1scap-security-guide(8) System Manager's Manual scap-security-guide(8)
2
3
4
6 SCAP Security Guide - Delivers security guidance, baselines, and asso‐
7 ciated validation mechanisms utilizing the Security Content Automation
8 Protocol (SCAP).
9
10
11
13 The project provides practical security hardening advice for Red Hat
14 products, and also links it to compliance requirements in order to ease
15 deployment activities, such as certification and accreditation. These
16 include requirements in the U.S. government (Federal, Defense, and
17 Intelligence Community) as well as of the financial services and health
18 care industries. For example, high-level and widely-accepted policies
19 such as NIST 800-53 provides prose stating that System Administrators
20 must audit "privileged user actions," but do not define what "privi‐
21 leged actions" are. The SSG bridges the gap between generalized policy
22 requirements and specific implementation guidance, in SCAP formats to
23 support automation whenever possible.
24
25 The projects homepage is located at: https://www.open-scap.org/secu‐
26 rity-policies/scap-security-guide
27
28
29
31 Source Datastream: ssg-centos6-ds.xml
32
33 The Guide to the Secure Configuration of Red Hat Enterprise Linux 6 is
34 broken into 'profiles', groupings of security settings that correlate
35 to a known policy. Available profiles are:
36
37
38
39 PCI-DSS v3 Control Baseline for Red Hat Enterprise Linux 6
40
41 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
42
43 This is a *draft* profile for PCI-DSS v3.
44
45
46 Desktop Baseline
47
48 Profile ID: xccdf_org.ssgproject.content_profile_desktop
49
50 This profile is for a desktop installation of Red Hat Enterprise
51 Linux 6.
52
53
54 Server Baseline
55
56 Profile ID: xccdf_org.ssgproject.content_profile_server
57
58 This profile is for Red Hat Enterprise Linux 6 acting as a
59 server.
60
61
62 Standard System Security Profile for Red Hat Enterprise Linux 6
63
64 Profile ID: xccdf_org.ssgproject.content_profile_standard
65
66 This profile contains rules to ensure standard security baseline
67 of a Red Hat Enterprise Linux 6 system. Regardless of your sys‐
68 tem's workload all of these checks should pass.
69
70
71
72
73
75 Source Datastream: ssg-centos7-ds.xml
76
77 The Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
78 broken into 'profiles', groupings of security settings that correlate
79 to a known policy. Available profiles are:
80
81
82
83 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
84
85 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
86
87 Ensures PCI-DSS v3.2.1 security configuration settings are
88 applied.
89
90
91 Standard System Security Profile for Red Hat Enterprise Linux 7
92
93 Profile ID: xccdf_org.ssgproject.content_profile_standard
94
95 This profile contains rules to ensure standard security baseline
96 of a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
97 tem's workload all of these checks should pass.
98
99
100
101
102
104 Source Datastream: ssg-centos8-ds.xml
105
106 The Guide to the Secure Configuration of Red Hat Enterprise Linux 8 is
107 broken into 'profiles', groupings of security settings that correlate
108 to a known policy. Available profiles are:
109
110
111
112 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
113
114 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
115
116 Ensures PCI-DSS v3.2.1 security configuration settings are
117 applied.
118
119
120 Standard System Security Profile for Red Hat Enterprise Linux 8
121
122 Profile ID: xccdf_org.ssgproject.content_profile_standard
123
124 This profile contains rules to ensure standard security baseline
125 of a Red Hat Enterprise Linux 8 system. Regardless of your sys‐
126 tem's workload all of these checks should pass.
127
128
129
130
131
133 Source Datastream: ssg-chromium-ds.xml
134
135 The Guide to the Secure Configuration of Chromium is broken into 'pro‐
136 files', groupings of security settings that correlate to a known pol‐
137 icy. Available profiles are:
138
139
140
141 Upstream STIG for Google Chromium
142
143 Profile ID: xccdf_org.ssgproject.content_profile_stig
144
145 This profile is developed under the DoD consensus model and DISA
146 FSO Vendor STIG process, serving as the upstream development
147 environment for the Google Chromium STIG.
148
149 As a result of the upstream/downstream relationship between the
150 SCAP Security Guide project and the official DISA FSO STIG base‐
151 line, users should expect variance between SSG and DISA FSO con‐
152 tent. For official DISA FSO STIG content, refer to https://pub‐
153 lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
154 rity%2Cbrowser-guidance.
155
156 While this profile is packaged by Red Hat as part of the SCAP
157 Security Guide package, please note that commercial support of
158 this SCAP content is NOT available. This profile is provided as
159 example SCAP content with no endorsement for suitability or pro‐
160 duction readiness. Support for this profile is provided by the
161 upstream SCAP Security Guide community on a best-effort basis.
162 The upstream project homepage is https://www.open-scap.org/secu‐
163 rity-policies/scap-security-guide/.
164
165
166
167
168
170 Source Datastream: ssg-debian10-ds.xml
171
172 The Guide to the Secure Configuration of Debian 10 is broken into 'pro‐
173 files', groupings of security settings that correlate to a known pol‐
174 icy. Available profiles are:
175
176
177
178 Profile for ANSSI DAT-NT28 Minimal Level
179
180 Profile ID: xccdf_org.ssgproject.content_pro‐
181 file_anssi_np_nt28_minimal
182
183 This profile contains items to be applied systematically.
184
185
186 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
187
188 Profile ID: xccdf_org.ssgproject.content_pro‐
189 file_anssi_np_nt28_average
190
191 This profile contains items for GNU/Linux installations already
192 protected by multiple higher level security stacks.
193
194
195 Standard System Security Profile for Debian 10
196
197 Profile ID: xccdf_org.ssgproject.content_profile_standard
198
199 This profile contains rules to ensure standard security baseline
200 of a Debian 10 system. Regardless of your system's workload all
201 of these checks should pass.
202
203
204 Profile for ANSSI DAT-NT28 Restrictive Level
205
206 Profile ID: xccdf_org.ssgproject.content_pro‐
207 file_anssi_np_nt28_restrictive
208
209 This profile contains items for GNU/Linux installations exposed
210 to unauthenticated flows or multiple sources.
211
212
213 Profile for ANSSI DAT-NT28 High (Enforced) Level
214
215 Profile ID: xccdf_org.ssgproject.content_pro‐
216 file_anssi_np_nt28_high
217
218 This profile contains items for GNU/Linux installations storing
219 sensitive informations that can be accessible from unauthenti‐
220 cated or uncontroled networks.
221
222
223
224
225
227 Source Datastream: ssg-debian8-ds.xml
228
229 The Guide to the Secure Configuration of Debian 8 is broken into 'pro‐
230 files', groupings of security settings that correlate to a known pol‐
231 icy. Available profiles are:
232
233
234
235 Profile for ANSSI DAT-NT28 Minimal Level
236
237 Profile ID: xccdf_org.ssgproject.content_pro‐
238 file_anssi_np_nt28_minimal
239
240 This profile contains items to be applied systematically.
241
242
243 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
244
245 Profile ID: xccdf_org.ssgproject.content_pro‐
246 file_anssi_np_nt28_average
247
248 This profile contains items for GNU/Linux installations already
249 protected by multiple higher level security stacks.
250
251
252 Standard System Security Profile for Debian 8
253
254 Profile ID: xccdf_org.ssgproject.content_profile_standard
255
256 This profile contains rules to ensure standard security baseline
257 of a Debian 8 system. Regardless of your system's workload all
258 of these checks should pass.
259
260
261 Profile for ANSSI DAT-NT28 Restrictive Level
262
263 Profile ID: xccdf_org.ssgproject.content_pro‐
264 file_anssi_np_nt28_restrictive
265
266 This profile contains items for GNU/Linux installations exposed
267 to unauthenticated flows or multiple sources.
268
269
270 Profile for ANSSI DAT-NT28 High (Enforced) Level
271
272 Profile ID: xccdf_org.ssgproject.content_pro‐
273 file_anssi_np_nt28_high
274
275 This profile contains items for GNU/Linux installations storing
276 sensitive informations that can be accessible from unauthenti‐
277 cated or uncontroled networks.
278
279
280
281
282
284 Source Datastream: ssg-debian9-ds.xml
285
286 The Guide to the Secure Configuration of Debian 9 is broken into 'pro‐
287 files', groupings of security settings that correlate to a known pol‐
288 icy. Available profiles are:
289
290
291
292 Profile for ANSSI DAT-NT28 Minimal Level
293
294 Profile ID: xccdf_org.ssgproject.content_pro‐
295 file_anssi_np_nt28_minimal
296
297 This profile contains items to be applied systematically.
298
299
300 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
301
302 Profile ID: xccdf_org.ssgproject.content_pro‐
303 file_anssi_np_nt28_average
304
305 This profile contains items for GNU/Linux installations already
306 protected by multiple higher level security stacks.
