1scap-security-guide(8) System Manager's Manual scap-security-guide(8)
2
3
4
6 SCAP Security Guide - Delivers security guidance, baselines, and asso‐
7 ciated validation mechanisms utilizing the Security Content Automation
8 Protocol (SCAP).
9
10
11
13 The project provides practical security hardening advice for Red Hat
14 products, and also links it to compliance requirements in order to ease
15 deployment activities, such as certification and accreditation. These
16 include requirements in the U.S. government (Federal, Defense, and
17 Intelligence Community) as well as of the financial services and health
18 care industries. For example, high-level and widely-accepted policies
19 such as NIST 800-53 provides prose stating that System Administrators
20 must audit "privileged user actions," but do not define what "privi‐
21 leged actions" are. The SSG bridges the gap between generalized policy
22 requirements and specific implementation guidance, in SCAP formats to
23 support automation whenever possible.
24
25 The projects homepage is located at: https://www.open-scap.org/secu‐
26 rity-policies/scap-security-guide
27
28
29
31 Source Datastream: ssg-centos7-ds.xml
32
33 The Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
34 broken into 'profiles', groupings of security settings that correlate
35 to a known policy. Available profiles are:
36
37
38
39 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
40
41 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
42
43 Ensures PCI-DSS v3.2.1 security configuration settings are
44 applied.
45
46
47 Standard System Security Profile for Red Hat Enterprise Linux 7
48
49 Profile ID: xccdf_org.ssgproject.content_profile_standard
50
51 This profile contains rules to ensure standard security baseline
52 of a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
53 tem's workload all of these checks should pass.
54
55
56
57
58
60 Source Datastream: ssg-centos8-ds.xml
61
62 The Guide to the Secure Configuration of Red Hat Enterprise Linux 8 is
63 broken into 'profiles', groupings of security settings that correlate
64 to a known policy. Available profiles are:
65
66
67
68 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
69
70 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
71
72 Ensures PCI-DSS v3.2.1 security configuration settings are
73 applied.
74
75
76 Standard System Security Profile for Red Hat Enterprise Linux 8
77
78 Profile ID: xccdf_org.ssgproject.content_profile_standard
79
80 This profile contains rules to ensure standard security baseline
81 of a Red Hat Enterprise Linux 8 system. Regardless of your sys‐
82 tem's workload all of these checks should pass.
83
84
85
86
87
89 Source Datastream: ssg-chromium-ds.xml
90
91 The Guide to the Secure Configuration of Chromium is broken into 'pro‐
92 files', groupings of security settings that correlate to a known pol‐
93 icy. Available profiles are:
94
95
96
97 Upstream STIG for Google Chromium
98
99 Profile ID: xccdf_org.ssgproject.content_profile_stig
100
101 This profile is developed under the DoD consensus model and DISA
102 FSO Vendor STIG process, serving as the upstream development
103 environment for the Google Chromium STIG.
104
105 As a result of the upstream/downstream relationship between the
106 SCAP Security Guide project and the official DISA FSO STIG base‐
107 line, users should expect variance between SSG and DISA FSO con‐
108 tent. For official DISA FSO STIG content, refer to https://pub‐
109 lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
110 rity%2Cbrowser-guidance.
111
112 While this profile is packaged by Red Hat as part of the SCAP
113 Security Guide package, please note that commercial support of
114 this SCAP content is NOT available. This profile is provided as
115 example SCAP content with no endorsement for suitability or pro‐
116 duction readiness. Support for this profile is provided by the
117 upstream SCAP Security Guide community on a best-effort basis.
118 The upstream project homepage is https://www.open-scap.org/secu‐
119 rity-policies/scap-security-guide/.
120
121
122
123
124
126 Source Datastream: ssg-debian10-ds.xml
127
128 The Guide to the Secure Configuration of Debian 10 is broken into 'pro‐
129 files', groupings of security settings that correlate to a known pol‐
130 icy. Available profiles are:
131
132
133
134 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
135
136 Profile ID: xccdf_org.ssgproject.content_pro‐
137 file_anssi_np_nt28_average
138
139 This profile contains items for GNU/Linux installations already
140 protected by multiple higher level security stacks.
141
142
143 Profile for ANSSI DAT-NT28 High (Enforced) Level
144
145 Profile ID: xccdf_org.ssgproject.content_pro‐
146 file_anssi_np_nt28_high
147
148 This profile contains items for GNU/Linux installations storing
149 sensitive informations that can be accessible from unauthenti‐
150 cated or uncontroled networks.
151
152
153 Profile for ANSSI DAT-NT28 Minimal Level
154
155 Profile ID: xccdf_org.ssgproject.content_pro‐
156 file_anssi_np_nt28_minimal
157
158 This profile contains items to be applied systematically.
159
160
161 Profile for ANSSI DAT-NT28 Restrictive Level
162
163 Profile ID: xccdf_org.ssgproject.content_pro‐
164 file_anssi_np_nt28_restrictive
165
166 This profile contains items for GNU/Linux installations exposed
167 to unauthenticated flows or multiple sources.
168
169
170 Standard System Security Profile for Debian 10
171
172 Profile ID: xccdf_org.ssgproject.content_profile_standard
173
174 This profile contains rules to ensure standard security baseline
175 of a Debian 10 system. Regardless of your system's workload all
176 of these checks should pass.
