1scap-security-guide(8)      System Manager's Manual     scap-security-guide(8)
2
3
4

NAME

6       SCAP  Security Guide - Delivers security guidance, baselines, and asso‐
7       ciated validation mechanisms utilizing the Security Content  Automation
8       Protocol (SCAP).
9
10
11

DESCRIPTION

13       The  project  provides  practical security hardening advice for Red Hat
14       products, and also links it to compliance requirements in order to ease
15       deployment  activities,  such as certification and accreditation. These
16       include requirements in the  U.S.  government  (Federal,  Defense,  and
17       Intelligence Community) as well as of the financial services and health
18       care industries. For example, high-level and  widely-accepted  policies
19       such  as  NIST 800-53 provides prose stating that System Administrators
20       must audit "privileged user actions," but do not  define  what  "privi‐
21       leged  actions" are. The SSG bridges the gap between generalized policy
22       requirements and specific implementation guidance, in SCAP  formats  to
23       support automation whenever possible.
24
25       The  projects  homepage  is located at: https://www.open-scap.org/secu
26       rity-policies/scap-security-guide
27
28
29

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 7

31       Source Datastream:  ssg-centos7-ds.xml
32
33       The Guide to the Secure Configuration of Red Hat Enterprise Linux 7  is
34       broken  into  'profiles', groupings of security settings that correlate
35       to a known policy. Available profiles are:
36
37
38
39       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
40
41              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
42
43              Ensures  PCI-DSS  v3.2.1  security  configuration  settings  are
44              applied.
45
46
47       Standard System Security Profile for Red Hat Enterprise Linux 7
48
49              Profile ID:  xccdf_org.ssgproject.content_profile_standard
50
51              This profile contains rules to ensure standard security baseline
52              of a Red Hat Enterprise Linux 7 system. Regardless of your  sys‐
53              tem's workload all of these checks should pass.
54
55
56
57
58

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 8

60       Source Datastream:  ssg-centos8-ds.xml
61
62       The  Guide to the Secure Configuration of Red Hat Enterprise Linux 8 is
63       broken into 'profiles', groupings of security settings  that  correlate
64       to a known policy. Available profiles are:
65
66
67
68       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
69
70              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
71
72              Ensures  PCI-DSS  v3.2.1  security  configuration  settings  are
73              applied.
74
75
76       Standard System Security Profile for Red Hat Enterprise Linux 8
77
78              Profile ID:  xccdf_org.ssgproject.content_profile_standard
79
80              This profile contains rules to ensure standard security baseline
81              of  a Red Hat Enterprise Linux 8 system. Regardless of your sys‐
82              tem's workload all of these checks should pass.
83
84
85
86
87

Profiles in Guide to the Secure Configuration of Chromium

89       Source Datastream:  ssg-chromium-ds.xml
90
91       The Guide to the Secure Configuration of Chromium is broken into  'pro‐
92       files',  groupings  of security settings that correlate to a known pol‐
93       icy. Available profiles are:
94
95
96
97       Upstream STIG for Google Chromium
98
99              Profile ID:  xccdf_org.ssgproject.content_profile_stig
100
101              This profile is developed under the DoD consensus model and DISA
102              FSO  Vendor  STIG  process,  serving as the upstream development
103              environment for the Google Chromium STIG.
104
105              As a result of the upstream/downstream relationship between  the
106              SCAP Security Guide project and the official DISA FSO STIG base‐
107              line, users should expect variance between SSG and DISA FSO con‐
108              tent.  For official DISA FSO STIG content, refer to https://pub
109              lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
110              rity%2Cbrowser-guidance.
111
112              While  this  profile  is packaged by Red Hat as part of the SCAP
113              Security Guide package, please note that commercial  support  of
114              this  SCAP content is NOT available. This profile is provided as
115              example SCAP content with no endorsement for suitability or pro‐
116              duction  readiness.  Support for this profile is provided by the
117              upstream SCAP Security Guide community on a  best-effort  basis.
118              The upstream project homepage is https://www.open-scap.org/secu
119              rity-policies/scap-security-guide/.
120
121
122
123
124

Profiles in Guide to the Secure Configuration of Debian 10

126       Source Datastream:  ssg-debian10-ds.xml
127
128       The Guide to the Secure Configuration of Debian 10 is broken into 'pro‐
129       files',  groupings  of security settings that correlate to a known pol‐
130       icy. Available profiles are:
131
132
133
134       Profile for ANSSI DAT-NT28 Average (Intermediate) Level
135
136              Profile          ID:           xccdf_org.ssgproject.content_pro‐
137              file_anssi_np_nt28_average
138
139              This  profile contains items for GNU/Linux installations already
140              protected by multiple higher level security stacks.
141
142
143       Profile for ANSSI DAT-NT28 High (Enforced) Level
144
145              Profile          ID:           xccdf_org.ssgproject.content_pro‐
146              file_anssi_np_nt28_high
147
148              This  profile contains items for GNU/Linux installations storing
149              sensitive informations that can be accessible  from  unauthenti‐
150              cated or uncontroled networks.
151
152
153       Profile for ANSSI DAT-NT28 Minimal Level
154
155              Profile          ID:           xccdf_org.ssgproject.content_pro‐
156              file_anssi_np_nt28_minimal
157
158              This profile contains items to be applied systematically.
159
160
161       Profile for ANSSI DAT-NT28 Restrictive Level
162
163              Profile          ID:           xccdf_org.ssgproject.content_pro‐
164              file_anssi_np_nt28_restrictive
165
166              This  profile contains items for GNU/Linux installations exposed
167              to unauthenticated flows or multiple sources.
168
169
170       Standard System Security Profile for Debian 10
171
172              Profile ID:  xccdf_org.ssgproject.content_profile_standard
173
174              This profile contains rules to ensure standard security baseline
175              of  a Debian 10 system. Regardless of your system's workload all
176              of these checks should pass.
177
178
179
180
181

Profiles in Guide to the Secure Configuration of Debian 9

183       Source Datastream:  ssg-debian9-ds.xml
184
185       The Guide to the Secure Configuration of Debian 9 is broken into  'pro‐
186       files',  groupings  of security settings that correlate to a known pol‐
187       icy. Available profiles are:
188
189
190
191       Profile for ANSSI DAT-NT28 Average (Intermediate) Level
192
193              Profile          ID:           xccdf_org.ssgproject.content_pro‐
194              file_anssi_np_nt28_average
195
196              This  profile contains items for GNU/Linux installations already
197              protected by multiple higher level security stacks.
198
199
200       Profile for ANSSI DAT-NT28 High (Enforced) Level
201
202              Profile          ID:           xccdf_org.ssgproject.content_pro‐
203              file_anssi_np_nt28_high
204
205              This  profile contains items for GNU/Linux installations storing
206              sensitive informations that can be accessible  from  unauthenti‐
207              cated or uncontroled networks.
208
209
210       Profile for ANSSI DAT-NT28 Minimal Level
211
212              Profile          ID:           xccdf_org.ssgproject.content_pro‐
213              file_anssi_np_nt28_minimal
214
215              This profile contains items to be applied systematically.
216
217
218       Profile for ANSSI DAT-NT28 Restrictive Level
219
220              Profile          ID:           xccdf_org.ssgproject.content_pro‐
221              file_anssi_np_nt28_restrictive
222
223              This  profile contains items for GNU/Linux installations exposed
224              to unauthenticated flows or multiple sources.
225
226
227       Standard System Security Profile for Debian 9
228
229              Profile ID:  xccdf_org.ssgproject.content_profile_standard
230
231              This profile contains rules to ensure standard security baseline
232              of  a  Debian 9 system. Regardless of your system's workload all
233              of these checks should pass.
234
235
236
237
238

Profiles in Guide to the Secure Configuration of Fedora

240       Source Datastream:  ssg-fedora-ds.xml
241
242       The Guide to the Secure Configuration of Fedora is  broken  into  'pro‐
243       files',  groupings  of security settings that correlate to a known pol‐
244       icy. Available profiles are:
245
246
247
248       OSPP - Protection Profile for General Purpose Operating Systems
249
250              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
251
252              This profile reflects mandatory configuration  controls  identi‐
253              fied  in  the NIAP Configuration Annex to the Protection Profile
254              for General Purpose Operating Systems (Protection  Profile  Ver‐
255              sion 4.2).
256
257              As  Fedora  OS is moving target, this profile does not guarantee
258              to provide security levels required from  US  National  Security
259              Systems.  Main goal of the profile is to provide Fedora develop‐
260              ers with hardened environment similar to the one mandated by  US
261              National Security Systems.
262
263
264       PCI-DSS v3.2.1 Control Baseline for Fedora
265
266              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
267
268              Ensures  PCI-DSS  v3.2.1 related security configuration settings
269              are applied.
270
271
272       Standard System Security Profile for Fedora
273
274              Profile ID:  xccdf_org.ssgproject.content_profile_standard
275
276              This profile contains rules to ensure standard security baseline
277              of a Fedora system.  Regardless of your system's workload all of
278              these checks should pass.
279
280
281
282
283