307
308
309 Standard System Security Profile for Debian 9
310
311 Profile ID: xccdf_org.ssgproject.content_profile_standard
312
313 This profile contains rules to ensure standard security baseline
314 of a Debian 9 system. Regardless of your system's workload all
315 of these checks should pass.
316
317
318 Profile for ANSSI DAT-NT28 Restrictive Level
319
320 Profile ID: xccdf_org.ssgproject.content_pro‐
321 file_anssi_np_nt28_restrictive
322
323 This profile contains items for GNU/Linux installations exposed
324 to unauthenticated flows or multiple sources.
325
326
327 Profile for ANSSI DAT-NT28 High (Enforced) Level
328
329 Profile ID: xccdf_org.ssgproject.content_pro‐
330 file_anssi_np_nt28_high
331
332 This profile contains items for GNU/Linux installations storing
333 sensitive informations that can be accessible from unauthenti‐
334 cated or uncontroled networks.
335
336
337
338
339
341 Source Datastream: ssg-eap6-ds.xml
342
343 The Guide to the Secure Configuration of JBoss EAP 6 is broken into
344 'profiles', groupings of security settings that correlate to a known
345 policy. Available profiles are:
346
347
348
349 STIG for JBoss Enterprise Application Platform 6
350
351 Profile ID: xccdf_org.ssgproject.content_profile_stig
352
353 This is a *draft* profile for STIG. This profile is being devel‐
354 oped under the DoD consensus model to become a STIG in coordina‐
355 tion with DISA FSO.
356
357
358
359
360
362 Source Datastream: ssg-fedora-ds.xml
363
364 The Guide to the Secure Configuration of Fedora is broken into 'pro‐
365 files', groupings of security settings that correlate to a known pol‐
366 icy. Available profiles are:
367
368
369
370 PCI-DSS v3 Control Baseline for Fedora
371
372 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
373
374 Ensures PCI-DSS v3 related security configuration settings are
375 applied.
376
377
378 Standard System Security Profile for Fedora
379
380 Profile ID: xccdf_org.ssgproject.content_profile_standard
381
382 This profile contains rules to ensure standard security baseline
383 of a Fedora system. Regardless of your system's workload all of
384 these checks should pass.
385
386
387 OSPP - Protection Profile for General Purpose Operating Systems
388
389 Profile ID: xccdf_org.ssgproject.content_profile_ospp
390
391 This profile reflects mandatory configuration controls identi‐
392 fied in the NIAP Configuration Annex to the Protection Profile
393 for General Purpose Operating Systems (Protection Profile Ver‐
394 sion 4.2).
395
396 As Fedora OS is moving target, this profile does not guarantee
397 to provide security levels required from US National Security
398 Systems. Main goal of the profile is to provide Fedora develop‐
399 ers with hardened environment similar to the one mandated by US
400 National Security Systems.
401
402
403
404
405
407 Source Datastream: ssg-firefox-ds.xml
408
409 The Guide to the Secure Configuration of Firefox is broken into 'pro‐
410 files', groupings of security settings that correlate to a known pol‐
411 icy. Available profiles are:
412
413
414
415 Upstream Firefox STIG
416
417 Profile ID: xccdf_org.ssgproject.content_profile_stig
418
419 This profile is developed under the DoD consensus model and DISA
420 FSO Vendor STIG process, serving as the upstream development
421 environment for the Firefox STIG.
422
423 As a result of the upstream/downstream relationship between the
424 SCAP Security Guide project and the official DISA FSO STIG base‐
425 line, users should expect variance between SSG and DISA FSO con‐
426 tent. For official DISA FSO STIG content, refer to https://pub‐
427 lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
428 rity%2Cbrowser-guidance.
429
430 While this profile is packaged by Red Hat as part of the SCAP
431 Security Guide package, please note that commercial support of
432 this SCAP content is NOT available. This profile is provided as
433 example SCAP content with no endorsement for suitability or pro‐
434 duction readiness. Support for this profile is provided by the
435 upstream SCAP Security Guide community on a best-effort basis.
436 The upstream project homepage is https://www.open-scap.org/secu‐
437 rity-policies/scap-security-guide/.
438
439
440
441
442
444 Source Datastream: ssg-fuse6-ds.xml
445
446 The Guide to the Secure Configuration of JBoss Fuse 6 is broken into
447 'profiles', groupings of security settings that correlate to a known
448 policy. Available profiles are:
449
450
451
452 Standard System Security Profile for JBoss
453
454 Profile ID: xccdf_org.ssgproject.content_profile_standard
455
456 This profile contains rules to ensure standard security baseline
457 of JBoss Fuse. Regardless of your system's workload all of these
458 checks should pass.
459
460
461 STIG for JBoss Fuse 6
462
463 Profile ID: xccdf_org.ssgproject.content_profile_stig
464
465 This is a *draft* profile for STIG. This profile is being devel‐
466 oped under the DoD consensus model to become a STIG in coordina‐
467 tion with DISA FSO.
468
469
470 STIG for Apache ActiveMQ
471
472 Profile ID: xccdf_org.ssgproject.content_profile_amq-stig
473
474 This is a *draft* profile for STIG. This profile is being devel‐
475 oped under the DoD consensus model to become a STIG in coordina‐
476 tion with DISA FSO.
477
478
479
480
481
483 Source Datastream: ssg-jre-ds.xml
484
485 The Guide to the Secure Configuration of Java Runtime Environment is
486 broken into 'profiles', groupings of security settings that correlate
487 to a known policy. Available profiles are:
488
489
490
491 Java Runtime Environment (JRE) STIG
492
493 Profile ID: xccdf_org.ssgproject.content_profile_stig
494
495 The Java Runtime Environment (JRE) is a bundle developed and
496 offered by Oracle Corporation which includes the Java Virtual
497 Machine (JVM), class libraries, and other components necessary
498 to run Java applications and applets. Certain default settings
499 within the JRE pose a security risk so it is necessary to deploy
500 system wide properties to ensure a higher degree of security
501 when utilizing the JRE.
502
503 The IBM Corporation also develops and bundles the Java Runtime
504 Environment (JRE) as well as Red Hat with OpenJDK.
505
506
507
508
509
511 Platform 3
512 Source Datastream: ssg-ocp3-ds.xml
513
514 The Guide to the Secure Configuration of Red Hat OpenShift Container
515 Platform 3 is broken into 'profiles', groupings of security settings
516 that correlate to a known policy. Available profiles are:
517
518
519
520 Open Computing Information Security Profile for OpenShift Node
521
522 Profile ID: xccdf_org.ssgproject.content_profile_opencis-node
523
524 This baseline was inspired by the Center for Internet Security
525 (CIS) Kubernetes Benchmark, v1.2.0 - 01-31-2017.
526
527 For the ComplianceAsCode project to remain in compliance with
528 CIS' terms and conditions, specifically Restrictions(8), note
529 there is no representation or claim that the OpenCIS profile
530 will ensure a system is in compliance or consistency with the
531 CIS baseline.
532
533
534 Open Computing Information Security Profile for OpenShift Master Node
535
536 Profile ID: xccdf_org.ssgproject.content_profile_opencis-master
537
538 This baseline was inspired by the Center for Internet Security
539 (CIS) Kubernetes Benchmark, v1.2.0 - 01-31-2017.
540
541 For the ComplianceAsCode project to remain in compliance with
542 CIS' terms and conditions, specifically Restrictions(8), note
543 there is no representation or claim that the OpenCIS profile
544 will ensure a system is in compliance or consistency with the
545 CIS baseline.
546
547
548
549
550
552 Platform 4
553 Source Datastream: ssg-ocp4-ds.xml
554
555 The Guide to the Secure Configuration of Red Hat OpenShift Container
556 Platform 4 is broken into 'profiles', groupings of security settings
557 that correlate to a known policy. Available profiles are:
558
559
560
561 NIST National Checklist for Red Hat Enterprise Linux CoreOS
562
563 Profile ID: xccdf_org.ssgproject.content_profile_coreos-ncp
564
565 This compliance profile reflects the core set of security
566 related configuration settings for deployment of Red Hat Enter‐
567 prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
568 agencies. Development partners and sponsors include the U.S.