177
178
179
180
181
183 Source Datastream: ssg-debian9-ds.xml
184
185 The Guide to the Secure Configuration of Debian 9 is broken into 'pro‐
186 files', groupings of security settings that correlate to a known pol‐
187 icy. Available profiles are:
188
189
190
191 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
192
193 Profile ID: xccdf_org.ssgproject.content_pro‐
194 file_anssi_np_nt28_average
195
196 This profile contains items for GNU/Linux installations already
197 protected by multiple higher level security stacks.
198
199
200 Profile for ANSSI DAT-NT28 High (Enforced) Level
201
202 Profile ID: xccdf_org.ssgproject.content_pro‐
203 file_anssi_np_nt28_high
204
205 This profile contains items for GNU/Linux installations storing
206 sensitive informations that can be accessible from unauthenti‐
207 cated or uncontroled networks.
208
209
210 Profile for ANSSI DAT-NT28 Minimal Level
211
212 Profile ID: xccdf_org.ssgproject.content_pro‐
213 file_anssi_np_nt28_minimal
214
215 This profile contains items to be applied systematically.
216
217
218 Profile for ANSSI DAT-NT28 Restrictive Level
219
220 Profile ID: xccdf_org.ssgproject.content_pro‐
221 file_anssi_np_nt28_restrictive
222
223 This profile contains items for GNU/Linux installations exposed
224 to unauthenticated flows or multiple sources.
225
226
227 Standard System Security Profile for Debian 9
228
229 Profile ID: xccdf_org.ssgproject.content_profile_standard
230
231 This profile contains rules to ensure standard security baseline
232 of a Debian 9 system. Regardless of your system's workload all
233 of these checks should pass.
234
235
236
237
238
240 Source Datastream: ssg-fedora-ds.xml
241
242 The Guide to the Secure Configuration of Fedora is broken into 'pro‐
243 files', groupings of security settings that correlate to a known pol‐
244 icy. Available profiles are:
245
246
247
248 OSPP - Protection Profile for General Purpose Operating Systems
249
250 Profile ID: xccdf_org.ssgproject.content_profile_ospp
251
252 This profile reflects mandatory configuration controls identi‐
253 fied in the NIAP Configuration Annex to the Protection Profile
254 for General Purpose Operating Systems (Protection Profile Ver‐
255 sion 4.2).
256
257 As Fedora OS is moving target, this profile does not guarantee
258 to provide security levels required from US National Security
259 Systems. Main goal of the profile is to provide Fedora develop‐
260 ers with hardened environment similar to the one mandated by US
261 National Security Systems.
262
263
264 PCI-DSS v3.2.1 Control Baseline for Fedora
265
266 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
267
268 Ensures PCI-DSS v3.2.1 related security configuration settings
269 are applied.
270
271
272 Standard System Security Profile for Fedora
273
274 Profile ID: xccdf_org.ssgproject.content_profile_standard
275
276 This profile contains rules to ensure standard security baseline
277 of a Fedora system. Regardless of your system's workload all of
278 these checks should pass.
279
280
281
282
283
285 Source Datastream: ssg-firefox-ds.xml
286
287 The Guide to the Secure Configuration of Firefox is broken into 'pro‐
288 files', groupings of security settings that correlate to a known pol‐
289 icy. Available profiles are:
290
291
292
293 Upstream Firefox STIG
294
295 Profile ID: xccdf_org.ssgproject.content_profile_stig
296
297 This profile is developed under the DoD consensus model and DISA
298 FSO Vendor STIG process, serving as the upstream development
299 environment for the Firefox STIG.
300
301 As a result of the upstream/downstream relationship between the
302 SCAP Security Guide project and the official DISA FSO STIG base‐
303 line, users should expect variance between SSG and DISA FSO con‐
304 tent. For official DISA FSO STIG content, refer to https://pub‐
305 lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
306 rity%2Cbrowser-guidance.
307
308 While this profile is packaged by Red Hat as part of the SCAP
309 Security Guide package, please note that commercial support of
310 this SCAP content is NOT available. This profile is provided as
311 example SCAP content with no endorsement for suitability or pro‐
312 duction readiness. Support for this profile is provided by the
313 upstream SCAP Security Guide community on a best-effort basis.
314 The upstream project homepage is https://www.open-scap.org/secu‐
315 rity-policies/scap-security-guide/.
316
317
318
319
320
322 Source Datastream: ssg-fuse6-ds.xml
323
324 The Guide to the Secure Configuration of JBoss Fuse 6 is broken into
325 'profiles', groupings of security settings that correlate to a known
326 policy. Available profiles are:
327
328
329
330 STIG for Apache ActiveMQ
331
332 Profile ID: xccdf_org.ssgproject.content_profile_amq-stig
333
334 This is a *draft* profile for STIG. This profile is being devel‐
335 oped under the DoD consensus model to become a STIG in coordina‐
336 tion with DISA FSO.
337
338
339 Standard System Security Profile for JBoss
340
341 Profile ID: xccdf_org.ssgproject.content_profile_standard
342
343 This profile contains rules to ensure standard security baseline
344 of JBoss Fuse. Regardless of your system's workload all of these
345 checks should pass.