Profiles in Guide to the Secure Configuration of Firefox

285       Source Datastream:  ssg-firefox-ds.xml
286
287       The Guide to the Secure Configuration of Firefox is broken  into  'pro‐
288       files',  groupings  of security settings that correlate to a known pol‐
289       icy. Available profiles are:
290
291
292
293       Upstream Firefox STIG
294
295              Profile ID:  xccdf_org.ssgproject.content_profile_stig
296
297              This profile is developed under the DoD consensus model and DISA
298              FSO  Vendor  STIG  process,  serving as the upstream development
299              environment for the Firefox STIG.
300
301              As a result of the upstream/downstream relationship between  the
302              SCAP Security Guide project and the official DISA FSO STIG base‐
303              line, users should expect variance between SSG and DISA FSO con‐
304              tent.  For official DISA FSO STIG content, refer to https://pub
305              lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
306              rity%2Cbrowser-guidance.
307
308              While  this  profile  is packaged by Red Hat as part of the SCAP
309              Security Guide package, please note that commercial  support  of
310              this  SCAP content is NOT available. This profile is provided as
311              example SCAP content with no endorsement for suitability or pro‐
312              duction  readiness.  Support for this profile is provided by the
313              upstream SCAP Security Guide community on a  best-effort  basis.
314              The upstream project homepage is https://www.open-scap.org/secu
315              rity-policies/scap-security-guide/.
316
317
318
319
320

Profiles in Guide to the Secure Configuration of JBoss Fuse 6

322       Source Datastream:  ssg-fuse6-ds.xml
323
324       The Guide to the Secure Configuration of JBoss Fuse 6  is  broken  into
325       'profiles',  groupings  of  security settings that correlate to a known
326       policy. Available profiles are:
327
328
329
330       STIG for Apache ActiveMQ
331
332              Profile ID:  xccdf_org.ssgproject.content_profile_amq-stig
333
334              This is a *draft* profile for STIG. This profile is being devel‐
335              oped under the DoD consensus model to become a STIG in coordina‐
336              tion with DISA FSO.
337
338
339       Standard System Security Profile for JBoss
340
341              Profile ID:  xccdf_org.ssgproject.content_profile_standard
342
343              This profile contains rules to ensure standard security baseline
344              of JBoss Fuse. Regardless of your system's workload all of these
345              checks should pass.
346
347
348       STIG for JBoss Fuse 6
349
350              Profile ID:  xccdf_org.ssgproject.content_profile_stig
351
352              This is a *draft* profile for STIG. This profile is being devel‐
353              oped under the DoD consensus model to become a STIG in coordina‐
354              tion with DISA FSO.
355
356
357
358
359

Profiles in Guide to the Secure Configuration of Java Runtime Environment

361       Source Datastream:  ssg-jre-ds.xml
362
363       The Guide to the Secure Configuration of Java  Runtime  Environment  is
364       broken  into  'profiles', groupings of security settings that correlate
365       to a known policy. Available profiles are:
366
367
368
369       Java Runtime Environment (JRE) STIG
370
371              Profile ID:  xccdf_org.ssgproject.content_profile_stig
372
373              The Java Runtime Environment (JRE) is  a  bundle  developed  and
374              offered  by  Oracle  Corporation which includes the Java Virtual
375              Machine (JVM), class libraries, and other  components  necessary
376              to  run  Java applications and applets. Certain default settings
377              within the JRE pose a security risk so it is necessary to deploy
378              system  wide  properties  to  ensure a higher degree of security
379              when utilizing the JRE.
380
381              The IBM Corporation also develops and bundles the  Java  Runtime
382              Environment (JRE) as well as Red Hat with OpenJDK.
383
384
385
386
387

Profiles in Guide to the Secure Configuration of Apple macOS 10.15

389       Source Datastream:  ssg-macos1015-ds.xml
390
391       The  Guide  to  the Secure Configuration of Apple macOS 10.15 is broken
392       into 'profiles', groupings of security settings  that  correlate  to  a
393       known policy. Available profiles are:
394
395
396
397       NIST 800-53 Moderate-Impact Baseline for Apple macOS 10.15 Catalina
398
399              Profile ID:  xccdf_org.ssgproject.content_profile_moderate
400
401              This compliance profile reflects the core set of Moderate-Impact
402              Baseline configuration settings for deployment  of  Apple  macOS
403              10.15  Catalina  into  U.S.  Defense, Intelligence, and Civilian
404              agencies.  Development partners and sponsors  include  the  U.S.
405              National  Institute  of  Standards  and  Technology (NIST), U.S.
406              Department of Defense, and the the National Security Agency.
407
408              This baseline implements  configuration  requirements  from  the
409              following sources:
410
411              -  NIST  800-53  control  selections for Moderate-Impact systems
412              (NIST 800-53)
413
414              For any  differing  configuration  requirements,  e.g.  password
415              lengths,  the  stricter  security  setting  was chosen. Security
416              Requirement Traceability Guides (RTMs) and sample  System  Secu‐
417              rity  Configuration  Guides  are provided via the scap-security-
418              guide-docs package.
419
420              This profile reflects U.S. Government consensus content  and  is
421              developed through the ComplianceAsCode initiative, championed by
422              the National Security Agency. Except for differences in  format‐
423              ting  to  accommodate publishing processes, this profile mirrors
424              ComplianceAsCode content as minor divergences, such as bugfixes,
425              work through the consensus and release processes.
426
427
428
429
430

Profiles in Guide to the Secure Configuration of Red Hat OpenShift Container

432       Platform 4
433       Source Datastream:  ssg-ocp4-ds.xml
434
435       The Guide to the Secure Configuration of Red  Hat  OpenShift  Container
436       Platform  4  is  broken into 'profiles', groupings of security settings
437       that correlate to a known policy. Available profiles are:
438
439
440
441       CIS Red Hat OpenShift Container Platform 4 Benchmark
442
443              Profile ID:  xccdf_org.ssgproject.content_profile_cis-node
444
445              This profile defines a baseline that aligns to  the  Center  for
446              Internet Security® Red Hat OpenShift Container Platform 4 Bench‐
447              mark™, V0.3, currently unreleased.
448
449              This profile includes Center  for  Internet  Security®  Red  Hat
450              OpenShift Container Platform 4 CIS Benchmarks™ content.
451
452              Note  that this part of the profile is meant to run on the Oper‐
453              ating System that Red Hat OpenShift Container Platform 4 runs on
454              top of.
455
456              This  profile  is  applicable  to  OpenShift  versions  4.6  and
457              greater.
458
459
460       CIS Red Hat OpenShift Container Platform 4 Benchmark
461
462              Profile ID:  xccdf_org.ssgproject.content_profile_cis
463
464              This profile defines a baseline that aligns to  the  Center  for
465              Internet Security® Red Hat OpenShift Container Platform 4 Bench‐
466              mark™, V0.3, currently unreleased.
467
468              This profile includes Center  for  Internet  Security®  Red  Hat
469              OpenShift Container Platform 4 CIS Benchmarks™ content.
470
471              Note  that this part of the profile is meant to run on the Plat‐
472              form that Red Hat OpenShift Container Platform 4 runs on top of.
473
474              This  profile  is  applicable  to  OpenShift  versions  4.6  and
475              greater.
476
477
478       Australian Cyber Security Centre (ACSC) Essential Eight
479
480              Profile ID:  xccdf_org.ssgproject.content_profile_e8
481
482              This profile contains configuration checks for Red Hat OpenShift
483              Container Platform that align to the Australian  Cyber  Security
484              Centre (ACSC) Essential Eight.
485
486              A copy of the Essential Eight in Linux Environments guide can be
487              found at the ACSC website:
488
489              https://www.cyber.gov.au/acsc/view-all-content/publica
490              tions/hardening-linux-workstations-and-servers
491
492
493       NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift
494
495              Profile ID:  xccdf_org.ssgproject.content_profile_moderate
496
497              This compliance profile reflects the core set of Moderate-Impact
498              Baseline configuration settings for deployment of Red Hat  Open‐
499              Shift  Container  Platform  into U.S. Defense, Intelligence, and
500              Civilian agencies.  Development partners  and  sponsors  include
501              the  U.S. National Institute of Standards and Technology (NIST),
502              U.S. Department of Defense, the National  Security  Agency,  and
503              Red Hat.
504
505              This  baseline  implements  configuration  requirements from the
506              following sources:
507
508              - NIST 800-53 control  selections  for  Moderate-Impact  systems
509              (NIST 800-53)
510
511              For  any  differing  configuration  requirements,  e.g. password
512              lengths, the stricter  security  setting  was  chosen.  Security
513              Requirement  Traceability  Guides (RTMs) and sample System Secu‐
514              rity Configuration Guides are provided  via  the  scap-security-
515              guide-docs package.
516
517              This  profile  reflects U.S. Government consensus content and is
518              developed through the ComplianceAsCode initiative, championed by
519              the  National Security Agency. Except for differences in format‐
520              ting to accommodate publishing processes, this  profile  mirrors
521              ComplianceAsCode content as minor divergences, such as bugfixes,
522              work through the consensus and release processes.
523
524
525       NIST National Checklist for Red Hat OpenShift Container Platform
526
527              Profile ID:  xccdf_org.ssgproject.content_profile_ncp
528
529              This compliance  profile  reflects  the  core  set  of  security
530              related  configuration  settings for deployment of Red Hat Open‐
531              Shift Container Platform into U.S.  Defense,  Intelligence,  and
532              Civilian  agencies.   Development  partners and sponsors include
533              the U.S. National Institute of Standards and Technology  (NIST),
534              U.S.  Department  of  Defense, the National Security Agency, and
535              Red Hat.
536
537              This baseline implements  configuration  requirements  from  the
538              following sources:
539
540              -  Committee  on  National Security Systems Instruction No. 1253
541              (CNSSI 1253) - NIST Controlled  Unclassified  Information  (NIST
542              800-171)  -  NIST  800-53 control selections for Moderate-Impact
543              systems (NIST 800-53) - U.S. Government  Configuration  Baseline
544              (USGCB)  - NIAP Protection Profile for General Purpose Operating
545              Systems v4.2.1 (OSPP v4.2.1) - DISA  Operating  System  Security
546              Requirements Guide (OS SRG)
547
548              For  any  differing  configuration  requirements,  e.g. password
549              lengths, the stricter  security  setting  was  chosen.  Security
550              Requirement  Traceability  Guides (RTMs) and sample System Secu‐
551              rity Configuration Guides are provided  via  the  scap-security-
552              guide-docs package.
553
554              This  profile  reflects U.S. Government consensus content and is
555              developed through the ComplianceAsCode initiative, championed by
556              the  National Security Agency. Except for differences in format‐
557              ting to accommodate publishing processes, this  profile  mirrors
558              ComplianceAsCode content as minor divergences, such as bugfixes,
559              work through the consensus and release processes.
560
561
562
563
564