569 National Institute of Standards and Technology (NIST), U.S.
570 Department of Defense, the National Security Agency, and Red
571 Hat.
572
573 This baseline implements configuration requirements from the
574 following sources:
575
576 - Committee on National Security Systems Instruction No. 1253
577 (CNSSI 1253) - NIST Controlled Unclassified Information (NIST
578 800-171) - NIST 800-53 control selections for MODERATE impact
579 systems (NIST 800-53) - U.S. Government Configuration Baseline
580 (USGCB) - NIAP Protection Profile for General Purpose Operating
581 Systems v4.2.1 (OSPP v4.2.1) - DISA Operating System Security
582 Requirements Guide (OS SRG)
583
584 For any differing configuration requirements, e.g. password
585 lengths, the stricter security setting was chosen. Security
586 Requirement Traceability Guides (RTMs) and sample System Secu‐
587 rity Configuration Guides are provided via the scap-security-
588 guide-docs package.
589
590 This profile reflects U.S. Government consensus content and is
591 developed through the OpenSCAP/SCAP Security Guide initiative,
592 championed by the National Security Agency. Except for differ‐
593 ences in formatting to accommodate publishing processes, this
594 profile mirrors OpenSCAP/SCAP Security Guide content as minor
595 divergences, such as bugfixes, work through the consensus and
596 release processes.
597
598
599 Open Computing Information Security Profile for OpenShift Node
600
601 Profile ID: xccdf_org.ssgproject.content_profile_opencis-node
602
603 This baseline was inspired by the Center for Internet Security
604 (CIS) Kubernetes Benchmark, v1.2.0 - 01-31-2017.
605
606 For the ComplianceAsCode project to remain in compliance with
607 CIS' terms and conditions, specifically Restrictions(8), note
608 there is no representation or claim that the OpenCIS profile
609 will ensure a system is in compliance or consistency with the
610 CIS baseline.
611
612
613 NIST National Checklist for Red Hat Enterprise Linux CoreOS
614
615 Profile ID: xccdf_org.ssgproject.content_profile_moderate
616
617 This compliance profile reflects the core set of security
618 related configuration settings for deployment of Red Hat Enter‐
619 prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
620 agencies. Development partners and sponsors include the U.S.
621 National Institute of Standards and Technology (NIST), U.S.
622 Department of Defense, the National Security Agency, and Red
623 Hat.
624
625 This baseline implements configuration requirements from the
626 following sources:
627
628 - Committee on National Security Systems Instruction No. 1253
629 (CNSSI 1253) - NIST Controlled Unclassified Information (NIST
630 800-171) - NIST 800-53 control selections for MODERATE impact
631 systems (NIST 800-53) - U.S. Government Configuration Baseline
632 (USGCB) - NIAP Protection Profile for General Purpose Operating
633 Systems v4.2.1 (OSPP v4.2.1) - DISA Operating System Security
634 Requirements Guide (OS SRG)
635
636 For any differing configuration requirements, e.g. password
637 lengths, the stricter security setting was chosen. Security
638 Requirement Traceability Guides (RTMs) and sample System Secu‐
639 rity Configuration Guides are provided via the scap-security-
640 guide-docs package.
641
642 This profile reflects U.S. Government consensus content and is
643 developed through the OpenSCAP/SCAP Security Guide initiative,
644 championed by the National Security Agency. Except for differ‐
645 ences in formatting to accommodate publishing processes, this
646 profile mirrors OpenSCAP/SCAP Security Guide content as minor
647 divergences, such as bugfixes, work through the consensus and
648 release processes.
649
650
651 Open Computing Information Security Profile for OpenShift Master Node
652
653 Profile ID: xccdf_org.ssgproject.content_profile_opencis-master
654
655 This baseline was inspired by the Center for Internet Security
656 (CIS) Kubernetes Benchmark, v1.5.0 - 10-14-2019.
657
658 For the ComplianceAsCode project to remain in compliance with
659 CIS' terms and conditions, specifically Restrictions(8), note
660 there is no representation or claim that the OpenCIS profile
661 will ensure a system is in compliance or consistency with the
662 CIS baseline.
663
664
665
666
667
669 Source Datastream: ssg-ol7-ds.xml
670
671 The Guide to the Secure Configuration of Oracle Linux 7 is broken into
672 'profiles', groupings of security settings that correlate to a known
673 policy. Available profiles are:
674
675
676
677 PCI-DSS v3 Control Baseline Draft for Oracle Linux 7
678
679 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
680
681 Ensures PCI-DSS v3 related security configuration settings are
682 applied.
683
684
685 Standard System Security Profile for Oracle Linux 7
686
687 Profile ID: xccdf_org.ssgproject.content_profile_standard
688
689 This profile contains rules to ensure standard security baseline
690 of Oracle Linux 7 system. Regardless of your system's workload
691 all of these checks should pass.
692
693
694 DRAFT - DISA STIG for Oracle Linux 7
695
696 Profile ID: xccdf_org.ssgproject.content_profile_stig
697
698 This is a *draft* profile for STIG for Oracle Linux 7.
699
700
701 Security Profile of Oracle Linux 7 for SAP
702
703 Profile ID: xccdf_org.ssgproject.content_profile_sap
704
705 This profile contains rules for Oracle Linux 7 Operating System
706 in compliance with SAP note 2069760 and SAP Security Baseline
707 Template version 1.9 Item I-8 and section 4.1.2.2. Regardless
708 of your system's workload all of these checks should pass.
709
710
711
712
713
715 Source Datastream: ssg-ol8-ds.xml
716
717 The Guide to the Secure Configuration of Oracle Linux 8 is broken into
718 'profiles', groupings of security settings that correlate to a known
719 policy. Available profiles are:
720
721
722
723 PCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 8
724
725 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
726
727 Ensures PCI-DSS v3.2.1 related security configuration settings
728 are applied.
729
730
731 Criminal Justice Information Services (CJIS) Security Policy
732
733 Profile ID: xccdf_org.ssgproject.content_profile_cjis
734
735 This profile is derived from FBI's CJIS v5.4 Security Policy. A
736 copy of this policy can be found at the CJIS Security Policy
737 Resource Center:
738
739 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
740 center
741
742
743 Standard System Security Profile for Oracle Linux 8
744
745 Profile ID: xccdf_org.ssgproject.content_profile_standard
746
747 This profile contains rules to ensure standard security baseline
748 of Oracle Linux 8 system. Regardless of your system's workload
749 all of these checks should pass.
750
751
752 [DRAFT] Protection Profile for General Purpose Operating Systems
753
754 Profile ID: xccdf_org.ssgproject.content_profile_ospp
755
756 This profile reflects mandatory configuration controls identi‐
757 fied in the NIAP Configuration Annex to the Protection Profile
758 for General Purpose Operating Systems (Protection Profile Ver‐
759 sion 4.2.1).
760
761 This configuration profile is consistent with CNSSI-1253, which
762 requires U.S. National Security Systems to adhere to certain
763 configuration parameters. Accordingly, this configuration pro‐
764 file is suitable for use in U.S. National Security Systems.
765
766
767 Unclassified Information in Non-federal Information Systems and Organi‐
768 zations (NIST 800-171)
769
770 Profile ID: xccdf_org.ssgproject.content_profile_cui
771
772 From NIST 800-171, Section 2.2: Security requirements for pro‐
773 tecting the confidentiality of CUI in nonfederal information
774 systems and organizations have a well-defined structure that
775 consists of:
776
777 (i) a basic security requirements section; (ii) a derived secu‐
778 rity requirements section.
779
780 The basic security requirements are obtained from FIPS Publica‐
781 tion 200, which provides the high-level and fundamental security
782 requirements for federal information and information systems.
783 The derived security requirements, which supplement the basic
784 security requirements, are taken from the security controls in
785 NIST Special Publication 800-53.
786
787 This profile configures Oracle Linux 8 to the NIST Special Pub‐
788 lication 800-53 controls identified for securing Controlled
789 Unclassified Information (CUI).
790
791
792 [DRAFT] Australian Cyber Security Centre (ACSC) Essential Eight
793
794 Profile ID: xccdf_org.ssgproject.content_profile_e8
795
796 This profile contains configuration checks for Oracle Linux 8
797 that align to the Australian Cyber Security Centre (ACSC) Essen‐
798 tial Eight.
799
800 A copy of the Essential Eight in Linux Environments guide can be
801 found at the ACSC website:
802
803 https://www.cyber.gov.au/publications/essential-eight-in-linux-
804 environments
805
806
807 Health Insurance Portability and Accountability Act (HIPAA)
808
809 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
810
811 The HIPAA Security Rule establishes U.S. national standards to
812 protect individuals’ electronic personal health information that
813 is created, received, used, or maintained by a covered entity.
814 The Security Rule requires appropriate administrative, physical
815 and technical safeguards to ensure the confidentiality,
816 integrity, and security of electronic protected health informa‐
817 tion.