346
347
348 STIG for JBoss Fuse 6
349
350 Profile ID: xccdf_org.ssgproject.content_profile_stig
351
352 This is a *draft* profile for STIG. This profile is being devel‐
353 oped under the DoD consensus model to become a STIG in coordina‐
354 tion with DISA FSO.
355
356
357
358
359
361 Source Datastream: ssg-jre-ds.xml
362
363 The Guide to the Secure Configuration of Java Runtime Environment is
364 broken into 'profiles', groupings of security settings that correlate
365 to a known policy. Available profiles are:
366
367
368
369 Java Runtime Environment (JRE) STIG
370
371 Profile ID: xccdf_org.ssgproject.content_profile_stig
372
373 The Java Runtime Environment (JRE) is a bundle developed and
374 offered by Oracle Corporation which includes the Java Virtual
375 Machine (JVM), class libraries, and other components necessary
376 to run Java applications and applets. Certain default settings
377 within the JRE pose a security risk so it is necessary to deploy
378 system wide properties to ensure a higher degree of security
379 when utilizing the JRE.
380
381 The IBM Corporation also develops and bundles the Java Runtime
382 Environment (JRE) as well as Red Hat with OpenJDK.
383
384
385
386
387
389 Source Datastream: ssg-macos1015-ds.xml
390
391 The Guide to the Secure Configuration of Apple macOS 10.15 is broken
392 into 'profiles', groupings of security settings that correlate to a
393 known policy. Available profiles are:
394
395
396
397 NIST 800-53 Moderate-Impact Baseline for Apple macOS 10.15 Catalina
398
399 Profile ID: xccdf_org.ssgproject.content_profile_moderate
400
401 This compliance profile reflects the core set of Moderate-Impact
402 Baseline configuration settings for deployment of Apple macOS
403 10.15 Catalina into U.S. Defense, Intelligence, and Civilian
404 agencies. Development partners and sponsors include the U.S.
405 National Institute of Standards and Technology (NIST), U.S.
406 Department of Defense, and the the National Security Agency.
407
408 This baseline implements configuration requirements from the
409 following sources:
410
411 - NIST 800-53 control selections for Moderate-Impact systems
412 (NIST 800-53)
413
414 For any differing configuration requirements, e.g. password
415 lengths, the stricter security setting was chosen. Security
416 Requirement Traceability Guides (RTMs) and sample System Secu‐
417 rity Configuration Guides are provided via the scap-security-
418 guide-docs package.
419
420 This profile reflects U.S. Government consensus content and is
421 developed through the ComplianceAsCode initiative, championed by
422 the National Security Agency. Except for differences in format‐
423 ting to accommodate publishing processes, this profile mirrors
424 ComplianceAsCode content as minor divergences, such as bugfixes,
425 work through the consensus and release processes.
426
427
428
429
430
432 Platform 4
433 Source Datastream: ssg-ocp4-ds.xml
434
435 The Guide to the Secure Configuration of Red Hat OpenShift Container
436 Platform 4 is broken into 'profiles', groupings of security settings
437 that correlate to a known policy. Available profiles are:
438
439
440
441 CIS Red Hat OpenShift Container Platform 4 Benchmark
442
443 Profile ID: xccdf_org.ssgproject.content_profile_cis-node
444
445 This profile defines a baseline that aligns to the Center for
446 Internet Security® Red Hat OpenShift Container Platform 4 Bench‐
447 mark™, V0.3, currently unreleased.
448
449 This profile includes Center for Internet Security® Red Hat
450 OpenShift Container Platform 4 CIS Benchmarks™ content.
451
452 Note that this part of the profile is meant to run on the Oper‐
453 ating System that Red Hat OpenShift Container Platform 4 runs on
454 top of.
455
456 This profile is applicable to OpenShift versions 4.6 and
457 greater.
458
459
460 CIS Red Hat OpenShift Container Platform 4 Benchmark
461
462 Profile ID: xccdf_org.ssgproject.content_profile_cis
463
464 This profile defines a baseline that aligns to the Center for
465 Internet Security® Red Hat OpenShift Container Platform 4 Bench‐
466 mark™, V0.3, currently unreleased.
467
468 This profile includes Center for Internet Security® Red Hat
469 OpenShift Container Platform 4 CIS Benchmarks™ content.
470
471 Note that this part of the profile is meant to run on the Plat‐
472 form that Red Hat OpenShift Container Platform 4 runs on top of.
473
474 This profile is applicable to OpenShift versions 4.6 and
475 greater.