Profiles in Guide to the Secure Configuration of Oracle Linux 7

566       Source Datastream:  ssg-ol7-ds.xml
567
568       The Guide to the Secure Configuration of Oracle Linux 7 is broken  into
569       'profiles',  groupings  of  security settings that correlate to a known
570       policy. Available profiles are:
571
572
573
574       PCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 7
575
576              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
577
578              Ensures PCI-DSS v3.2.1 related security  configuration  settings
579              are applied.
580
581
582       Security Profile of Oracle Linux 7 for SAP
583
584              Profile ID:  xccdf_org.ssgproject.content_profile_sap
585
586              This  profile contains rules for Oracle Linux 7 Operating System
587              in compliance with SAP note 2069760 and  SAP  Security  Baseline
588              Template  version  1.9 Item I-8 and section 4.1.2.2.  Regardless
589              of your system's workload all of these checks should pass.
590
591
592       Standard System Security Profile for Oracle Linux 7
593
594              Profile ID:  xccdf_org.ssgproject.content_profile_standard
595
596              This profile contains rules to ensure standard security baseline
597              of  Oracle  Linux 7 system. Regardless of your system's workload
598              all of these checks should pass.
599
600
601       DISA STIG for Oracle Linux 7
602
603              Profile ID:  xccdf_org.ssgproject.content_profile_stig
604
605              This profile contains configuration checks  that  align  to  the
606              DISA STIG for Oracle Linux V2R2.
607
608
609
610
611

Profiles in Guide to the Secure Configuration of Oracle Linux 8

613       Source Datastream:  ssg-ol8-ds.xml
614
615       The  Guide to the Secure Configuration of Oracle Linux 8 is broken into
616       'profiles', groupings of security settings that correlate  to  a  known
617       policy. Available profiles are:
618
619
620
621       Criminal Justice Information Services (CJIS) Security Policy
622
623              Profile ID:  xccdf_org.ssgproject.content_profile_cjis
624
625              This  profile is derived from FBI's CJIS v5.4 Security Policy. A
626              copy of this policy can be found at  the  CJIS  Security  Policy
627              Resource Center:
628
629              https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
630              center
631
632
633       Unclassified Information in Non-federal Information Systems and Organi‐
634       zations (NIST 800-171)
635
636              Profile ID:  xccdf_org.ssgproject.content_profile_cui
637
638              From  NIST  800-171, Section 2.2: Security requirements for pro‐
639              tecting the confidentiality of  CUI  in  nonfederal  information
640              systems  and  organizations  have  a well-defined structure that
641              consists of:
642
643              (i) a basic security requirements section; (ii) a derived  secu‐
644              rity requirements section.
645
646              The  basic security requirements are obtained from FIPS Publica‐
647              tion 200, which provides the high-level and fundamental security
648              requirements  for  federal  information and information systems.
649              The derived security requirements, which  supplement  the  basic
650              security  requirements,  are taken from the security controls in
651              NIST Special Publication 800-53.
652
653              This profile configures Oracle Linux 8 to the NIST Special  Pub‐
654              lication  800-53  controls  identified  for  securing Controlled
655              Unclassified Information (CUI).
656
657
658       [DRAFT] Australian Cyber Security Centre (ACSC) Essential Eight
659
660              Profile ID:  xccdf_org.ssgproject.content_profile_e8
661
662              This profile contains configuration checks for  Oracle  Linux  8
663              that align to the Australian Cyber Security Centre (ACSC) Essen‐
664              tial Eight.
665
666              A copy of the Essential Eight in Linux Environments guide can be
667              found at the ACSC website:
668
669              https://www.cyber.gov.au/acsc/view-all-content/publica
670              tions/hardening-linux-workstations-and-servers
671
672
673       Health Insurance Portability and Accountability Act (HIPAA)
674
675              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
676
677              The HIPAA Security Rule establishes U.S. national  standards  to
678              protect individuals’ electronic personal health information that
679              is created, received, used, or maintained by a  covered  entity.
680              The  Security Rule requires appropriate administrative, physical
681              and  technical  safeguards  to   ensure   the   confidentiality,
682              integrity,  and security of electronic protected health informa‐
683              tion.
684
685              This profile configures Oracle Linux 8  to  the  HIPAA  Security
686              Rule  identified  for  securing  of  electronic protected health
687              information.
688
689
690       [DRAFT] Protection Profile for General Purpose Operating Systems
691
692              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
693
694              This profile reflects mandatory configuration  controls  identi‐
695              fied  in  the NIAP Configuration Annex to the Protection Profile
696              for General Purpose Operating Systems (Protection  Profile  Ver‐
697              sion 4.2.1).
698
699              This  configuration profile is consistent with CNSSI-1253, which
700              requires U.S. National Security Systems  to  adhere  to  certain
701              configuration  parameters.  Accordingly, this configuration pro‐
702              file is suitable for use in U.S. National Security Systems.
703
704
705       PCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 8
706
707              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
708
709              Ensures PCI-DSS v3.2.1 related security  configuration  settings
710              are applied.
711
712
713       Standard System Security Profile for Oracle Linux 8
714
715              Profile ID:  xccdf_org.ssgproject.content_profile_standard
716
717              This profile contains rules to ensure standard security baseline
718              of Oracle Linux 8 system. Regardless of your  system's  workload
719              all of these checks should pass.
720
721
722
723
724

Profiles in Guide to the Secure Configuration of openSUSE

726       Source Datastream:  ssg-opensuse-ds.xml
727
728       The  Guide to the Secure Configuration of openSUSE is broken into 'pro‐
729       files', groupings of security settings that correlate to a  known  pol‐
730       icy. Available profiles are:
731
732
733
734       Standard System Security Profile for openSUSE
735
736              Profile ID:  xccdf_org.ssgproject.content_profile_standard
737
738              This profile contains rules to ensure standard security baseline
739              of an openSUSE system. Regardless of your system's workload  all
740              of these checks should pass.
741
742
743
744
745