818
819 This profile configures Oracle Linux 8 to the HIPAA Security
820 Rule identified for securing of electronic protected health
821 information.
822
823
824
825
826
828 Source Datastream: ssg-opensuse-ds.xml
829
830 The Guide to the Secure Configuration of openSUSE is broken into 'pro‐
831 files', groupings of security settings that correlate to a known pol‐
832 icy. Available profiles are:
833
834
835
836 Standard System Security Profile for openSUSE
837
838 Profile ID: xccdf_org.ssgproject.content_profile_standard
839
840 This profile contains rules to ensure standard security baseline
841 of an openSUSE system. Regardless of your system's workload all
842 of these checks should pass.
843
844
845
846
847
849 Source Datastream: ssg-rhel6-ds.xml
850
851 The Guide to the Secure Configuration of Red Hat Enterprise Linux 6 is
852 broken into 'profiles', groupings of security settings that correlate
853 to a known policy. Available profiles are:
854
855
856
857 PCI-DSS v3 Control Baseline for Red Hat Enterprise Linux 6
858
859 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
860
861 This is a *draft* profile for PCI-DSS v3.
862
863
864 Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
865
866 Profile ID: xccdf_org.ssgproject.content_profile_rht-ccp
867
868 This is a *draft* SCAP profile for Red Hat Certified Cloud
869 Providers
870
871
872 Desktop Baseline
873
874 Profile ID: xccdf_org.ssgproject.content_profile_desktop
875
876 This profile is for a desktop installation of Red Hat Enterprise
877 Linux 6.
878
879
880 Server Baseline
881
882 Profile ID: xccdf_org.ssgproject.content_profile_server
883
884 This profile is for Red Hat Enterprise Linux 6 acting as a
885 server.
886
887
888 CNSSI 1253 Low/Low/Low Control Baseline
889
890 Profile ID: xccdf_org.ssgproject.content_profile_nist-CL-IL-AL
891
892 This profile follows the Committee on National Security Systems
893 Instruction (CNSSI) No. 1253, "Security Categorization and Con‐
894 trol Selection for National Security Systems" on security con‐
895 trols to meet low confidentiality, low integrity, and low assur‐
896 ance.
897
898
899 Standard System Security Profile for Red Hat Enterprise Linux 6
900
901 Profile ID: xccdf_org.ssgproject.content_profile_standard
902
903 This profile contains rules to ensure standard security baseline
904 of a Red Hat Enterprise Linux 6 system. Regardless of your sys‐
905 tem's workload all of these checks should pass.
906
907
908 Example Server Profile
909
910 Profile ID: xccdf_org.ssgproject.content_profile_CS2
911
912 This profile is an example of a customized server profile.
913
914
915 DISA STIG for Red Hat Enterprise Linux 6
916
917 Profile ID: xccdf_org.ssgproject.content_profile_stig
918
919 This profile contains configuration checks that align to the
920 DISA STIG for Red Hat Enterprise Linux 6.
921
922 In addition to being applicable to RHEL6, DISA recognizes this
923 configuration baseline as applicable to the operating system
924 tier of Red Hat technologies that are based on RHEL6, such as
925 RHEL Server, RHV-H, RHEL for HPC, RHEL Workstation, and Red Hat
926 Storage deployments.
927
928
929 United States Government Configuration Baseline (USGCB)
930
931 Profile ID: xccdf_org.ssgproject.content_profile_usgcb-
932 rhel6-server
933
934 This profile is a working draft for a USGCB submission against
935 RHEL6 Server.
936
937
938 FTP Server Profile (vsftpd)
939
940 Profile ID: xccdf_org.ssgproject.content_profile_ftp-server
941
942 This is a profile for the vsftpd FTP server.
943
944
945 CSCF RHEL6 MLS Core Baseline
946
947 Profile ID: xccdf_org.ssgproject.content_profile_CSCF-RHEL6-MLS
948
949 This profile reflects the Centralized Super Computing Facility
950 (CSCF) baseline for Red Hat Enterprise Linux 6. This baseline
951 has received government ATO through the ICD 503 process, utiliz‐
952 ing the CNSSI 1253 cross domain overlay. This profile should be
953 considered in active development. Additional tailoring will be
954 needed, such as the creation of RBAC roles for production
955 deployment.
956
957
958 C2S for Red Hat Enterprise Linux 6
959
960 Profile ID: xccdf_org.ssgproject.content_profile_C2S
961
962 This profile demonstrates compliance against the U.S. Government
963 Commercial Cloud Services (C2S) baseline. nThis baseline was
964 inspired by the Center for Internet Security (CIS) Red Hat
965 Enterprise Linux 6 Benchmark, v1.2.0 - 06-25-2013. For the SCAP
966 Security Guide project to remain in compliance with CIS' terms
967 and conditions, specifically Restrictions(8), note there is no
968 representation or claim that the C2S profile will ensure a sys‐
969 tem is in compliance or consistency with the CIS baseline.
970
971
972 FISMA Medium for Red Hat Enterprise Linux 6
973
974 Profile ID: xccdf_org.ssgproject.content_profile_fisma-medium-
975 rhel6-server
976
977 FISMA Medium for Red Hat Enterprise Linux 6.
978
979
980
981
982
984 Source Datastream: ssg-rhel7-ds.xml
985
986 The Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
987 broken into 'profiles', groupings of security settings that correlate
988 to a known policy. Available profiles are:
989
990
991
992 DRAFT - ANSSI DAT-NT28 (enhanced)
993
994 Profile ID: xccdf_org.ssgproject.content_pro‐
995 file_anssi_nt28_enhanced
996
997 Draft profile for ANSSI compliance at the enhanced level. ANSSI
998 stands for Agence nationale de la sécurité des systèmes d'infor‐
999 mation. Based on https://www.ssi.gouv.fr/.
1000
1001
1002 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
1003
1004 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1005
1006 Ensures PCI-DSS v3.2.1 security configuration settings are
1007 applied.
1008
1009
1010 Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
1011
1012 Profile ID: xccdf_org.ssgproject.content_profile_rht-ccp
1013
1014 This profile contains the minimum security relevant configura‐
1015 tion settings recommended by Red Hat, Inc for Red Hat Enterprise
1016 Linux 7 instances deployed by Red Hat Certified Cloud Providers.
1017
1018
1019 Criminal Justice Information Services (CJIS) Security Policy
1020
1021 Profile ID: xccdf_org.ssgproject.content_profile_cjis
1022
1023 This profile is derived from FBI's CJIS v5.4 Security Policy. A
1024 copy of this policy can be found at the CJIS Security Policy
1025 Resource Center:
1026
1027 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
1028 center
1029
1030
1031 Standard System Security Profile for Red Hat Enterprise Linux 7
1032
1033 Profile ID: xccdf_org.ssgproject.content_profile_standard
1034
1035 This profile contains rules to ensure standard security baseline
1036 of a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
1037 tem's workload all of these checks should pass.
1038
1039
1040 DISA STIG for Red Hat Enterprise Linux 7
1041
1042 Profile ID: xccdf_org.ssgproject.content_profile_stig
1043
1044 This profile contains configuration checks that align to the
1045 DISA STIG for Red Hat Enterprise Linux V1R4.
1046
1047 In addition to being applicable to Red Hat Enterprise Linux 7,
1048 DISA recognizes this configuration baseline as applicable to the
1049 operating system tier of Red Hat technologies that are based on
1050 Red Hat Enterprise Linux 7, such as:
1051
1052 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
1053 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1054 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1055 7 image
1056
1057
1058 VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Enter‐
1059 prise Linux Hypervisor (RHELH)
1060
1061 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-vpp
1062
1063 This compliance profile reflects the core set of security
1064 related configuration settings for deployment of Red Hat Enter‐
1065 prise Linux Hypervisor (RHELH) 7.x into U.S. Defense, Intelli‐
1066 gence, and Civilian agencies. Development partners and sponsors
1067 include the U.S. National Institute of Standards and Technology
1068 (NIST), U.S. Department of Defense, the National Security
1069 Agency, and Red Hat.
1070
1071 This baseline implements configuration requirements from the
1072 following sources:
1073
1074 - Committee on National Security Systems Instruction No. 1253
1075 (CNSSI 1253) - NIST 800-53 control selections for MODERATE
1076 impact systems (NIST 800-53) - U.S. Government Configuration
1077 Baseline (USGCB) - NIAP Protection Profile for Virtualization
1078 v1.0 (VPP v1.0)
1079
1080 For any differing configuration requirements, e.g. password
1081 lengths, the stricter security setting was chosen. Security
1082 Requirement Traceability Guides (RTMs) and sample System Secu‐
1083 rity Configuration Guides are provided via the scap-security-
1084 guide-docs package.