476
477
478 Australian Cyber Security Centre (ACSC) Essential Eight
479
480 Profile ID: xccdf_org.ssgproject.content_profile_e8
481
482 This profile contains configuration checks for Red Hat OpenShift
483 Container Platform that align to the Australian Cyber Security
484 Centre (ACSC) Essential Eight.
485
486 A copy of the Essential Eight in Linux Environments guide can be
487 found at the ACSC website:
488
489 https://www.cyber.gov.au/acsc/view-all-content/publica‐
490 tions/hardening-linux-workstations-and-servers
491
492
493 NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift
494
495 Profile ID: xccdf_org.ssgproject.content_profile_moderate
496
497 This compliance profile reflects the core set of Moderate-Impact
498 Baseline configuration settings for deployment of Red Hat Open‐
499 Shift Container Platform into U.S. Defense, Intelligence, and
500 Civilian agencies. Development partners and sponsors include
501 the U.S. National Institute of Standards and Technology (NIST),
502 U.S. Department of Defense, the National Security Agency, and
503 Red Hat.
504
505 This baseline implements configuration requirements from the
506 following sources:
507
508 - NIST 800-53 control selections for Moderate-Impact systems
509 (NIST 800-53)
510
511 For any differing configuration requirements, e.g. password
512 lengths, the stricter security setting was chosen. Security
513 Requirement Traceability Guides (RTMs) and sample System Secu‐
514 rity Configuration Guides are provided via the scap-security-
515 guide-docs package.
516
517 This profile reflects U.S. Government consensus content and is
518 developed through the ComplianceAsCode initiative, championed by
519 the National Security Agency. Except for differences in format‐
520 ting to accommodate publishing processes, this profile mirrors
521 ComplianceAsCode content as minor divergences, such as bugfixes,
522 work through the consensus and release processes.
523
524
525 NIST National Checklist for Red Hat OpenShift Container Platform
526
527 Profile ID: xccdf_org.ssgproject.content_profile_ncp
528
529 This compliance profile reflects the core set of security
530 related configuration settings for deployment of Red Hat Open‐
531 Shift Container Platform into U.S. Defense, Intelligence, and
532 Civilian agencies. Development partners and sponsors include
533 the U.S. National Institute of Standards and Technology (NIST),
534 U.S. Department of Defense, the National Security Agency, and
535 Red Hat.
536
537 This baseline implements configuration requirements from the
538 following sources:
539
540 - Committee on National Security Systems Instruction No. 1253
541 (CNSSI 1253) - NIST Controlled Unclassified Information (NIST
542 800-171) - NIST 800-53 control selections for Moderate-Impact
543 systems (NIST 800-53) - U.S. Government Configuration Baseline
544 (USGCB) - NIAP Protection Profile for General Purpose Operating
545 Systems v4.2.1 (OSPP v4.2.1) - DISA Operating System Security
546 Requirements Guide (OS SRG)
547
548 For any differing configuration requirements, e.g. password
549 lengths, the stricter security setting was chosen. Security
550 Requirement Traceability Guides (RTMs) and sample System Secu‐
551 rity Configuration Guides are provided via the scap-security-
552 guide-docs package.
553
554 This profile reflects U.S. Government consensus content and is
555 developed through the ComplianceAsCode initiative, championed by
556 the National Security Agency. Except for differences in format‐
557 ting to accommodate publishing processes, this profile mirrors
558 ComplianceAsCode content as minor divergences, such as bugfixes,
559 work through the consensus and release processes.
560
561
562
563
564
566 Source Datastream: ssg-ol7-ds.xml
567
568 The Guide to the Secure Configuration of Oracle Linux 7 is broken into
569 'profiles', groupings of security settings that correlate to a known
570 policy. Available profiles are:
571
572
573
574 PCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 7
575
576 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
577
578 Ensures PCI-DSS v3.2.1 related security configuration settings
579 are applied.
580
581
582 Security Profile of Oracle Linux 7 for SAP
583
584 Profile ID: xccdf_org.ssgproject.content_profile_sap
585
586 This profile contains rules for Oracle Linux 7 Operating System
587 in compliance with SAP note 2069760 and SAP Security Baseline
588 Template version 1.9 Item I-8 and section 4.1.2.2. Regardless
589 of your system's workload all of these checks should pass.
590
591
592 Standard System Security Profile for Oracle Linux 7
593
594 Profile ID: xccdf_org.ssgproject.content_profile_standard
595
596 This profile contains rules to ensure standard security baseline
597 of Oracle Linux 7 system. Regardless of your system's workload
598 all of these checks should pass.
599
600
601 DISA STIG for Oracle Linux 7
602
603 Profile ID: xccdf_org.ssgproject.content_profile_stig
604
605 This profile contains configuration checks that align to the
606 DISA STIG for Oracle Linux V2R2.
607
608
609
610
611
613 Source Datastream: ssg-ol8-ds.xml
614
615 The Guide to the Secure Configuration of Oracle Linux 8 is broken into
616 'profiles', groupings of security settings that correlate to a known
617 policy. Available profiles are:
618
619
620
621 Criminal Justice Information Services (CJIS) Security Policy
622
623 Profile ID: xccdf_org.ssgproject.content_profile_cjis
624
625 This profile is derived from FBI's CJIS v5.4 Security Policy. A
626 copy of this policy can be found at the CJIS Security Policy
627 Resource Center:
628
629 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
630 center
631
632
633 Unclassified Information in Non-federal Information Systems and Organi‐
634 zations (NIST 800-171)
635
636 Profile ID: xccdf_org.ssgproject.content_profile_cui
637
638 From NIST 800-171, Section 2.2: Security requirements for pro‐
639 tecting the confidentiality of CUI in nonfederal information
640 systems and organizations have a well-defined structure that
641 consists of:
642
643 (i) a basic security requirements section; (ii) a derived secu‐
644 rity requirements section.