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux

747       CoreOS 4
748       Source Datastream:  ssg-rhcos4-ds.xml
749
750       The Guide to the Secure  Configuration  of  Red  Hat  Enterprise  Linux
751       CoreOS 4 is broken into 'profiles', groupings of security settings that
752       correlate to a known policy. Available profiles are:
753
754
755
756       Australian Cyber Security Centre (ACSC) Essential Eight
757
758              Profile ID:  xccdf_org.ssgproject.content_profile_e8
759
760              This profile contains configuration checks for  Red  Hat  Enter‐
761              prise  Linux  CoreOS that align to the Australian Cyber Security
762              Centre (ACSC) Essential Eight.
763
764              A copy of the Essential Eight in Linux Environments guide can be
765              found at the ACSC website:
766
767              https://www.cyber.gov.au/acsc/view-all-content/publica
768              tions/hardening-linux-workstations-and-servers
769
770
771       NIST 800-53 Moderate-Impact  Baseline  for  Red  Hat  Enterprise  Linux
772       CoreOS
773
774              Profile ID:  xccdf_org.ssgproject.content_profile_moderate
775
776              This compliance profile reflects the core set of Moderate-Impact
777              Baseline configuration settings for deployment of Red Hat Enter‐
778              prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
779              agencies.  Development partners and sponsors  include  the  U.S.
780              National  Institute  of  Standards  and  Technology (NIST), U.S.
781              Department of Defense, the National  Security  Agency,  and  Red
782              Hat.
783
784              This  baseline  implements  configuration  requirements from the
785              following sources:
786
787              - NIST 800-53 control  selections  for  Moderate-Impact  systems
788              (NIST 800-53)
789
790              For  any  differing  configuration  requirements,  e.g. password
791              lengths, the stricter  security  setting  was  chosen.  Security
792              Requirement  Traceability  Guides (RTMs) and sample System Secu‐
793              rity Configuration Guides are provided  via  the  scap-security-
794              guide-docs package.
795
796              This  profile  reflects U.S. Government consensus content and is
797              developed through the ComplianceAsCode initiative, championed by
798              the  National Security Agency. Except for differences in format‐
799              ting to accommodate publishing processes, this  profile  mirrors
800              ComplianceAsCode content as minor divergences, such as bugfixes,
801              work through the consensus and release processes.
802
803
804       NIST National Checklist for Red Hat Enterprise Linux CoreOS
805
806              Profile ID:  xccdf_org.ssgproject.content_profile_ncp
807
808              This compliance  profile  reflects  the  core  set  of  security
809              related  configuration settings for deployment of Red Hat Enter‐
810              prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
811              agencies.   Development  partners  and sponsors include the U.S.
812              National Institute of  Standards  and  Technology  (NIST),  U.S.
813              Department  of  Defense,  the  National Security Agency, and Red
814              Hat.
815
816              This baseline implements  configuration  requirements  from  the
817              following sources:
818
819              -  Committee  on  National Security Systems Instruction No. 1253
820              (CNSSI 1253) - NIST Controlled  Unclassified  Information  (NIST
821              800-171)  -  NIST  800-53 control selections for Moderate-Impact
822              systems (NIST 800-53) - U.S. Government  Configuration  Baseline
823              (USGCB)  - NIAP Protection Profile for General Purpose Operating
824              Systems v4.2.1 (OSPP v4.2.1) - DISA  Operating  System  Security
825              Requirements Guide (OS SRG)
826
827              For  any  differing  configuration  requirements,  e.g. password
828              lengths, the stricter  security  setting  was  chosen.  Security
829              Requirement  Traceability  Guides (RTMs) and sample System Secu‐
830              rity Configuration Guides are provided  via  the  scap-security-
831              guide-docs package.
832
833              This  profile  reflects U.S. Government consensus content and is
834              developed through the ComplianceAsCode initiative, championed by
835              the  National Security Agency. Except for differences in format‐
836              ting to accommodate publishing processes, this  profile  mirrors
837              ComplianceAsCode content as minor divergences, such as bugfixes,
838              work through the consensus and release processes.
839
840
841       Protection Profile for General Purpose Operating Systems
842
843              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
844
845              This profile reflects mandatory configuration  controls  identi‐
846              fied  in  the NIAP Configuration Annex to the Protection Profile
847              for General Purpose Operating Systems (Protection  Profile  Ver‐
848              sion 4.2.1).
849
850              This  configuration profile is consistent with CNSSI-1253, which
851              requires U.S. National Security Systems  to  adhere  to  certain
852              configuration  parameters.  Accordingly, this configuration pro‐
853              file is suitable for use in U.S. National Security Systems.
854
855
856       [DRAFT] DISA STIG for Red Hat Enterprise Linux CoreOS
857
858              Profile ID:  xccdf_org.ssgproject.content_profile_stig
859
860              This profile contains configuration checks  that  align  to  the
861              [DRAFT]  DISA  STIG for Red Hat Enterprise Linux CoreOS which is
862              the operating system layer of Red Hat OpenShift Container  Plat‐
863              form.
864
865
866
867
868