1085
1086 This profile reflects U.S. Government consensus content and is
1087 developed through the ComplianceAsCode project, championed by
1088 the National Security Agency. Except for differences in format‐
1089 ting to accommodate publishing processes, this profile mirrors
1090 ComplianceAsCode content as minor divergences, such as bugfixes,
1091 work through the consensus and release processes.
1092
1093
1094 NIST National Checklist Program Security Guide
1095
1096 Profile ID: xccdf_org.ssgproject.content_profile_ncp
1097
1098 This compliance profile reflects the core set of security
1099 related configuration settings for deployment of Red Hat Enter‐
1100 prise Linux 7.x into U.S. Defense, Intelligence, and Civilian
1101 agencies. Development partners and sponsors include the U.S.
1102 National Institute of Standards and Technology (NIST), U.S.
1103 Department of Defense, the National Security Agency, and Red
1104 Hat.
1105
1106 This baseline implements configuration requirements from the
1107 following sources:
1108
1109 - Committee on National Security Systems Instruction No. 1253
1110 (CNSSI 1253) - NIST Controlled Unclassified Information (NIST
1111 800-171) - NIST 800-53 control selections for MODERATE impact
1112 systems (NIST 800-53) - U.S. Government Configuration Baseline
1113 (USGCB) - NIAP Protection Profile for General Purpose Operating
1114 Systems v4.2.1 (OSPP v4.2.1) - DISA Operating System Security
1115 Requirements Guide (OS SRG)
1116
1117 For any differing configuration requirements, e.g. password
1118 lengths, the stricter security setting was chosen. Security
1119 Requirement Traceability Guides (RTMs) and sample System Secu‐
1120 rity Configuration Guides are provided via the scap-security-
1121 guide-docs package.
1122
1123 This profile reflects U.S. Government consensus content and is
1124 developed through the OpenSCAP/SCAP Security Guide initiative,
1125 championed by the National Security Agency. Except for differ‐
1126 ences in formatting to accommodate publishing processes, this
1127 profile mirrors OpenSCAP/SCAP Security Guide content as minor
1128 divergences, such as bugfixes, work through the consensus and
1129 release processes.
1130
1131
1132 OSPP - Protection Profile for General Purpose Operating Systems v4.2.1
1133
1134 Profile ID: xccdf_org.ssgproject.content_profile_ospp
1135
1136 This profile reflects mandatory configuration controls identi‐
1137 fied in the NIAP Configuration Annex to the Protection Profile
1138 for General Purpose Operating Systems (Protection Profile Ver‐
1139 sion 4.2.1).
1140
1141 This configuration profile is consistent with CNSSI-1253, which
1142 requires U.S. National Security Systems to adhere to certain
1143 configuration parameters. Accordingly, this configuration pro‐
1144 file is suitable for use in U.S. National Security Systems.
1145
1146
1147 Unclassified Information in Non-federal Information Systems and Organi‐
1148 zations (NIST 800-171)
1149
1150 Profile ID: xccdf_org.ssgproject.content_profile_cui
1151
1152 From NIST 800-171, Section 2.2: Security requirements for pro‐
1153 tecting the confidentiality of CUI in non-federal information
1154 systems and organizations have a well-defined structure that
1155 consists of:
1156
1157 (i) a basic security requirements section; (ii) a derived secu‐
1158 rity requirements section.
1159
1160 The basic security requirements are obtained from FIPS Publica‐
1161 tion 200, which provides the high-level and fundamental security
1162 requirements for federal information and information systems.
1163 The derived security requirements, which supplement the basic
1164 security requirements, are taken from the security controls in
1165 NIST Special Publication 800-53.
1166
1167 This profile configures Red Hat Enterprise Linux 7 to the NIST
1168 Special Publication 800-53 controls identified for securing Con‐
1169 trolled Unclassified Information (CUI).
1170
1171
1172 DRAFT - ANSSI DAT-NT28 (high)
1173
1174 Profile ID: xccdf_org.ssgproject.content_pro‐
1175 file_anssi_nt28_high
1176
1177 Draft profile for ANSSI compliance at the high level. ANSSI
1178 stands for Agence nationale de la sécurité des systèmes d'infor‐
1179 mation. Based on https://www.ssi.gouv.fr/.
1180
1181
1182 DRAFT - ANSSI DAT-NT28 (minimal)
1183
1184 Profile ID: xccdf_org.ssgproject.content_pro‐
1185 file_anssi_nt28_minimal
1186
1187 Draft profile for ANSSI compliance at the minimal level. ANSSI
1188 stands for Agence nationale de la sécurité des systèmes d'infor‐
1189 mation. Based on https://www.ssi.gouv.fr/.
1190
1191
1192 [DRAFT] DISA STIG for Red Hat Enterprise Linux Virtualization Host
1193 (RHELH)
1194
1195 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-stig
1196
1197 This *draft* profile contains configuration checks that align to
1198 the DISA STIG for Red Hat Enterprise Linux Virtualization Host
1199 (RHELH).
1200
1201
1202 Australian Cyber Security Centre (ACSC) Essential Eight
1203
1204 Profile ID: xccdf_org.ssgproject.content_profile_e8
1205
1206 This profile contains configuration checks for Red Hat Enter‐
1207 prise Linux 7 that align to the Australian Cyber Security Centre
1208 (ACSC) Essential Eight.
1209
1210 A copy of the Essential Eight in Linux Environments guide can be
1211 found at the ACSC website:
1212
1213 https://www.cyber.gov.au/publications/essential-eight-in-linux-
1214 environments
1215
1216
1217 DRAFT - ANSSI DAT-NT28 (intermediary)
1218
1219 Profile ID: xccdf_org.ssgproject.content_pro‐
1220 file_anssi_nt28_intermediary
1221
1222 Draft profile for ANSSI compliance at the intermediary level.
1223 ANSSI stands for Agence nationale de la sécurité des systèmes
1224 d'information. Based on https://www.ssi.gouv.fr/.
1225
1226
1227 C2S for Red Hat Enterprise Linux 7
1228
1229 Profile ID: xccdf_org.ssgproject.content_profile_C2S
1230
1231 This profile demonstrates compliance against the U.S. Government
1232 Commercial Cloud Services (C2S) baseline.
1233
1234 This baseline was inspired by the Center for Internet Security
1235 (CIS) Red Hat Enterprise Linux 7 Benchmark, v2.1.1 - 01-31-2017.
1236
1237 For the SCAP Security Guide project to remain in compliance with
1238 CIS' terms and conditions, specifically Restrictions(8), note
1239 there is no representation or claim that the C2S profile will
1240 ensure a system is in compliance or consistency with the CIS
1241 baseline.
1242
1243
1244 Health Insurance Portability and Accountability Act (HIPAA)
1245
1246 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
1247
1248 The HIPAA Security Rule establishes U.S. national standards to
1249 protect individuals’ electronic personal health information that
1250 is created, received, used, or maintained by a covered entity.
1251 The Security Rule requires appropriate administrative, physical
1252 and technical safeguards to ensure the confidentiality,
1253 integrity, and security of electronic protected health informa‐
1254 tion.
1255
1256 This profile configures Red Hat Enterprise Linux 7 to the HIPAA
1257 Security Rule identified for securing of electronic protected
1258 health information.
1259
1260
1261
1262
1263
1265 Source Datastream: ssg-rhel8-ds.xml
1266
1267 The Guide to the Secure Configuration of Red Hat Enterprise Linux 8 is
1268 broken into 'profiles', groupings of security settings that correlate
1269 to a known policy. Available profiles are:
1270
1271
1272
1273 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
1274
1275 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1276
1277 Ensures PCI-DSS v3.2.1 security configuration settings are
1278 applied.
1279
1280
1281 Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
1282
1283 Profile ID: xccdf_org.ssgproject.content_profile_rht-ccp
1284
1285 This profile contains the minimum security relevant configura‐
1286 tion settings recommended by Red Hat, Inc for Red Hat Enterprise
1287 Linux 8 instances deployed by Red Hat Certified Cloud Providers.
1288
1289
1290 Criminal Justice Information Services (CJIS) Security Policy
1291
1292 Profile ID: xccdf_org.ssgproject.content_profile_cjis
1293
1294 This profile is derived from FBI's CJIS v5.4 Security Policy. A
1295 copy of this policy can be found at the CJIS Security Policy
1296 Resource Center:
1297
1298 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
1299 center
1300
1301
1302 Standard System Security Profile for Red Hat Enterprise Linux 8
1303
1304 Profile ID: xccdf_org.ssgproject.content_profile_standard
1305
1306 This profile contains rules to ensure standard security baseline
1307 of a Red Hat Enterprise Linux 8 system. Regardless of your sys‐
1308 tem's workload all of these checks should pass.