645
646 The basic security requirements are obtained from FIPS Publica‐
647 tion 200, which provides the high-level and fundamental security
648 requirements for federal information and information systems.
649 The derived security requirements, which supplement the basic
650 security requirements, are taken from the security controls in
651 NIST Special Publication 800-53.
652
653 This profile configures Oracle Linux 8 to the NIST Special Pub‐
654 lication 800-53 controls identified for securing Controlled
655 Unclassified Information (CUI).
656
657
658 [DRAFT] Australian Cyber Security Centre (ACSC) Essential Eight
659
660 Profile ID: xccdf_org.ssgproject.content_profile_e8
661
662 This profile contains configuration checks for Oracle Linux 8
663 that align to the Australian Cyber Security Centre (ACSC) Essen‐
664 tial Eight.
665
666 A copy of the Essential Eight in Linux Environments guide can be
667 found at the ACSC website:
668
669 https://www.cyber.gov.au/acsc/view-all-content/publica‐
670 tions/hardening-linux-workstations-and-servers
671
672
673 Health Insurance Portability and Accountability Act (HIPAA)
674
675 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
676
677 The HIPAA Security Rule establishes U.S. national standards to
678 protect individuals’ electronic personal health information that
679 is created, received, used, or maintained by a covered entity.
680 The Security Rule requires appropriate administrative, physical
681 and technical safeguards to ensure the confidentiality,
682 integrity, and security of electronic protected health informa‐
683 tion.
684
685 This profile configures Oracle Linux 8 to the HIPAA Security
686 Rule identified for securing of electronic protected health
687 information.
688
689
690 [DRAFT] Protection Profile for General Purpose Operating Systems
691
692 Profile ID: xccdf_org.ssgproject.content_profile_ospp
693
694 This profile reflects mandatory configuration controls identi‐
695 fied in the NIAP Configuration Annex to the Protection Profile
696 for General Purpose Operating Systems (Protection Profile Ver‐
697 sion 4.2.1).
698
699 This configuration profile is consistent with CNSSI-1253, which
700 requires U.S. National Security Systems to adhere to certain
701 configuration parameters. Accordingly, this configuration pro‐
702 file is suitable for use in U.S. National Security Systems.
703
704
705 PCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 8
706
707 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
708
709 Ensures PCI-DSS v3.2.1 related security configuration settings
710 are applied.
711
712
713 Standard System Security Profile for Oracle Linux 8
714
715 Profile ID: xccdf_org.ssgproject.content_profile_standard
716
717 This profile contains rules to ensure standard security baseline
718 of Oracle Linux 8 system. Regardless of your system's workload
719 all of these checks should pass.
720
721
722
723
724
726 Source Datastream: ssg-opensuse-ds.xml
727
728 The Guide to the Secure Configuration of openSUSE is broken into 'pro‐
729 files', groupings of security settings that correlate to a known pol‐
730 icy. Available profiles are:
731
732
733
734 Standard System Security Profile for openSUSE
735
736 Profile ID: xccdf_org.ssgproject.content_profile_standard
737
738 This profile contains rules to ensure standard security baseline
739 of an openSUSE system. Regardless of your system's workload all
740 of these checks should pass.
741
742
743
744
745
747 CoreOS 4
748 Source Datastream: ssg-rhcos4-ds.xml
749
750 The Guide to the Secure Configuration of Red Hat Enterprise Linux
751 CoreOS 4 is broken into 'profiles', groupings of security settings that
752 correlate to a known policy. Available profiles are:
753
754
755
756 Australian Cyber Security Centre (ACSC) Essential Eight
757
758 Profile ID: xccdf_org.ssgproject.content_profile_e8
759
760 This profile contains configuration checks for Red Hat Enter‐
761 prise Linux CoreOS that align to the Australian Cyber Security
762 Centre (ACSC) Essential Eight.
763
764 A copy of the Essential Eight in Linux Environments guide can be
765 found at the ACSC website:
766
767 https://www.cyber.gov.au/acsc/view-all-content/publica‐
768 tions/hardening-linux-workstations-and-servers
769
770
771 NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux
772 CoreOS
773
774 Profile ID: xccdf_org.ssgproject.content_profile_moderate
775
776 This compliance profile reflects the core set of Moderate-Impact
777 Baseline configuration settings for deployment of Red Hat Enter‐
778 prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
779 agencies. Development partners and sponsors include the U.S.
780 National Institute of Standards and Technology (NIST), U.S.
781 Department of Defense, the National Security Agency, and Red
782 Hat.
783
784 This baseline implements configuration requirements from the
785 following sources:
786
787 - NIST 800-53 control selections for Moderate-Impact systems
788 (NIST 800-53)
789
790 For any differing configuration requirements, e.g. password
791 lengths, the stricter security setting was chosen. Security
792 Requirement Traceability Guides (RTMs) and sample System Secu‐
793 rity Configuration Guides are provided via the scap-security-
794 guide-docs package.
795
796 This profile reflects U.S. Government consensus content and is
797 developed through the ComplianceAsCode initiative, championed by
798 the National Security Agency. Except for differences in format‐
799 ting to accommodate publishing processes, this profile mirrors
800 ComplianceAsCode content as minor divergences, such as bugfixes,
801 work through the consensus and release processes.