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 7

870       Source Datastream:  ssg-rhel7-ds.xml
871
872       The  Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
873       broken into 'profiles', groupings of security settings  that  correlate
874       to a known policy. Available profiles are:
875
876
877
878       C2S for Red Hat Enterprise Linux 7
879
880              Profile ID:  xccdf_org.ssgproject.content_profile_C2S
881
882              This profile demonstrates compliance against the U.S. Government
883              Commercial Cloud Services (C2S) baseline.
884
885              This baseline was inspired by the Center for  Internet  Security
886              (CIS) Red Hat Enterprise Linux 7 Benchmark, v2.1.1 - 01-31-2017.
887
888              For the SCAP Security Guide project to remain in compliance with
889              CIS' terms and conditions,  specifically  Restrictions(8),  note
890              there  is  no  representation or claim that the C2S profile will
891              ensure a system is in compliance or  consistency  with  the  CIS
892              baseline.
893
894
895       ANSSI-BP-028 (enhanced)
896
897              Profile          ID:           xccdf_org.ssgproject.content_pro‐
898              file_anssi_nt28_enhanced
899
900              This profile contains configurations that align to  ANSSI-BP-028
901              at the enhanced hardening level.
902
903              ANSSI  is  the  French National Information Security Agency, and
904              stands for Agence nationale de la sécurité des systèmes d'infor‐
905              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
906              GNU/Linux systems.
907
908              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
909              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
910              securite-relatives-a-un-systeme-gnulinux/
911
912
913       DRAFT - ANSSI-BP-028 (high)
914
915              Profile          ID:           xccdf_org.ssgproject.content_pro‐
916              file_anssi_nt28_high
917
918              This  profile contains configurations that align to ANSSI-BP-028
919              at the high hardening level.
920
921              ANSSI is the French National Information  Security  Agency,  and
922              stands for Agence nationale de la sécurité des systèmes d'infor‐
923              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
924              GNU/Linux systems.
925
926              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
927              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
928              securite-relatives-a-un-systeme-gnulinux/
929
930
931       ANSSI-BP-028 (intermediary)
932
933              Profile          ID:           xccdf_org.ssgproject.content_pro‐
934              file_anssi_nt28_intermediary
935
936              This profile contains configurations that align to  ANSSI-BP-028
937              at the intermediary hardening level.
938
939              ANSSI  is  the  French National Information Security Agency, and
940              stands for Agence nationale de la sécurité des systèmes d'infor‐
941              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
942              GNU/Linux systems.
943
944              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
945              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
946              securite-relatives-a-un-systeme-gnulinux/
947
948
949       ANSSI-BP-028 (minimal)
950
951              Profile          ID:           xccdf_org.ssgproject.content_pro‐
952              file_anssi_nt28_minimal
953
954              This  profile contains configurations that align to ANSSI-BP-028
955              at the minimal hardening level.
956
957              ANSSI is the French National Information  Security  Agency,  and
958              stands for Agence nationale de la sécurité des systèmes d'infor‐
959              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
960              GNU/Linux systems.
961
962              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
963              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
964              securite-relatives-a-un-systeme-gnulinux/
965
966
967       CIS Red Hat Enterprise Linux 7 Benchmark
968
969              Profile ID:  xccdf_org.ssgproject.content_profile_cis
970
971              This  profile  defines  a baseline that aligns to the Center for
972              Internet  Security®  Red  Hat  Enterprise  Linux  7  Benchmark™,
973              v2.2.0, released 12-27-2017.
974
975              This  profile  includes  Center  for  Internet Security® Red Hat
976              Enterprise Linux 7 CIS Benchmarks™ content.
977
978
979       Criminal Justice Information Services (CJIS) Security Policy
980
981              Profile ID:  xccdf_org.ssgproject.content_profile_cjis
982
983              This profile is derived from FBI's CJIS v5.4 Security Policy.  A
984              copy  of  this  policy  can be found at the CJIS Security Policy
985              Resource Center:
986
987              https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
988              center
989
990
991       Unclassified Information in Non-federal Information Systems and Organi‐
992       zations (NIST 800-171)
993
994              Profile ID:  xccdf_org.ssgproject.content_profile_cui
995
996              From NIST 800-171, Section 2.2: Security requirements  for  pro‐
997              tecting  the  confidentiality  of CUI in non-federal information
998              systems and organizations have  a  well-defined  structure  that
999              consists of:
1000
1001              (i)  a basic security requirements section; (ii) a derived secu‐
1002              rity requirements section.
1003
1004              The basic security requirements are obtained from FIPS  Publica‐
1005              tion 200, which provides the high-level and fundamental security
1006              requirements for federal information  and  information  systems.
1007              The  derived  security  requirements, which supplement the basic
1008              security requirements, are taken from the security  controls  in
1009              NIST Special Publication 800-53.
1010
1011              This  profile  configures Red Hat Enterprise Linux 7 to the NIST
1012              Special Publication 800-53 controls identified for securing Con‐
1013              trolled Unclassified Information (CUI).
1014
1015
1016       Australian Cyber Security Centre (ACSC) Essential Eight
1017
1018              Profile ID:  xccdf_org.ssgproject.content_profile_e8
1019
1020              This  profile  contains  configuration checks for Red Hat Enter‐
1021              prise Linux 7 that align to the Australian Cyber Security Centre
1022              (ACSC) Essential Eight.
1023
1024              A copy of the Essential Eight in Linux Environments guide can be
1025              found at the ACSC website:
1026
1027              https://www.cyber.gov.au/acsc/view-all-content/publica
1028              tions/hardening-linux-workstations-and-servers
1029
1030
1031       Health Insurance Portability and Accountability Act (HIPAA)
1032
1033              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
1034
1035              The  HIPAA  Security Rule establishes U.S. national standards to
1036              protect individuals’ electronic personal health information that
1037              is  created,  received, used, or maintained by a covered entity.
1038              The Security Rule requires appropriate administrative,  physical
1039              and   technical   safeguards   to  ensure  the  confidentiality,
1040              integrity, and security of electronic protected health  informa‐
1041              tion.
1042
1043              This  profile configures Red Hat Enterprise Linux 7 to the HIPAA
1044              Security Rule identified for securing  of  electronic  protected
1045              health information.  Use of this profile in no way guarantees or
1046              makes claims against legal compliance against the HIPAA Security
1047              Rule(s).
1048
1049
1050       NIST National Checklist Program Security Guide
1051
1052              Profile ID:  xccdf_org.ssgproject.content_profile_ncp
1053
1054              This  compliance  profile  reflects  the  core  set  of security
1055              related configuration settings for deployment of Red Hat  Enter‐
1056              prise  Linux  7.x  into U.S. Defense, Intelligence, and Civilian
1057              agencies.  Development partners and sponsors  include  the  U.S.
1058              National  Institute  of  Standards  and  Technology (NIST), U.S.
1059              Department of Defense, the National  Security  Agency,  and  Red
1060              Hat.
1061
1062              This  baseline  implements  configuration  requirements from the
1063              following sources:
1064
1065              - Committee on National Security Systems  Instruction  No.  1253
1066              (CNSSI  1253)  -  NIST Controlled Unclassified Information (NIST
1067              800-171) - NIST 800-53 control selections  for  MODERATE  impact
1068              systems  (NIST  800-53) - U.S. Government Configuration Baseline
1069              (USGCB) - NIAP Protection Profile for General Purpose  Operating
1070              Systems  v4.2.1  (OSPP  v4.2.1) - DISA Operating System Security
1071              Requirements Guide (OS SRG)
1072
1073              For any  differing  configuration  requirements,  e.g.  password
1074              lengths,  the  stricter  security  setting  was chosen. Security
1075              Requirement Traceability Guides (RTMs) and sample  System  Secu‐
1076              rity  Configuration  Guides  are provided via the scap-security-
1077              guide-docs package.
1078
1079              This profile reflects U.S. Government consensus content  and  is
1080              developed  through  the OpenSCAP/SCAP Security Guide initiative,
1081              championed by the National Security Agency. Except  for  differ‐
1082              ences  in  formatting  to accommodate publishing processes, this
1083              profile mirrors OpenSCAP/SCAP Security Guide  content  as  minor
1084              divergences,  such  as  bugfixes, work through the consensus and
1085              release processes.
1086
1087
1088       OSPP - Protection Profile for General Purpose Operating Systems v4.2.1
1089
1090              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
1091
1092              This profile reflects mandatory configuration  controls  identi‐
1093              fied  in  the NIAP Configuration Annex to the Protection Profile
1094              for General Purpose Operating Systems (Protection  Profile  Ver‐
1095              sion 4.2.1).
1096
1097              This  configuration profile is consistent with CNSSI-1253, which
1098              requires U.S. National Security Systems  to  adhere  to  certain
1099              configuration  parameters.  Accordingly, this configuration pro‐
1100              file is suitable for use in U.S. National Security Systems.
1101
1102
1103       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
1104
1105              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
1106
1107              Ensures  PCI-DSS  v3.2.1  security  configuration  settings  are
1108              applied.
1109
1110
1111       [DRAFT]  DISA  STIG  for  Red  Hat Enterprise Linux Virtualization Host
1112       (RHELH)
1113
1114              Profile ID:  xccdf_org.ssgproject.content_profile_rhelh-stig
1115
1116              This *draft* profile contains configuration checks that align to
1117              the  DISA  STIG for Red Hat Enterprise Linux Virtualization Host
1118              (RHELH).
1119
1120
1121       VPP - Protection Profile for Virtualization v. 1.0 for Red  Hat  Enter‐
1122       prise Linux Hypervisor (RHELH)
1123
1124              Profile ID:  xccdf_org.ssgproject.content_profile_rhelh-vpp
1125
1126              This  compliance  profile  reflects  the  core  set  of security
1127              related configuration settings for deployment of Red Hat  Enter‐
1128              prise  Linux  Hypervisor (RHELH) 7.x into U.S. Defense, Intelli‐
1129              gence, and Civilian agencies.  Development partners and sponsors
1130              include  the U.S. National Institute of Standards and Technology
1131              (NIST),  U.S.  Department  of  Defense,  the  National  Security
1132              Agency, and Red Hat.
1133
1134              This  baseline  implements  configuration  requirements from the
1135              following sources:
1136
1137              - Committee on National Security Systems  Instruction  No.  1253
1138              (CNSSI  1253)  -  NIST  800-53  control  selections for MODERATE
1139              impact systems (NIST 800-53)  -  U.S.  Government  Configuration
1140              Baseline  (USGCB)  -  NIAP Protection Profile for Virtualization
1141              v1.0 (VPP v1.0)
1142
1143              For any  differing  configuration  requirements,  e.g.  password
1144              lengths,  the  stricter  security  setting  was chosen. Security
1145              Requirement Traceability Guides (RTMs) and sample  System  Secu‐
1146              rity  Configuration  Guides  are provided via the scap-security-
1147              guide-docs package.
1148
1149              This profile reflects U.S. Government consensus content  and  is
1150              developed  through  the  ComplianceAsCode project, championed by
1151              the National Security Agency. Except for differences in  format‐
1152              ting  to  accommodate publishing processes, this profile mirrors
1153              ComplianceAsCode content as minor divergences, such as bugfixes,
1154              work through the consensus and release processes.
1155
1156
1157       Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
1158
1159              Profile ID:  xccdf_org.ssgproject.content_profile_rht-ccp
1160
1161              This  profile  contains the minimum security relevant configura‐
1162              tion settings recommended by Red Hat, Inc for Red Hat Enterprise
1163              Linux 7 instances deployed by Red Hat Certified Cloud Providers.
1164
1165
1166       Standard System Security Profile for Red Hat Enterprise Linux 7
1167
1168              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1169
1170              This profile contains rules to ensure standard security baseline
1171              of a Red Hat Enterprise Linux 7 system. Regardless of your  sys‐
1172              tem's workload all of these checks should pass.
1173
1174
1175       DISA STIG for Red Hat Enterprise Linux 7
1176
1177              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1178
1179              This  profile  contains  configuration  checks that align to the
1180              DISA STIG for Red Hat Enterprise Linux V3R2.
1181
1182              In addition to being applicable to Red Hat Enterprise  Linux  7,
1183              DISA recognizes this configuration baseline as applicable to the
1184              operating system tier of Red Hat technologies that are based  on
1185              Red Hat Enterprise Linux 7, such as:
1186
1187              -  Red  Hat  Enterprise  Linux Server - Red Hat Enterprise Linux
1188              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1189              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1190              7 image
1191
1192
1193
1194
1195