1309
1310
1311 [DRAFT] DISA STIG for Red Hat Enterprise Linux 8
1312
1313 Profile ID: xccdf_org.ssgproject.content_profile_stig
1314
1315 This profile contains configuration checks that align to the
1316 [DRAFT] DISA STIG for Red Hat Enterprise Linux 8.
1317
1318 In addition to being applicable to Red Hat Enterprise Linux 8,
1319 DISA recognizes this configuration baseline as applicable to the
1320 operating system tier of Red Hat technologies that are based on
1321 Red Hat Enterprise Linux 8, such as:
1322
1323 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
1324 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1325 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1326 8 image
1327
1328
1329 VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Enter‐
1330 prise Linux Hypervisor (RHELH)
1331
1332 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-vpp
1333
1334 This compliance profile reflects the core set of security
1335 related configuration settings for deployment of Red Hat Enter‐
1336 prise Linux Hypervisor (RHELH) 7.x into U.S. Defense, Intelli‐
1337 gence, and Civilian agencies. Development partners and sponsors
1338 include the U.S. National Institute of Standards and Technology
1339 (NIST), U.S. Department of Defense, the National Security
1340 Agency, and Red Hat.
1341
1342 This baseline implements configuration requirements from the
1343 following sources:
1344
1345 - Committee on National Security Systems Instruction No. 1253
1346 (CNSSI 1253) - NIST 800-53 control selections for MODERATE
1347 impact systems (NIST 800-53) - U.S. Government Configuration
1348 Baseline (USGCB) - NIAP Protection Profile for Virtualization
1349 v1.0 (VPP v1.0)
1350
1351 For any differing configuration requirements, e.g. password
1352 lengths, the stricter security setting was chosen. Security
1353 Requirement Traceability Guides (RTMs) and sample System Secu‐
1354 rity Configuration Guides are provided via the scap-security-
1355 guide-docs package.
1356
1357 This profile reflects U.S. Government consensus content and is
1358 developed through the ComplianceAsCode project, championed by
1359 the National Security Agency. Except for differences in format‐
1360 ting to accommodate publishing processes, this profile mirrors
1361 ComplianceAsCode content as minor divergences, such as bugfixes,
1362 work through the consensus and release processes.
1363
1364
1365 Protection Profile for General Purpose Operating Systems
1366
1367 Profile ID: xccdf_org.ssgproject.content_profile_ospp
1368
1369 This profile reflects mandatory configuration controls identi‐
1370 fied in the NIAP Configuration Annex to the Protection Profile
1371 for General Purpose Operating Systems (Protection Profile Ver‐
1372 sion 4.2.1).
1373
1374 This configuration profile is consistent with CNSSI-1253, which
1375 requires U.S. National Security Systems to adhere to certain
1376 configuration parameters. Accordingly, this configuration pro‐
1377 file is suitable for use in U.S. National Security Systems.
1378
1379
1380 Unclassified Information in Non-federal Information Systems and Organi‐
1381 zations (NIST 800-171)
1382
1383 Profile ID: xccdf_org.ssgproject.content_profile_cui
1384
1385 From NIST 800-171, Section 2.2: Security requirements for pro‐
1386 tecting the confidentiality of CUI in nonfederal information
1387 systems and organizations have a well-defined structure that
1388 consists of:
1389
1390 (i) a basic security requirements section; (ii) a derived secu‐
1391 rity requirements section.
1392
1393 The basic security requirements are obtained from FIPS Publica‐
1394 tion 200, which provides the high-level and fundamental security
1395 requirements for federal information and information systems.
1396 The derived security requirements, which supplement the basic
1397 security requirements, are taken from the security controls in
1398 NIST Special Publication 800-53.
1399
1400 This profile configures Red Hat Enterprise Linux 8 to the NIST
1401 Special Publication 800-53 controls identified for securing Con‐
1402 trolled Unclassified Information (CUI)."
1403
1404
1405 [DRAFT] DISA STIG for Red Hat Enterprise Linux Virtualization Host
1406 (RHELH)
1407
1408 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-stig
1409
1410 This *draft* profile contains configuration checks that align to
1411 the DISA STIG for Red Hat Enterprise Linux Virtualization Host
1412 (RHELH).
1413
1414
1415 Australian Cyber Security Centre (ACSC) Essential Eight
1416
1417 Profile ID: xccdf_org.ssgproject.content_profile_e8
1418
1419 This profile contains configuration checks for Red Hat Enter‐
1420 prise Linux 8 that align to the Australian Cyber Security Centre
1421 (ACSC) Essential Eight.
1422
1423 A copy of the Essential Eight in Linux Environments guide can be
1424 found at the ACSC website:
1425
1426 https://www.cyber.gov.au/publications/essential-eight-in-linux-
1427 environments
1428
1429
1430 Health Insurance Portability and Accountability Act (HIPAA)
1431
1432 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
1433
1434 The HIPAA Security Rule establishes U.S. national standards to
1435 protect individuals’ electronic personal health information that
1436 is created, received, used, or maintained by a covered entity.
1437 The Security Rule requires appropriate administrative, physical
1438 and technical safeguards to ensure the confidentiality,
1439 integrity, and security of electronic protected health informa‐
1440 tion.
1441
1442 This profile configures Red Hat Enterprise Linux 8 to the HIPAA
1443 Security Rule identified for securing of electronic protected
1444 health information.
1445
1446
1447
1448
1449
1451
1452 Source Datastream: ssg-rhosp10-ds.xml
1453
1454 The Guide to the Secure Configuration of Red Hat OpenStack Platform 10
1455 is broken into 'profiles', groupings of security settings that corre‐
1456 late to a known policy. Available profiles are:
1457
1458
1459
1460 [DRAFT] STIG for Red Hat OpenStack Plaform 10
1461
1462 Profile ID: xccdf_org.ssgproject.content_profile_stig
1463
1464 Controls for scanning against classified STIG for rhosp10
1465
1466
1467 [DRAFT] Controlled Unclassified Infomration (CUI) Profile for Red Hat
1468 OpenStack Plaform 10
1469
1470 Profile ID: xccdf_org.ssgproject.content_profile_cui
1471
1472 These are the controls for scanning against CUI for rhosp10
1473
1474
1475
1476
1477
1479
1480 Source Datastream: ssg-rhosp13-ds.xml
1481
1482 The Guide to the Secure Configuration of Red Hat OpenStack Platform 13
1483 is broken into 'profiles', groupings of security settings that corre‐
1484 late to a known policy. Available profiles are:
1485
1486
1487
1488 RHOSP STIG
1489
1490 Profile ID: xccdf_org.ssgproject.content_profile_stig
1491
1492 Sample profile description.
1493
1494
1495
1496
1497
1499 Source Datastream: ssg-rhv4-ds.xml
1500
1501 The Guide to the Secure Configuration of Red Hat Virtualization 4 is
1502 broken into 'profiles', groupings of security settings that correlate
1503 to a known policy. Available profiles are:
1504
1505
1506
1507 [DRAFT] DISA STIG for Red Hat Virtualization Host (RHVH)
1508
1509 Profile ID: xccdf_org.ssgproject.content_profile_rhvh-stig
1510
1511 This *draft* profile contains configuration checks that align to
1512 the DISA STIG for Red Hat Virtualization Host (RHVH).
1513
1514
1515 VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Virtual‐
1516 ization Host (RHVH)
1517
1518 Profile ID: xccdf_org.ssgproject.content_profile_rhvh-vpp
1519
1520 This compliance profile reflects the core set of security
1521 related configuration settings for deployment of Red Hat Virtu‐
1522 alization Host (RHVH) 4.x into U.S. Defense, Intelligence, and
1523 Civilian agencies. Development partners and sponsors include
1524 the U.S. National Institute of Standards and Technology (NIST),
1525 U.S. Department of Defense, the National Security Agency, and
1526 Red Hat.
1527
1528 This baseline implements configuration requirements from the
1529 following sources:
1530
1531 - Committee on National Security Systems Instruction No. 1253
1532 (CNSSI 1253) - NIST 800-53 control selections for MODERATE
1533 impact systems (NIST 800-53) - U.S. Government Configuration
1534 Baseline (USGCB) - NIAP Protection Profile for Virtualization
1535 v1.0 (VPP v1.0)
1536
1537 For any differing configuration requirements, e.g. password
1538 lengths, the stricter security setting was chosen. Security
1539 Requirement Traceability Guides (RTMs) and sample System Secu‐
1540 rity Configuration Guides are provided via the scap-security-
1541 guide-docs package.