802
803
804 NIST National Checklist for Red Hat Enterprise Linux CoreOS
805
806 Profile ID: xccdf_org.ssgproject.content_profile_ncp
807
808 This compliance profile reflects the core set of security
809 related configuration settings for deployment of Red Hat Enter‐
810 prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
811 agencies. Development partners and sponsors include the U.S.
812 National Institute of Standards and Technology (NIST), U.S.
813 Department of Defense, the National Security Agency, and Red
814 Hat.
815
816 This baseline implements configuration requirements from the
817 following sources:
818
819 - Committee on National Security Systems Instruction No. 1253
820 (CNSSI 1253) - NIST Controlled Unclassified Information (NIST
821 800-171) - NIST 800-53 control selections for Moderate-Impact
822 systems (NIST 800-53) - U.S. Government Configuration Baseline
823 (USGCB) - NIAP Protection Profile for General Purpose Operating
824 Systems v4.2.1 (OSPP v4.2.1) - DISA Operating System Security
825 Requirements Guide (OS SRG)
826
827 For any differing configuration requirements, e.g. password
828 lengths, the stricter security setting was chosen. Security
829 Requirement Traceability Guides (RTMs) and sample System Secu‐
830 rity Configuration Guides are provided via the scap-security-
831 guide-docs package.
832
833 This profile reflects U.S. Government consensus content and is
834 developed through the ComplianceAsCode initiative, championed by
835 the National Security Agency. Except for differences in format‐
836 ting to accommodate publishing processes, this profile mirrors
837 ComplianceAsCode content as minor divergences, such as bugfixes,
838 work through the consensus and release processes.
839
840
841 Protection Profile for General Purpose Operating Systems
842
843 Profile ID: xccdf_org.ssgproject.content_profile_ospp
844
845 This profile reflects mandatory configuration controls identi‐
846 fied in the NIAP Configuration Annex to the Protection Profile
847 for General Purpose Operating Systems (Protection Profile Ver‐
848 sion 4.2.1).
849
850 This configuration profile is consistent with CNSSI-1253, which
851 requires U.S. National Security Systems to adhere to certain
852 configuration parameters. Accordingly, this configuration pro‐
853 file is suitable for use in U.S. National Security Systems.
854
855
856 [DRAFT] DISA STIG for Red Hat Enterprise Linux CoreOS
857
858 Profile ID: xccdf_org.ssgproject.content_profile_stig
859
860 This profile contains configuration checks that align to the
861 [DRAFT] DISA STIG for Red Hat Enterprise Linux CoreOS which is
862 the operating system layer of Red Hat OpenShift Container Plat‐
863 form.
864
865
866
867
868
870 Source Datastream: ssg-rhel7-ds.xml
871
872 The Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
873 broken into 'profiles', groupings of security settings that correlate
874 to a known policy. Available profiles are:
875
876
877
878 C2S for Red Hat Enterprise Linux 7
879
880 Profile ID: xccdf_org.ssgproject.content_profile_C2S
881
882 This profile demonstrates compliance against the U.S. Government
883 Commercial Cloud Services (C2S) baseline.
884
885 This baseline was inspired by the Center for Internet Security
886 (CIS) Red Hat Enterprise Linux 7 Benchmark, v2.1.1 - 01-31-2017.
887
888 For the SCAP Security Guide project to remain in compliance with
889 CIS' terms and conditions, specifically Restrictions(8), note
890 there is no representation or claim that the C2S profile will
891 ensure a system is in compliance or consistency with the CIS
892 baseline.
893
894
895 ANSSI-BP-028 (enhanced)
896
897 Profile ID: xccdf_org.ssgproject.content_pro‐
898 file_anssi_nt28_enhanced
899
900 This profile contains configurations that align to ANSSI-BP-028
901 at the enhanced hardening level.
902
903 ANSSI is the French National Information Security Agency, and
904 stands for Agence nationale de la sécurité des systèmes d'infor‐
905 mation. ANSSI-BP-028 is a configuration recommendation for
906 GNU/Linux systems.
907
908 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
909 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
910 securite-relatives-a-un-systeme-gnulinux/
911
912
913 DRAFT - ANSSI-BP-028 (high)
914
915 Profile ID: xccdf_org.ssgproject.content_pro‐
916 file_anssi_nt28_high
917
918 This profile contains configurations that align to ANSSI-BP-028
919 at the high hardening level.
920
921 ANSSI is the French National Information Security Agency, and
922 stands for Agence nationale de la sécurité des systèmes d'infor‐
923 mation. ANSSI-BP-028 is a configuration recommendation for
924 GNU/Linux systems.
925
926 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
927 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
928 securite-relatives-a-un-systeme-gnulinux/
929
930
931 ANSSI-BP-028 (intermediary)
932
933 Profile ID: xccdf_org.ssgproject.content_pro‐
934 file_anssi_nt28_intermediary
935
936 This profile contains configurations that align to ANSSI-BP-028
937 at the intermediary hardening level.