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 8

1197       Source Datastream:  ssg-rhel8-ds.xml
1198
1199       The Guide to the Secure Configuration of Red Hat Enterprise Linux 8  is
1200       broken  into  'profiles', groupings of security settings that correlate
1201       to a known policy. Available profiles are:
1202
1203
1204
1205       ANSSI-BP-028 (enhanced)
1206
1207              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1208              file_anssi_bp28_enhanced
1209
1210              This  profile contains configurations that align to ANSSI-BP-028
1211              at the enhanced hardening level.
1212
1213              ANSSI is the French National Information  Security  Agency,  and
1214              stands for Agence nationale de la sécurité des systèmes d'infor‐
1215              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
1216              GNU/Linux systems.
1217
1218              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
1219              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1220              securite-relatives-a-un-systeme-gnulinux/
1221
1222
1223       DRAFT - ANSSI-BP-028 (high)
1224
1225              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1226              file_anssi_bp28_high
1227
1228              This profile contains configurations that align to  ANSSI-BP-028
1229              at the high hardening level.
1230
1231              ANSSI  is  the  French National Information Security Agency, and
1232              stands for Agence nationale de la sécurité des systèmes d'infor‐
1233              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
1234              GNU/Linux systems.
1235
1236              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1237              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1238              securite-relatives-a-un-systeme-gnulinux/
1239
1240
1241       ANSSI-BP-028 (intermediary)
1242
1243              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1244              file_anssi_bp28_intermediary
1245
1246              This  profile contains configurations that align to ANSSI-BP-028
1247              at the intermediary hardening level.
1248
1249              ANSSI is the French National Information  Security  Agency,  and
1250              stands for Agence nationale de la sécurité des systèmes d'infor‐
1251              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
1252              GNU/Linux systems.
1253
1254              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
1255              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1256              securite-relatives-a-un-systeme-gnulinux/
1257
1258
1259       ANSSI-BP-028 (minimal)
1260
1261              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1262              file_anssi_bp28_minimal
1263
1264              This profile contains configurations that align to  ANSSI-BP-028
1265              at the minimal hardening level.
1266
1267              ANSSI  is  the  French National Information Security Agency, and
1268              stands for Agence nationale de la sécurité des systèmes d'infor‐
1269              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
1270              GNU/Linux systems.
1271
1272              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1273              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1274              securite-relatives-a-un-systeme-gnulinux/
1275
1276
1277       CIS Red Hat Enterprise Linux 8 Benchmark
1278
1279              Profile ID:  xccdf_org.ssgproject.content_profile_cis
1280
1281              This profile defines a baseline that aligns to  the  Center  for
1282              Internet  Security®  Red  Hat  Enterprise  Linux  8  Benchmark™,
1283              v1.0.0, released 09-30-2019.
1284
1285              This profile includes Center  for  Internet  Security®  Red  Hat
1286              Enterprise Linux 8 CIS Benchmarks™ content.
1287
1288
1289       Criminal Justice Information Services (CJIS) Security Policy
1290
1291              Profile ID:  xccdf_org.ssgproject.content_profile_cjis
1292
1293              This  profile is derived from FBI's CJIS v5.4 Security Policy. A
1294              copy of this policy can be found at  the  CJIS  Security  Policy
1295              Resource Center:
1296
1297              https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
1298              center
1299
1300
1301       Unclassified Information in Non-federal Information Systems and Organi‐
1302       zations (NIST 800-171)
1303
1304              Profile ID:  xccdf_org.ssgproject.content_profile_cui
1305
1306              From  NIST  800-171, Section 2.2: Security requirements for pro‐
1307              tecting the confidentiality of  CUI  in  nonfederal  information
1308              systems  and  organizations  have  a well-defined structure that
1309              consists of:
1310
1311              (i) a basic security requirements section; (ii) a derived  secu‐
1312              rity requirements section.
1313
1314              The  basic security requirements are obtained from FIPS Publica‐
1315              tion 200, which provides the high-level and fundamental security
1316              requirements  for  federal  information and information systems.
1317              The derived security requirements, which  supplement  the  basic
1318              security  requirements,  are taken from the security controls in
1319              NIST Special Publication 800-53.
1320
1321              This profile configures Red Hat Enterprise Linux 8 to  the  NIST
1322              Special Publication 800-53 controls identified for securing Con‐
1323              trolled Unclassified Information (CUI)."
1324
1325
1326       Australian Cyber Security Centre (ACSC) Essential Eight
1327
1328              Profile ID:  xccdf_org.ssgproject.content_profile_e8
1329
1330              This profile contains configuration checks for  Red  Hat  Enter‐
1331              prise Linux 8 that align to the Australian Cyber Security Centre
1332              (ACSC) Essential Eight.
1333
1334              A copy of the Essential Eight in Linux Environments guide can be
1335              found at the ACSC website:
1336
1337              https://www.cyber.gov.au/acsc/view-all-content/publica
1338              tions/hardening-linux-workstations-and-servers
1339
1340
1341       Health Insurance Portability and Accountability Act (HIPAA)
1342
1343              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
1344
1345              The HIPAA Security Rule establishes U.S. national  standards  to
1346              protect individuals’ electronic personal health information that
1347              is created, received, used, or maintained by a  covered  entity.
1348              The  Security Rule requires appropriate administrative, physical
1349              and  technical  safeguards  to   ensure   the   confidentiality,
1350              integrity,  and security of electronic protected health informa‐
1351              tion.
1352
1353              This profile configures Red Hat Enterprise Linux 8 to the  HIPAA
1354              Security  Rule  identified  for securing of electronic protected
1355              health information.  Use of this profile in no way guarantees or
1356              makes claims against legal compliance against the HIPAA Security
1357              Rule(s).
1358
1359
1360       Australian Cyber Security Centre  (ACSC)  Information  Security  Manual
1361       (ISM) Official
1362
1363              Profile ID:  xccdf_org.ssgproject.content_profile_ism_o
1364
1365              This  profile  contains  configuration checks for Red Hat Enter‐
1366              prise Linux 8 that align to the Australian Cyber Security Centre
1367              (ACSC)  Information Security Manual (ISM) with the Attorney-Gen‐
1368              eral’s Department (AGD)’s applicability marking of OFFICIAL.
1369
1370              A overview and list of Cyber security guidelines of the Informa‐
1371              tion Security Manual can be found at the ACSC website:
1372
1373              https://www.cyber.gov.au/ism
1374
1375
1376       Protection Profile for General Purpose Operating Systems
1377
1378              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
1379
1380              This  profile  reflects mandatory configuration controls identi‐
1381              fied in the NIAP Configuration Annex to the  Protection  Profile
1382              for  General  Purpose Operating Systems (Protection Profile Ver‐
1383              sion 4.2.1).
1384
1385              This configuration profile is consistent with CNSSI-1253,  which
1386              requires  U.S.  National  Security  Systems to adhere to certain
1387              configuration parameters. Accordingly, this  configuration  pro‐
1388              file is suitable for use in U.S. National Security Systems.
1389
1390
1391       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
1392
1393              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
1394
1395              Ensures  PCI-DSS  v3.2.1  security  configuration  settings  are
1396              applied.
1397
1398
1399       [DRAFT] DISA STIG for Red  Hat  Enterprise  Linux  Virtualization  Host
1400       (RHELH)
1401
1402              Profile ID:  xccdf_org.ssgproject.content_profile_rhelh-stig
1403
1404              This *draft* profile contains configuration checks that align to
1405              the DISA STIG for Red Hat Enterprise Linux  Virtualization  Host
1406              (RHELH).
1407
1408
1409       VPP  -  Protection Profile for Virtualization v. 1.0 for Red Hat Enter‐
1410       prise Linux Hypervisor (RHELH)
1411
1412              Profile ID:  xccdf_org.ssgproject.content_profile_rhelh-vpp
1413
1414              This compliance  profile  reflects  the  core  set  of  security
1415              related  configuration settings for deployment of Red Hat Enter‐
1416              prise Linux Hypervisor (RHELH) 7.x into U.S.  Defense,  Intelli‐
1417              gence, and Civilian agencies.  Development partners and sponsors
1418              include the U.S. National Institute of Standards and  Technology
1419              (NIST),  U.S.  Department  of  Defense,  the  National  Security
1420              Agency, and Red Hat.
1421
1422              This baseline implements  configuration  requirements  from  the
1423              following sources:
1424
1425              -  Committee  on  National Security Systems Instruction No. 1253
1426              (CNSSI 1253) -  NIST  800-53  control  selections  for  MODERATE
1427              impact  systems  (NIST  800-53)  - U.S. Government Configuration
1428              Baseline (USGCB) - NIAP Protection  Profile  for  Virtualization
1429              v1.0 (VPP v1.0)
1430
1431              For  any  differing  configuration  requirements,  e.g. password
1432              lengths, the stricter  security  setting  was  chosen.  Security
1433              Requirement  Traceability  Guides (RTMs) and sample System Secu‐
1434              rity Configuration Guides are provided  via  the  scap-security-
1435              guide-docs package.
1436
1437              This  profile  reflects U.S. Government consensus content and is
1438              developed through the ComplianceAsCode  project,  championed  by
1439              the  National Security Agency. Except for differences in format‐
1440              ting to accommodate publishing processes, this  profile  mirrors
1441              ComplianceAsCode content as minor divergences, such as bugfixes,
1442              work through the consensus and release processes.
1443
1444
1445       Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
1446
1447              Profile ID:  xccdf_org.ssgproject.content_profile_rht-ccp
1448
1449              This profile contains the minimum security  relevant  configura‐
1450              tion settings recommended by Red Hat, Inc for Red Hat Enterprise
1451              Linux 8 instances deployed by Red Hat Certified Cloud Providers.
1452
1453
1454       Standard System Security Profile for Red Hat Enterprise Linux 8
1455
1456              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1457
1458              This profile contains rules to ensure standard security baseline
1459              of  a Red Hat Enterprise Linux 8 system. Regardless of your sys‐
1460              tem's workload all of these checks should pass.
1461
1462
1463       DISA STIG for Red Hat Enterprise Linux 8
1464
1465              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1466
1467              This profile contains configuration checks  that  align  to  the
1468              DISA STIG for Red Hat Enterprise Linux 8.
1469
1470              In  addition  to being applicable to Red Hat Enterprise Linux 8,
1471              DISA recognizes this configuration baseline as applicable to the
1472              operating  system tier of Red Hat technologies that are based on
1473              Red Hat Enterprise Linux 8, such as:
1474
1475              - Red Hat Enterprise Linux Server -  Red  Hat  Enterprise  Linux
1476              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1477              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1478              8 image
1479
1480
1481
1482
1483

Profiles in Guide to the Secure Configuration of Red Hat OpenStack Platform 10

1485
1486       Source Datastream:  ssg-rhosp10-ds.xml
1487
1488       The Guide to the Secure Configuration of Red Hat OpenStack Platform  10
1489       is  broken  into 'profiles', groupings of security settings that corre‐
1490       late to a known policy. Available profiles are:
1491
1492
1493
1494       [DRAFT] Controlled Unclassified Infomration (CUI) Profile for  Red  Hat
1495       OpenStack Plaform 10
1496
1497              Profile ID:  xccdf_org.ssgproject.content_profile_cui
1498
1499              These are the controls for scanning against CUI for rhosp10
1500
1501
1502       [DRAFT] STIG for Red Hat OpenStack Plaform 10
1503
1504              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1505
1506              Controls for scanning against classified STIG for rhosp10
1507
1508
1509
1510
1511

Profiles in Guide to the Secure Configuration of Red Hat OpenStack Platform 13

1513
1514       Source Datastream:  ssg-rhosp13-ds.xml
1515
1516       The Guide to the Secure Configuration of Red Hat OpenStack Platform  13
1517       is  broken  into 'profiles', groupings of security settings that corre‐
1518       late to a known policy. Available profiles are:
1519
1520
1521
1522       RHOSP STIG
1523
1524              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1525
1526              Sample profile description.
1527
1528
1529
1530
1531