1542
1543 This profile reflects U.S. Government consensus content and is
1544 developed through the ComplianceAsCode project, championed by
1545 the National Security Agency. Except for differences in format‐
1546 ting to accommodate publishing processes, this profile mirrors
1547 ComplianceAsCode content as minor divergences, such as bugfixes,
1548 work through the consensus and release processes.
1549
1550
1551
1552
1553
1555 Source Datastream: ssg-sl6-ds.xml
1556
1557 The Guide to the Secure Configuration of Red Hat Enterprise Linux 6 is
1558 broken into 'profiles', groupings of security settings that correlate
1559 to a known policy. Available profiles are:
1560
1561
1562
1563 PCI-DSS v3 Control Baseline for Red Hat Enterprise Linux 6
1564
1565 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1566
1567 This is a *draft* profile for PCI-DSS v3.
1568
1569
1570 Desktop Baseline
1571
1572 Profile ID: xccdf_org.ssgproject.content_profile_desktop
1573
1574 This profile is for a desktop installation of Red Hat Enterprise
1575 Linux 6.
1576
1577
1578 Server Baseline
1579
1580 Profile ID: xccdf_org.ssgproject.content_profile_server
1581
1582 This profile is for Red Hat Enterprise Linux 6 acting as a
1583 server.
1584
1585
1586 Standard System Security Profile for Red Hat Enterprise Linux 6
1587
1588 Profile ID: xccdf_org.ssgproject.content_profile_standard
1589
1590 This profile contains rules to ensure standard security baseline
1591 of a Red Hat Enterprise Linux 6 system. Regardless of your sys‐
1592 tem's workload all of these checks should pass.
1593
1594
1595
1596
1597
1599 Source Datastream: ssg-sl7-ds.xml
1600
1601 The Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
1602 broken into 'profiles', groupings of security settings that correlate
1603 to a known policy. Available profiles are:
1604
1605
1606
1607 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
1608
1609 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1610
1611 Ensures PCI-DSS v3.2.1 security configuration settings are
1612 applied.
1613
1614
1615 Standard System Security Profile for Red Hat Enterprise Linux 7
1616
1617 Profile ID: xccdf_org.ssgproject.content_profile_standard
1618
1619 This profile contains rules to ensure standard security baseline
1620 of a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
1621 tem's workload all of these checks should pass.
1622
1623
1624
1625
1626
1628 Source Datastream: ssg-sle11-ds.xml
1629
1630 The Guide to the Secure Configuration of SUSE Linux Enterprise 11 is
1631 broken into 'profiles', groupings of security settings that correlate
1632 to a known policy. Available profiles are:
1633
1634
1635
1636 Server Baseline
1637
1638 Profile ID: xccdf_org.ssgproject.content_profile_server
1639
1640 This profile is for SUSE Enterprise Linux 11 acting as a server.
1641
1642
1643 Standard System Security Profile for SUSE Linux Enterprise 11
1644
1645 Profile ID: xccdf_org.ssgproject.content_profile_standard
1646
1647 This profile contains rules to ensure standard security baseline
1648 of a SUSE Linux Enterprise 11 system. Regardless of your sys‐
1649 tem's workload all of these checks should pass.
1650
1651
1652
1653
1654
1656 Source Datastream: ssg-sle12-ds.xml
1657
1658 The Guide to the Secure Configuration of SUSE Linux Enterprise 12 is
1659 broken into 'profiles', groupings of security settings that correlate
1660 to a known policy. Available profiles are:
1661
1662
1663
1664 Standard System Security Profile for SUSE Linux Enterprise 12
1665
1666 Profile ID: xccdf_org.ssgproject.content_profile_standard
1667
1668 This profile contains rules to ensure standard security baseline
1669 of a SUSE Linux Enterprise 12 system. Regardless of your sys‐
1670 tem's workload all of these checks should pass.
1671
1672
1673 DISA STIG for SUSE Linux Enterprise 12
1674
1675 Profile ID: xccdf_org.ssgproject.content_profile_stig
1676
1677 This profile contains configuration checks that align to the
1678 DISA STIG for SUSE Linux Enterprise 12 V1R2.
1679
1680
1681
1682
1683
1685 Source Datastream: ssg-ubuntu1404-ds.xml
1686
1687 The Guide to the Secure Configuration of Ubuntu 14.04 is broken into
1688 'profiles', groupings of security settings that correlate to a known
1689 policy. Available profiles are:
1690
1691
1692
1693 Profile for ANSSI DAT-NT28 Minimal Level
1694
1695 Profile ID: xccdf_org.ssgproject.content_pro‐
1696 file_anssi_np_nt28_minimal
1697
1698 This profile contains items to be applied systematically.
1699
1700
1701 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
1702
1703 Profile ID: xccdf_org.ssgproject.content_pro‐
1704 file_anssi_np_nt28_average
1705
1706 This profile contains items for GNU/Linux installations already
1707 protected by multiple higher level security stacks.
1708
1709
1710 Standard System Security Profile for Ubuntu 14.04
1711
1712 Profile ID: xccdf_org.ssgproject.content_profile_standard
1713
1714 This profile contains rules to ensure standard security baseline
1715 of an Ubuntu 14.04 system. Regardless of your system's workload
1716 all of these checks should pass.
1717
1718
1719 Profile for ANSSI DAT-NT28 Restrictive Level
1720
1721 Profile ID: xccdf_org.ssgproject.content_pro‐
1722 file_anssi_np_nt28_restrictive
1723
1724 This profile contains items for GNU/Linux installations exposed
1725 to unauthenticated flows or multiple sources.
1726
1727
1728 Profile for ANSSI DAT-NT28 High (Enforced) Level
1729
1730 Profile ID: xccdf_org.ssgproject.content_pro‐
1731 file_anssi_np_nt28_high
1732
1733 This profile contains items for GNU/Linux installations storing
1734 sensitive informations that can be accessible from unauthenti‐
1735 cated or uncontroled networks.
1736
1737
1738
1739
1740
1742 Source Datastream: ssg-ubuntu1604-ds.xml
1743
1744 The Guide to the Secure Configuration of Ubuntu 16.04 is broken into
1745 'profiles', groupings of security settings that correlate to a known
1746 policy. Available profiles are:
1747
1748
1749
1750 Profile for ANSSI DAT-NT28 Minimal Level
1751
1752 Profile ID: xccdf_org.ssgproject.content_pro‐
1753 file_anssi_np_nt28_minimal
1754
1755 This profile contains items to be applied systematically.
1756
1757
1758 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
1759
1760 Profile ID: xccdf_org.ssgproject.content_pro‐
1761 file_anssi_np_nt28_average
1762
1763 This profile contains items for GNU/Linux installations already
1764 protected by multiple higher level security stacks.
1765
1766
1767 Standard System Security Profile for Ubuntu 16.04
1768
1769 Profile ID: xccdf_org.ssgproject.content_profile_standard
1770
1771 This profile contains rules to ensure standard security baseline
1772 of an Ubuntu 16.04 system. Regardless of your system's workload
1773 all of these checks should pass.
1774
1775
1776 Profile for ANSSI DAT-NT28 Restrictive Level
1777
1778 Profile ID: xccdf_org.ssgproject.content_pro‐
1779 file_anssi_np_nt28_restrictive
1780
1781 This profile contains items for GNU/Linux installations exposed
1782 to unauthenticated flows or multiple sources.
1783
1784
1785 Profile for ANSSI DAT-NT28 High (Enforced) Level
1786
1787 Profile ID: xccdf_org.ssgproject.content_pro‐
1788 file_anssi_np_nt28_high
1789
1790 This profile contains items for GNU/Linux installations storing
1791 sensitive informations that can be accessible from unauthenti‐
1792 cated or uncontroled networks.
1793
1794
1795
1796
1797
1799 Source Datastream: ssg-ubuntu1804-ds.xml
1800
1801 The Guide to the Secure Configuration of Ubuntu 18.04 is broken into
1802 'profiles', groupings of security settings that correlate to a known
1803 policy. Available profiles are:
1804
1805
1806
1807 Profile for ANSSI DAT-NT28 Minimal Level
1808
1809 Profile ID: xccdf_org.ssgproject.content_pro‐
1810 file_anssi_np_nt28_minimal
1811
1812 This profile contains items to be applied systematically.
1813
1814
1815 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
1816
1817 Profile ID: xccdf_org.ssgproject.content_pro‐
1818 file_anssi_np_nt28_average
1819
1820 This profile contains items for GNU/Linux installations already
1821 protected by multiple higher level security stacks.
