs package.
326
327 This profile reflects U.S. Government consensus content and is
328 developed through the OpenSCAP/SCAP Security Guide initiative,
329 championed by the National Security Agency. Except for differ‐
330 ences in formatting to accommodate publishing processes, this
331 profile mirrors OpenSCAP/SCAP Security Guide content as minor
332 divergences, such as bugfixes, work through the consensus and
333 release processes.
334
335
336 C2S for Red Hat Enterprise Linux 7
337
338 Profile ID: xccdf_org.ssgproject.content_profile_C2S
339
340 This profile demonstrates compliance against the U.S. Government
341 Commercial Cloud Services (C2S) baseline.
342
343 This baseline was inspired by the Center for Internet Security
344 (CIS) Red Hat Enterprise Linux 7 Benchmark, v2.1.1 - 01-31-2017.
345
346 For the SCAP Security Guide project to remain in compliance with
347 CIS' terms and conditions, specifically Restrictions(8), note
348 there is no representation or claim that the C2S profile will
349 ensure a system is in compliance or consistency with the CIS
350 baseline.
351
352
353 DISA STIG for Red Hat Enterprise Linux 7
354
355 Profile ID: xccdf_org.ssgproject.content_profile_stig-
356 rhel7-disa
357
358 This profile contains configuration checks that align to the
359 DISA STIG for Red Hat Enterprise Linux V1R4.
360
361 In addition to being applicable to RHEL7, DISA recognizes this
362 configuration baseline as applicable to the operating system
363 tier of Red Hat technologies that are based off RHEL7, such as:
364
365 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
366 Workstation and Desktop - Red Hat Virtualization Hypervisor
367 (RHV-H) - Red Hat Enterprise Linux for HPC - Red Hat Storage
368
369
370 OSPP - Protection Profile for General Purpose Operating Systems v. 4.2
371
372 Profile ID: xccdf_org.ssgproject.content_profile_ospp42
373
374 This profile reflects mandatory configuration controls identi‐
375 fied in the NIAP Configuration Annex to the Protection Profile
376 for General Purpose Operating Systems (Protection Profile Ver‐
377 sion 4.2).
378
379 This Annex is consistent with CNSSI-1253, which requires US
380 National Security Systems to adhere to certain configuration
381 parameters. Accordingly, configuration guidance produced accord‐
382 ing to the requirements of this Annex is suitable for use in US
383 National Security Systems.
384
385
386 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
387
388 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
389
390 Ensures PCI-DSS v3.2.1 related security configuration settings
391 are applied.
392
393
394 Health Insurance Portability and Accountability Act (HIPAA)
395
396 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
397
398 The HIPAA Security Rule establishes U.S. national standards to
399 protect individuals’ electronic personal health information that
400 is created, received, used, or maintained by a covered entity.
401 The Security Rule requires appropriate administrative, physical
402 and technical safeguards to ensure the confidentiality,
403 integrity, and security of electronic protected health informa‐
404 tion.
405
406 This profile configures Red Hat Enterprise Linux 7 to the HIPAA
407 Security Rule identified for securing of electronic protected
408 health information.
409
410
411
412
413
415 Source Datastream: ssg-rhel8-ds.xml
416
417 The Guide to the Secure Configuration of Red Hat Enterprise Linux 8 is
418 broken into 'profiles', groupings of security settings that correlate
419 to a known policy. Available profiles are:
420
421
422
423 OSPP - Protection Profile for General Purpose Operating Systems
424
425 Profile ID: xccdf_org.ssgproject.content_profile_ospp
426
427 This profile reflects mandatory configuration controls identi‐
428 fied in the NIAP Configuration Annex to the Protection Profile
429 for General Purpose Operating Systems (Protection Profile Ver‐
430 sion 4.2).
431
432
433 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
434
435 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
436
437 Ensures PCI-DSS v3.2.1 related security configuration settings
438 are applied.