Profiles in Guide to the Secure Configuration of Red Hat Virtualization 4

1533       Source Datastream:  ssg-rhv4-ds.xml
1534
1535       The Guide to the Secure Configuration of Red Hat  Virtualization  4  is
1536       broken  into  'profiles', groupings of security settings that correlate
1537       to a known policy. Available profiles are:
1538
1539
1540
1541       [DRAFT] DISA STIG for Red Hat Virtualization Host (RHVH)
1542
1543              Profile ID:  xccdf_org.ssgproject.content_profile_rhvh-stig
1544
1545              This *draft* profile contains configuration checks that align to
1546              the DISA STIG for Red Hat Virtualization Host (RHVH).
1547
1548
1549       VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Virtual‐
1550       ization Host (RHVH)
1551
1552              Profile ID:  xccdf_org.ssgproject.content_profile_rhvh-vpp
1553
1554              This compliance  profile  reflects  the  core  set  of  security
1555              related  configuration settings for deployment of Red Hat Virtu‐
1556              alization Host (RHVH) 4.x into U.S. Defense,  Intelligence,  and
1557              Civilian  agencies.   Development  partners and sponsors include
1558              the U.S. National Institute of Standards and Technology  (NIST),
1559              U.S.  Department  of  Defense, the National Security Agency, and
1560              Red Hat.
1561
1562              This baseline implements  configuration  requirements  from  the
1563              following sources:
1564
1565              -  Committee  on  National Security Systems Instruction No. 1253
1566              (CNSSI 1253) -  NIST  800-53  control  selections  for  MODERATE
1567              impact  systems  (NIST  800-53)  - U.S. Government Configuration
1568              Baseline (USGCB) - NIAP Protection  Profile  for  Virtualization
1569              v1.0 (VPP v1.0)
1570
1571              For  any  differing  configuration  requirements,  e.g. password
1572              lengths, the stricter  security  setting  was  chosen.  Security
1573              Requirement  Traceability  Guides (RTMs) and sample System Secu‐
1574              rity Configuration Guides are provided  via  the  scap-security-
1575              guide-docs package.
1576
1577              This  profile  reflects U.S. Government consensus content and is
1578              developed through the ComplianceAsCode  project,  championed  by
1579              the  National Security Agency. Except for differences in format‐
1580              ting to accommodate publishing processes, this  profile  mirrors
1581              ComplianceAsCode content as minor divergences, such as bugfixes,
1582              work through the consensus and release processes.
1583
1584
1585
1586
1587

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 7

1589       Source Datastream:  ssg-sl7-ds.xml
1590
1591       The Guide to the Secure Configuration of Red Hat Enterprise Linux 7  is
1592       broken  into  'profiles', groupings of security settings that correlate
1593       to a known policy. Available profiles are:
1594
1595
1596
1597       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
1598
1599              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
1600
1601              Ensures  PCI-DSS  v3.2.1  security  configuration  settings  are
1602              applied.
1603
1604
1605       Standard System Security Profile for Red Hat Enterprise Linux 7
1606
1607              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1608
1609              This profile contains rules to ensure standard security baseline
1610              of a Red Hat Enterprise Linux 7 system. Regardless of your  sys‐
1611              tem's workload all of these checks should pass.
1612
1613
1614
1615
1616

Profiles in Guide to the Secure Configuration of SUSE Linux Enterprise 12

1618       Source Datastream:  ssg-sle12-ds.xml
1619
1620       The  Guide  to  the Secure Configuration of SUSE Linux Enterprise 12 is
1621       broken into 'profiles', groupings of security settings  that  correlate
1622       to a known policy. Available profiles are:
1623
1624
1625
1626       Standard System Security Profile for SUSE Linux Enterprise 12
1627
1628              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1629
1630              This profile contains rules to ensure standard security baseline
1631              of a SUSE Linux Enterprise 12 system. Regardless  of  your  sys‐
1632              tem's workload all of these checks should pass.
1633
1634
1635       DISA STIG for SUSE Linux Enterprise 12
1636
1637              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1638
1639              This  profile  contains  configuration  checks that align to the
1640              DISA STIG for SUSE Linux Enterprise 12 V1R2.
1641
1642
1643
1644
1645

Profiles in Guide to the Secure Configuration of SUSE Linux Enterprise 15

1647       Source Datastream:  ssg-sle15-ds.xml
1648
1649       The Guide to the Secure Configuration of SUSE Linux  Enterprise  15  is
1650       broken  into  'profiles', groupings of security settings that correlate
1651       to a known policy. Available profiles are:
1652
1653
1654
1655       CIS SUSE Linux Enterprise 15 Benchmark
1656
1657              Profile ID:  xccdf_org.ssgproject.content_profile_cis
1658
1659              This baseline aligns to the Center for  Internet  Security  SUSE
1660              Linux Enterprise 15 Benchmark, v1.0.0, currently in draft.
1661
1662
1663       Standard System Security Profile for SUSE Linux Enterprise 15
1664
1665              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1666
1667              This profile contains rules to ensure standard security baseline
1668              of a SUSE Linux Enterprise 15 system based off of the SUSE Hard‐
1669              ening  Guide.  Regardless of your system's workload all of these
1670              checks should pass.
1671
1672
1673
1674
1675

Profiles in Guide to the Secure Configuration of Ubuntu 16.04

1677       Source Datastream:  ssg-ubuntu1604-ds.xml
1678
1679       The Guide to the Secure Configuration of Ubuntu 16.04  is  broken  into
1680       'profiles',  groupings  of  security settings that correlate to a known
1681       policy. Available profiles are:
1682
1683
1684
1685       Profile for ANSSI DAT-NT28 Average (Intermediate) Level
1686
1687              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1688              file_anssi_np_nt28_average
1689
1690              This  profile contains items for GNU/Linux installations already
1691              protected by multiple higher level security stacks.
1692
1693
1694       Profile for ANSSI DAT-NT28 High (Enforced) Level
1695
1696              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1697              file_anssi_np_nt28_high
1698
1699              This  profile contains items for GNU/Linux installations storing
1700              sensitive informations that can be accessible  from  unauthenti‐
1701              cated or uncontroled networks.
1702
1703
1704       Profile for ANSSI DAT-NT28 Minimal Level
1705
1706              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1707              file_anssi_np_nt28_minimal
1708
1709              This profile contains items to be applied systematically.
1710
1711
1712       Profile for ANSSI DAT-NT28 Restrictive Level
1713
1714              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1715              file_anssi_np_nt28_restrictive
1716
1717              This  profile contains items for GNU/Linux installations exposed
1718              to unauthenticated flows or multiple sources.
1719
1720
1721       Standard System Security Profile for Ubuntu 16.04
1722
1723              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1724
1725              This profile contains rules to ensure standard security baseline
1726              of  an Ubuntu 16.04 system. Regardless of your system's workload
1727              all of these checks should pass.
1728
1729
1730
1731
1732

Profiles in Guide to the Secure Configuration of Ubuntu 18.04

1734       Source Datastream:  ssg-ubuntu1804-ds.xml
1735
1736       The Guide to the Secure Configuration of Ubuntu 18.04  is  broken  into
1737       'profiles',  groupings  of  security settings that correlate to a known
1738       policy. Available profiles are:
1739
1740
1741
1742       Profile for ANSSI DAT-NT28 Average (Intermediate) Level
1743
1744              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1745              file_anssi_np_nt28_average
1746
1747              This  profile contains items for GNU/Linux installations already
1748              protected by multiple higher level security stacks.
1749
1750
1751       Profile for ANSSI DAT-NT28 High (Enforced) Level
1752
1753              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1754              file_anssi_np_nt28_high
1755
1756              This  profile contains items for GNU/Linux installations storing
1757              sensitive informations that can be accessible  from  unauthenti‐
1758              cated or uncontroled networks.
1759
1760
1761       Profile for ANSSI DAT-NT28 Minimal Level
1762
1763              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1764              file_anssi_np_nt28_minimal
1765
1766              This profile contains items to be applied systematically.
1767
1768
1769       Profile for ANSSI DAT-NT28 Restrictive Level
1770
1771              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1772              file_anssi_np_nt28_restrictive
1773
1774              This  profile contains items for GNU/Linux installations exposed
1775              to unauthenticated flows or multiple sources.
1776
1777
1778       CIS Ubuntu 18.04 LTS Benchmark
1779
1780              Profile ID:  xccdf_org.ssgproject.content_profile_cis
1781
1782              This baseline aligns to the Center for Internet Security  Ubuntu
1783              18.04 LTS Benchmark, v1.0.0, released 08-13-2018.
1784
1785
1786       Standard System Security Profile for Ubuntu 18.04
1787
1788              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1789
1790              This profile contains rules to ensure standard security baseline
1791              of an Ubuntu 18.04 system. Regardless of your system's  workload
1792              all of these checks should pass.
1793
1794
1795
1796
1797

Profiles in Guide to the Secure Configuration of Ubuntu 20.04

1799       Source Datastream:  ssg-ubuntu2004-ds.xml
1800
1801       The  Guide  to  the Secure Configuration of Ubuntu 20.04 is broken into
1802       'profiles', groupings of security settings that correlate  to  a  known
1803       policy. Available profiles are:
1804
1805
1806
1807       Standard System Security Profile for Ubuntu 20.04
1808
1809              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1810
1811              This profile contains rules to ensure standard security baseline
1812              of an Ubuntu 20.04 system. Regardless of your system's  workload
1813              all of these checks should pass.
1814
1815
1816
1817
1818