1822
1823
1824 Standard System Security Profile for Ubuntu 18.04
1825
1826 Profile ID: xccdf_org.ssgproject.content_profile_standard
1827
1828 This profile contains rules to ensure standard security baseline
1829 of an Ubuntu 18.04 system. Regardless of your system's workload
1830 all of these checks should pass.
1831
1832
1833 Profile for ANSSI DAT-NT28 Restrictive Level
1834
1835 Profile ID: xccdf_org.ssgproject.content_pro‐
1836 file_anssi_np_nt28_restrictive
1837
1838 This profile contains items for GNU/Linux installations exposed
1839 to unauthenticated flows or multiple sources.
1840
1841
1842 Profile for ANSSI DAT-NT28 High (Enforced) Level
1843
1844 Profile ID: xccdf_org.ssgproject.content_pro‐
1845 file_anssi_np_nt28_high
1846
1847 This profile contains items for GNU/Linux installations storing
1848 sensitive informations that can be accessible from unauthenti‐
1849 cated or uncontroled networks.
1850
1851
1852
1853
1854
1856 Source Datastream: ssg-wrlinux1019-ds.xml
1857
1858 The Guide to the Secure Configuration of WRLinux 1019 is broken into
1859 'profiles', groupings of security settings that correlate to a known
1860 policy. Available profiles are:
1861
1862
1863
1864 Basic Profile for Embedded Systems
1865
1866 Profile ID: xccdf_org.ssgproject.content_profile_basic-embedded
1867
1868 This profile contains items common to many embedded Linux
1869 installations. Regardless of your system's deployment objec‐
1870 tive, all of these checks should pass.
1871
1872
1873 DRAFT DISA STIG for Wind River Linux
1874
1875 Profile ID: xccdf_org.ssgproject.content_pro‐
1876 file_draft_stig_wrlinux_disa
1877
1878 This profile contains configuration checks that align to the
1879 DISA STIG for Wind River Linux. This profile is being developed
1880 under the DoD consensus model to become a STIG in coordination
1881 with DISA FSO. What is the status of the Wind River Linux STIG?
1882 The Wind River Linux STIG is in development under the DoD con‐
1883 sensus model and Wind River has started the process to get
1884 approval from DISA. However, in the absence of an approved SRG
1885 or STIG, vendor recommendations may be used instead. The current
1886 contents constitute the vendor recommendations at the time of
1887 the product release containing these contents. Note that
1888 changes are expected before approval is granted, and those
1889 changes will be made available in future Wind River Linux Secu‐
1890 rity Profile 1019 RCPL releases. More information, including
1891 the following, is available from the DISA FAQs at https://pub‐
1892 lic.cyber.mil/stigs/faqs/
1893
1894
1895
1896
1897
1899 Source Datastream: ssg-wrlinux8-ds.xml
1900
1901 The Guide to the Secure Configuration of WRLinux 8 is broken into 'pro‐
1902 files', groupings of security settings that correlate to a known pol‐
1903 icy. Available profiles are:
1904
1905
1906
1907 Basic Profile for Embedded Systems
1908
1909 Profile ID: xccdf_org.ssgproject.content_profile_basic-embedded
1910
1911 This profile contains items common to many embedded Linux
1912 installations. Regardless of your system's deployment objec‐
1913 tive, all of these checks should pass.
1914
1915
1916
1917
1918
1919
1921 To scan your system utilizing the OpenSCAP utility against the ospp
1922 profile:
1923
1924 oscap xccdf eval --profile ospp --results /tmp/`hostname`-ssg-
1925 results.xml --report /tmp/`hostname`-ssg-results.html --oval-results
1926 /usr/share/xml/scap/ssg/content/ssg-rhel7-xccdf.xml
1927
1928 Additional details can be found on the projects wiki page:
1929 https://www.github.com/OpenSCAP/scap-security-guide/wiki
1930
1931
1932
1934 /usr/share/xml/scap/ssg/content
1935 Houses SCAP content utilizing the following naming conventions:
1936
1937 SCAP Source Datastreams: ssg-{product}-ds.xml
1938
1939 CPE Dictionaries: ssg-{product}-cpe-dictionary.xml
1940
1941 CPE OVAL Content: ssg-{product}-cpe-oval.xml
1942
1943 OVAL Content: ssg-{product}-oval.xml
1944
1945 XCCDF Content: ssg-{product}-xccdf.xml
1946
1947 /usr/share/doc/scap-security-guide/guides/
1948 HTML versions of SSG profiles.
1949
1950 /usr/share/scap-security-guide/ansible/
1951 Contains Ansible Playbooks for SSG profiles.
1952
1953 /usr/share/scap-security-guide/bash/
1954 Contains Bash remediation scripts for SSG profiles.
1955
1956
1958 The SCAP Security Guide, an open source project jointly maintained by
1959 Red Hat and the NSA, provides XCCDF and OVAL content for Red Hat tech‐
1960 nologies. As an open source project, community participation extends
1961 into U.S. Department of Defense agencies, civilian agencies, academia,
1962 and other industrial partners.
1963
1964 SCAP Security Guide is provided to consumers through Red Hat's Extended
1965 Packages for Enterprise Linux (EPEL) repository. As such, SCAP Security
1966 Guide content is considered "vendor provided."
1967
1968 Note that while Red Hat hosts the infrastructure for this project and
1969 Red Hat engineers are involved as maintainers and leaders, there is no
1970 commercial support contracts or service level agreements provided by
1971 Red Hat.
1972
1973 Support, for both users and developers, is provided through the SCAP
1974 Security Guide community.
1975
1976 Homepage: https://www.open-scap.org/security-policies/scap-security-
1977 guide
1978
1979 Mailing List: https://lists.fedorahosted.org/mailman/listinfo/scap-
1980 security-guide
1981
1982
1983
1985 SCAP Security Guide content is considered vendor (Red Hat) provided
1986 content. Per guidance from the U.S. National Institute of Standards
1987 and Technology (NIST), U.S. Government programs are allowed to use Ven‐
1988 dor produced SCAP content in absence of "Governmental Authority" check‐
1989 lists. The specific NIST verbage:
1990 http://web.nvd.nist.gov/view/ncp/repository/glossary?cid=1#Authority
1991
1992
1993
1995 DoD Directive (DoDD) 8500.1 requires that "all IA and IA-enabled IT
1996 products incorporated into DoD information systems shall be configured
1997 in accordance with DoD-approved security configuration guidelines" and
1998 tasks Defense Information Systems Agency (DISA) to "develop and provide
1999 security configuration guidance for IA and IA-enabled IT products in
2000 coordination with Director, NSA." The output of this authority is the
2001 DISA Security Technical Implementation Guides, or STIGs. DISA FSO is in
2002 the process of moving the STIGs towards the use of the NIST Security
2003 Content Automation Protocol (SCAP) in order to "automate" compliance
2004 reporting of the STIGs.
2005
2006 Through a common, shared vision, the SCAP Security Guide community
2007 enjoys close collaboration directly with NSA, NIST, and DISA FSO. As
2008 stated in Section 1.1 of the Red Hat Enterprise Linux 6 STIG Overview,
2009 Version 1, Release 2, issued on 03-JUNE-2013:
2010
2011 "The consensus content was developed using an open-source project
2012 called SCAP Security Guide. The project's website is https://www.open-
2013 scap.org/security-policies/scap-security-guide. Except for differences
2014 in formatting to accomodate the DISA STIG publishing process, the con‐
2015 tent of the Red Hat Enterprise Linux 6 STIG should mirror the SCAP
2016 Security Guide content with only minor divergence as updates from mul‐
2017 tiple sources work through the consensus process."
2018
2019 The DoD STIG for Red Hat Enterprise Linux 7, revision V2R4, was
2020 released in July 2019 Currently, the DoD Red Hat Enterprise Linux 7
2021 STIG contains only XCCDF content and is available online: https://pub‐
2022 lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=operating-sys‐
2023 tems%2Cunix-linux
2024
2025 Content published against the public.cyber.mil website is authoritative
2026 STIG content. The SCAP Security Guide project, as noted in the STIG
2027 overview, is considered upstream content. Unlike DISA FSO, the SCAP
2028 Security Guide project does publish OVAL automation content. Individual
2029 programs and C&A evaluators make program-level determinations on the
2030 direct usage of the SCAP Security Guide. Currently there is no blanket
2031 approval.
2032
2033
2034
2036 oscap(8)
2037
2038
2039
2041 Please direct all questions to the SSG mailing list:
2042 https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
2043
2044
2045
2046version 1 26 Jan 2013 scap-security-guide(8)