938
939 ANSSI is the French National Information Security Agency, and
940 stands for Agence nationale de la sécurité des systèmes d'infor‐
941 mation. ANSSI-BP-028 is a configuration recommendation for
942 GNU/Linux systems.
943
944 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
945 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
946 securite-relatives-a-un-systeme-gnulinux/
947
948
949 ANSSI-BP-028 (minimal)
950
951 Profile ID: xccdf_org.ssgproject.content_pro‐
952 file_anssi_nt28_minimal
953
954 This profile contains configurations that align to ANSSI-BP-028
955 at the minimal hardening level.
956
957 ANSSI is the French National Information Security Agency, and
958 stands for Agence nationale de la sécurité des systèmes d'infor‐
959 mation. ANSSI-BP-028 is a configuration recommendation for
960 GNU/Linux systems.
961
962 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
963 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
964 securite-relatives-a-un-systeme-gnulinux/
965
966
967 CIS Red Hat Enterprise Linux 7 Benchmark
968
969 Profile ID: xccdf_org.ssgproject.content_profile_cis
970
971 This profile defines a baseline that aligns to the Center for
972 Internet Security® Red Hat Enterprise Linux 7 Benchmark™,
973 v2.2.0, released 12-27-2017.
974
975 This profile includes Center for Internet Security® Red Hat
976 Enterprise Linux 7 CIS Benchmarks™ content.
977
978
979 Criminal Justice Information Services (CJIS) Security Policy
980
981 Profile ID: xccdf_org.ssgproject.content_profile_cjis
982
983 This profile is derived from FBI's CJIS v5.4 Security Policy. A
984 copy of this policy can be found at the CJIS Security Policy
985 Resource Center:
986
987 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
988 center
989
990
991 Unclassified Information in Non-federal Information Systems and Organi‐
992 zations (NIST 800-171)
993
994 Profile ID: xccdf_org.ssgproject.content_profile_cui
995
996 From NIST 800-171, Section 2.2: Security requirements for pro‐
997 tecting the confidentiality of CUI in non-federal information
998 systems and organizations have a well-defined structure that
999 consists of:
1000
1001 (i) a basic security requirements section; (ii) a derived secu‐
1002 rity requirements section.
1003
1004 The basic security requirements are obtained from FIPS Publica‐
1005 tion 200, which provides the high-level and fundamental security
1006 requirements for federal information and information systems.
1007 The derived security requirements, which supplement the basic
1008 security requirements, are taken from the security controls in
1009 NIST Special Publication 800-53.
1010
1011 This profile configures Red Hat Enterprise Linux 7 to the NIST
1012 Special Publication 800-53 controls identified for securing Con‐
1013 trolled Unclassified Information (CUI).
1014
1015
1016 Australian Cyber Security Centre (ACSC) Essential Eight
1017
1018 Profile ID: xccdf_org.ssgproject.content_profile_e8
1019
1020 This profile contains configuration checks for Red Hat Enter‐
1021 prise Linux 7 that align to the Australian Cyber Security Centre
1022 (ACSC) Essential Eight.
1023
1024 A copy of the Essential Eight in Linux Environments guide can be
1025 found at the ACSC website:
1026
1027 https://www.cyber.gov.au/acsc/view-all-content/publica‐
1028 tions/hardening-linux-workstations-and-servers
1029
1030
1031 Health Insurance Portability and Accountability Act (HIPAA)
1032
1033 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
1034
1035 The HIPAA Security Rule establishes U.S. national standards to
1036 protect individuals’ electronic personal health information that
1037 is created, received, used, or maintained by a covered entity.
1038 The Security Rule requires appropriate administrative, physical
1039 and technical safeguards to ensure the confidentiality,
1040 integrity, and security of electronic protected health informa‐
1041 tion.
1042
1043 This profile configures Red Hat Enterprise Linux 7 to the HIPAA
1044 Security Rule identified for securing of electronic protected
1045 health information. Use of this profile in no way guarantees or
1046 makes claims against legal compliance against the HIPAA Security
1047 Rule(s).
1048
1049
1050 NIST National Checklist Program Security Guide
1051
1052 Profile ID: xccdf_org.ssgproject.content_profile_ncp
1053
1054 This compliance profile reflects the core set of security
1055 related configuration settings for deployment of Red Hat Enter‐
1056 prise Linux 7.x into U.S. Defense, Intelligence, and Civilian
1057 agencies. Development partners and sponsors include the U.S.
1058 National Institute of Standards and Technology (NIST), U.S.
1059 Department of Defense, the National Security Agency, and Red
1060 Hat.
1061
1062 This baseline implements configuration requirements from the
1063 following sources:
1064
1065 - Committee on National Security Systems Instruction No. 1253
1066 (CNSSI 1253) - NIST Controlled Unclassified Information (NIST
1067 800-171) - NIST 800-53 control selections for MODERATE impact
1068 systems (NIST 800-53) - U.S. Government Configuration Baseline
1069 (USGCB) - NIAP Protection Profile for General Purpose Operating
1070 Systems v4.2.1 (OSPP v4.2.1) - DISA Operating System Security
1071 Requirements Guide (OS SRG)
1072
1073 For any differing configuration requirements, e.g. password
1074 lengths, the stricter security setting was chosen. Security
1075 Requirement Traceability Guides (RTMs) and sample System Secu‐
1076 rity Configuration Guides are provided via the scap-security-
1077 guide-docs package.