Profiles in Guide to the Secure Configuration of McAfee VirusScan Enterprise

1820       for Linux
1821       Source Datastream:  ssg-vsel-ds.xml
1822
1823       The Guide to the Secure Configuration of  McAfee  VirusScan  Enterprise
1824       for  Linux  is  broken  into 'profiles', groupings of security settings
1825       that correlate to a known policy. Available profiles are:
1826
1827
1828
1829       McAfee VirusScan Enterprise for Linux (VSEL) STIG
1830
1831              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1832
1833              The McAfee VirusScan Enterprise for Linux  software  provides  a
1834              realtime virus scanner for Linux systems.
1835
1836
1837
1838
1839

Profiles in Guide to the Secure Configuration of WRLinux 1019

1841       Source Datastream:  ssg-wrlinux1019-ds.xml
1842
1843       The  Guide  to  the Secure Configuration of WRLinux 1019 is broken into
1844       'profiles', groupings of security settings that correlate  to  a  known
1845       policy. Available profiles are:
1846
1847
1848
1849       Basic Profile for Embedded Systems
1850
1851              Profile ID:  xccdf_org.ssgproject.content_profile_basic-embedded
1852
1853              This  profile  contains  items  common  to  many  embedded Linux
1854              installations.  Regardless of your  system's  deployment  objec‐
1855              tive, all of these checks should pass.
1856
1857
1858       DRAFT DISA STIG for Wind River Linux
1859
1860              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1861              file_draft_stig_wrlinux_disa
1862
1863              This profile contains configuration checks  that  align  to  the
1864              DISA STIG for Wind River Linux.  This profile is being developed
1865              under the DoD consensus model to become a STIG  in  coordination
1866              with DISA FSO.  What is the status of the Wind River Linux STIG?
1867              The Wind River Linux STIG is in development under the  DoD  con‐
1868              sensus  model  and  Wind  River  has  started the process to get
1869              approval from DISA. However, in the absence of an  approved  SRG
1870              or STIG, vendor recommendations may be used instead. The current
1871              contents constitute the vendor recommendations at  the  time  of
1872              the  product  release  containing  these  contents.   Note  that
1873              changes are expected  before  approval  is  granted,  and  those
1874              changes  will be made available in future Wind River Linux Secu‐
1875              rity Profile 1019 RCPL releases.   More  information,  including
1876              the  following,  is available from the DISA FAQs at https://pub
1877              lic.cyber.mil/stigs/faqs/
1878
1879
1880
1881
1882

Profiles in Guide to the Secure Configuration of WRLinux 8

1884       Source Datastream:  ssg-wrlinux8-ds.xml
1885
1886       The Guide to the Secure Configuration of WRLinux 8 is broken into 'pro‐
1887       files',  groupings  of security settings that correlate to a known pol‐
1888       icy. Available profiles are:
1889
1890
1891
1892       Basic Profile for Embedded Systems
1893
1894              Profile ID:  xccdf_org.ssgproject.content_profile_basic-embedded
1895
1896              This profile  contains  items  common  to  many  embedded  Linux
1897              installations.   Regardless  of  your system's deployment objec‐
1898              tive, all of these checks should pass.
1899
1900
1901
1902
1903
1904

EXAMPLES

1906       To scan your system utilizing the OpenSCAP  utility  against  the  ospp
1907       profile:
1908
1909       oscap   xccdf   eval   --profile  ospp  --results  /tmp/`hostname`-ssg-
1910       results.xml  --report  /tmp/`hostname`-ssg-results.html  --oval-results
1911       /usr/share/xml/scap/ssg/content/ssg-rhel7-xccdf.xml
1912
1913       Additional   details   can   be   found  on  the  projects  wiki  page:
1914       https://www.github.com/OpenSCAP/scap-security-guide/wiki
1915
1916
1917

FILES

1919       /usr/share/xml/scap/ssg/content
1920              Houses SCAP content utilizing the following naming conventions:
1921
1922              SCAP Source Datastreams: ssg-{product}-ds.xml
1923
1924              CPE Dictionaries: ssg-{product}-cpe-dictionary.xml
1925
1926              CPE OVAL Content: ssg-{product}-cpe-oval.xml
1927
1928              OVAL Content: ssg-{product}-oval.xml
1929
1930              XCCDF Content: ssg-{product}-xccdf.xml
1931
1932       /usr/share/doc/scap-security-guide/guides/
1933              HTML versions of SSG profiles.
1934
1935       /usr/share/scap-security-guide/ansible/
1936              Contains Ansible Playbooks for SSG profiles.
1937
1938       /usr/share/scap-security-guide/bash/
1939              Contains Bash remediation scripts for SSG profiles.
1940
1941

STATEMENT OF SUPPORT

1943       The SCAP Security Guide, an open source project jointly  maintained  by
1944       Red  Hat and the NSA, provides XCCDF and OVAL content for Red Hat tech‐
1945       nologies. As an open source project,  community  participation  extends
1946       into  U.S. Department of Defense agencies, civilian agencies, academia,
1947       and other industrial partners.
1948
1949       SCAP Security Guide is provided to consumers through Red Hat's Extended
1950       Packages for Enterprise Linux (EPEL) repository. As such, SCAP Security
1951       Guide content is considered "vendor provided."
1952
1953       Note that while Red Hat hosts the infrastructure for this  project  and
1954       Red  Hat engineers are involved as maintainers and leaders, there is no
1955       commercial support contracts or service level  agreements  provided  by
1956       Red Hat.
1957
1958       Support,  for  both  users and developers, is provided through the SCAP
1959       Security Guide community.
1960
1961       Homepage:    https://www.open-scap.org/security-policies/scap-security-
1962       guide
1963
1964       Mailing   List:   https://lists.fedorahosted.org/mailman/listinfo/scap-
1965       security-guide
1966
1967
1968

DEPLOYMENT TO U.S. CIVILIAN GOVERNMENT SYSTEMS

1970       SCAP Security Guide content is considered  vendor  (Red  Hat)  provided
1971       content.   Per  guidance  from the U.S. National Institute of Standards
1972       and Technology (NIST), U.S. Government programs are allowed to use Ven‐
1973       dor produced SCAP content in absence of "Governmental Authority" check‐
1974       lists.          The          specific           NIST           verbage:
1975       http://web.nvd.nist.gov/view/ncp/repository/glossary?cid=1#Authority
1976
1977
1978

DEPLOYMENT TO U.S. MILITARY SYSTEMS

1980       DoD  Directive  (DoDD)  8500.1  requires that "all IA and IA-enabled IT
1981       products incorporated into DoD information systems shall be  configured
1982       in  accordance with DoD-approved security configuration guidelines" and
1983       tasks Defense Information Systems Agency (DISA) to "develop and provide
1984       security  configuration  guidance  for IA and IA-enabled IT products in
1985       coordination with Director, NSA."  The output of this authority is  the
1986       DISA Security Technical Implementation Guides, or STIGs. DISA FSO is in
1987       the process of moving the STIGs towards the use of  the  NIST  Security
1988       Content  Automation  Protocol  (SCAP) in order to "automate" compliance
1989       reporting of the STIGs.
1990
1991       Through a common, shared vision,  the  SCAP  Security  Guide  community
1992       enjoys  close  collaboration  directly with NSA, NIST, and DISA FSO. As
1993       stated in Section 1.1 of the Red Hat Enterprise Linux 6 STIG  Overview,
1994       Version 1, Release 2, issued on 03-JUNE-2013:
1995
1996       "The  consensus  content  was  developed  using  an open-source project
1997       called SCAP Security Guide. The project's website is  https://www.open-
1998       scap.org/security-policies/scap-security-guide.  Except for differences
1999       in formatting to accomodate the DISA STIG publishing process, the  con‐
2000       tent  of  the  Red  Hat  Enterprise Linux 6 STIG should mirror the SCAP
2001       Security Guide content with only minor divergence as updates from  mul‐
2002       tiple sources work through the consensus process."
2003
2004       The  DoD  STIG  for  Red  Hat  Enterprise  Linux  7, revision V2R4, was
2005       released in July 2019 Currently, the DoD Red  Hat  Enterprise  Linux  7
2006       STIG  contains only XCCDF content and is available online: https://pub
2007       lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=operating-sys‐
2008       tems%2Cunix-linux
2009
2010       Content published against the public.cyber.mil website is authoritative
2011       STIG content. The SCAP Security Guide project, as  noted  in  the  STIG
2012       overview,  is  considered  upstream  content. Unlike DISA FSO, the SCAP
2013       Security Guide project does publish OVAL automation content. Individual
2014       programs  and  C&A  evaluators make program-level determinations on the
2015       direct usage of the SCAP Security Guide.  Currently there is no blanket
2016       approval.
2017
2018
2019

SEE ALSO

2021       oscap(8)
2022
2023
2024

AUTHOR

2026       Please    direct    all    questions   to   the   SSG   mailing   list:
2027       https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
2028
2029
2030
2031version 1                         26 Jan 2013           scap-security-guide(8)
Impressum