439
440
441
442
443
444
446 To scan your system utilizing the OpenSCAP utility against the ospp
447 profile:
448
449 oscap xccdf eval --profile ospp --results /tmp/`hostname`-ssg-
450 results.xml --report /tmp/`hostname`-ssg-results.html --oval-results
451 /usr/share/xml/scap/ssg/content/ssg-rhel7-xccdf.xml
452
453 Additional details can be found on the projects wiki page:
454 https://www.github.com/OpenSCAP/scap-security-guide/wiki
455
456
457
459 /usr/share/xml/scap/ssg/content
460 Houses SCAP content utilizing the following naming conventions:
461
462 SCAP Source Datastreams: ssg-{product}-ds.xml
463
464 CPE Dictionaries: ssg-{product}-cpe-dictionary.xml
465
466 CPE OVAL Content: ssg-{product}-cpe-oval.xml
467
468 OVAL Content: ssg-{product}-oval.xml
469
470 XCCDF Content: ssg-{product}-xccdf.xml
471
472 /usr/share/doc/scap-security-guide/guides/
473 HTML versions of SSG profiles.
474
475 /usr/share/scap-security-guide/ansible/
476 Contains Ansible Playbooks for SSG profiles.
477
478 /usr/share/scap-security-guide/bash/
479 Contains Bash roles for SSG profiles.
480
481
483 The SCAP Security Guide, an open source project jointly maintained by
484 Red Hat and the NSA, provides XCCDF and OVAL content for Red Hat tech‐
485 nologies. As an open source project, community participation extends
486 into U.S. Department of Defense agencies, civilian agencies, academia,
487 and other industrial partners.
488
489 SCAP Security Guide is provided to consumers through Red Hat's Extended
490 Packages for Enterprise Linux (EPEL) repository. As such, SCAP Security
491 Guide content is considered "vendor provided."
492
493 Note that while Red Hat hosts the infrastructure for this project and
494 Red Hat engineers are involved as maintainers and leaders, there is no
495 commercial support contracts or service level agreements provided by
496 Red Hat.
497
498 Support, for both users and developers, is provided through the SCAP
499 Security Guide community.
500
501 Homepage: https://www.open-scap.org/security-policies/scap-security-
502 guide
503
504 Mailing List: https://lists.fedorahosted.org/mailman/listinfo/scap-
505 security-guide
506
507
508
510 SCAP Security Guide content is considered vendor (Red Hat) provided
511 content. Per guidance from the U.S. National Institute of Standards
512 and Technology (NIST), U.S. Government programs are allowed to use Ven‐
513 dor produced SCAP content in absence of "Governmental Authority" check‐
514 lists. The specific NIST verbage:
515 http://web.nvd.nist.gov/view/ncp/repository/glossary?cid=1#Authority
516
517
518
520 DoD Directive (DoDD) 8500.1 requires that "all IA and IA-enabled IT
521 products incorporated into DoD information systems shall be configured
522 in accordance with DoD-approved security configuration guidelines" and
523 tasks Defense Information Systems Agency (DISA) to "develop and provide
524 security configuration guidance for IA and IA-enabled IT products in
525 coordination with Director, NSA." The output of this authority is the
526 DISA Security Technical Implementation Guides, or STIGs. DISA FSO is in
527 the process of moving the STIGs towards the use of the NIST Security
528 Content Automation Protocol (SCAP) in order to "automate" compliance
529 reporting of the STIGs.
530
531 Through a common, shared vision, the SCAP Security Guide community
532 enjoys close collaboration directly with NSA, NIST, and DISA FSO. As
533 stated in Section 1.1 of the Red Hat Enterprise Linux 6 STIG Overview,
534 Version 1, Release 2, issued on 03-JUNE-2013:
535
536 "The consensus content was developed using an open-source project
537 called SCAP Security Guide. The project's website is https://www.open-
538 scap.org/security-policies/scap-security-guide. Except for differences
539 in formatting to accomodate the DISA STIG publishing process, the con‐
540 tent of the Red Hat Enterprise Linux 6 STIG should mirrot the SCAP
541 Security Guide content with only minor divergence as updates from mul‐
542 tiple sources work through the concensus process."
543
544 The DoD STIG for Red Hat Enterprise Linux 6 was released June 2013.
545 Currently, the DoD Red Hat Enterprise Linux 6 STIG contains only XCCDF
546 content and is available online: http://iase.disa.mil/stigs/os/unix-
547 linux/Pages/red-hat.aspx
548
549 Content published against the iase.disa.mil website is authoritative
550 STIG content. The SCAP Security Guide project, as noted in the STIG
551 overview, is considered upstream content. Unlike DISA FSO, the SCAP
552 Security Guide project does publish OVAL automation content. Individual
553 programs and C&A evaluators make program-level determinations on the
554 direct usage of the SCAP Security Guide. Currently there is no blanket
555 approval.
556
557
558
560 oscap(8)
561
562
563
565 Please direct all questions to the SSG mailing list:
566 https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
567
568
569
570version 1 26 Jan 2013 scap-security-guide(8)