1078
1079 This profile reflects U.S. Government consensus content and is
1080 developed through the OpenSCAP/SCAP Security Guide initiative,
1081 championed by the National Security Agency. Except for differ‐
1082 ences in formatting to accommodate publishing processes, this
1083 profile mirrors OpenSCAP/SCAP Security Guide content as minor
1084 divergences, such as bugfixes, work through the consensus and
1085 release processes.
1086
1087
1088 OSPP - Protection Profile for General Purpose Operating Systems v4.2.1
1089
1090 Profile ID: xccdf_org.ssgproject.content_profile_ospp
1091
1092 This profile reflects mandatory configuration controls identi‐
1093 fied in the NIAP Configuration Annex to the Protection Profile
1094 for General Purpose Operating Systems (Protection Profile Ver‐
1095 sion 4.2.1).
1096
1097 This configuration profile is consistent with CNSSI-1253, which
1098 requires U.S. National Security Systems to adhere to certain
1099 configuration parameters. Accordingly, this configuration pro‐
1100 file is suitable for use in U.S. National Security Systems.
1101
1102
1103 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
1104
1105 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1106
1107 Ensures PCI-DSS v3.2.1 security configuration settings are
1108 applied.
1109
1110
1111 [DRAFT] DISA STIG for Red Hat Enterprise Linux Virtualization Host
1112 (RHELH)
1113
1114 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-stig
1115
1116 This *draft* profile contains configuration checks that align to
1117 the DISA STIG for Red Hat Enterprise Linux Virtualization Host
1118 (RHELH).
1119
1120
1121 VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Enter‐
1122 prise Linux Hypervisor (RHELH)
1123
1124 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-vpp
1125
1126 This compliance profile reflects the core set of security
1127 related configuration settings for deployment of Red Hat Enter‐
1128 prise Linux Hypervisor (RHELH) 7.x into U.S. Defense, Intelli‐
1129 gence, and Civilian agencies. Development partners and sponsors
1130 include the U.S. National Institute of Standards and Technology
1131 (NIST), U.S. Department of Defense, the National Security
1132 Agency, and Red Hat.
1133
1134 This baseline implements configuration requirements from the
1135 following sources:
1136
1137 - Committee on National Security Systems Instruction No. 1253
1138 (CNSSI 1253) - NIST 800-53 control selections for MODERATE
1139 impact systems (NIST 800-53) - U.S. Government Configuration
1140 Baseline (USGCB) - NIAP Protection Profile for Virtualization
1141 v1.0 (VPP v1.0)
1142
1143 For any differing configuration requirements, e.g. password
1144 lengths, the stricter security setting was chosen. Security
1145 Requirement Traceability Guides (RTMs) and sample System Secu‐
1146 rity Configuration Guides are provided via the scap-security-
1147 guide-docs package.
1148
1149 This profile reflects U.S. Government consensus content and is
1150 developed through the ComplianceAsCode project, championed by
1151 the National Security Agency. Except for differences in format‐
1152 ting to accommodate publishing processes, this profile mirrors
1153 ComplianceAsCode content as minor divergences, such as bugfixes,
1154 work through the consensus and release processes.
1155
1156
1157 Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
1158
1159 Profile ID: xccdf_org.ssgproject.content_profile_rht-ccp
1160
1161 This profile contains the minimum security relevant configura‐
1162 tion settings recommended by Red Hat, Inc for Red Hat Enterprise
1163 Linux 7 instances deployed by Red Hat Certified Cloud Providers.
1164
1165
1166 Standard System Security Profile for Red Hat Enterprise Linux 7
1167
1168 Profile ID: xccdf_org.ssgproject.content_profile_standard
1169
1170 This profile contains rules to ensure standard security baseline
1171 of a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
1172 tem's workload all of these checks should pass.
1173
1174
1175 DISA STIG for Red Hat Enterprise Linux 7
1176
1177 Profile ID: xccdf_org.ssgproject.content_profile_stig
1178
1179 This profile contains configuration checks that align to the
1180 DISA STIG for Red Hat Enterprise Linux V3R2.
1181
1182 In addition to being applicable to Red Hat Enterprise Linux 7,
1183 DISA recognizes this configuration baseline as applicable to the
1184 operating system tier of Red Hat technologies that are based on
1185 Red Hat Enterprise Linux 7, such as:
1186
1187 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
1188 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1189 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1190 7 image
1191
1192
1193
1194
1195
1197 Source Datastream: ssg-rhel8-ds.xml
1198
1199 The Guide to the Secure Configuration of Red Hat Enterprise Linux 8 is
1200 broken into 'profiles', groupings of security settings that correlate
1201 to a known policy. Available profiles are:
1202
1203
1204
1205 ANSSI-BP-028 (enhanced)
1206
1207 Profile ID: xccdf_org.ssgproject.content_pro‐
1208 file_anssi_bp28_enhanced
1209
1210 This profile contains configurations that align to ANSSI-BP-028
1211 at the enhanced hardening level.
1212
1213 ANSSI is the French National Information Security Agency, and
1214 stands for Agence nationale de la sécurité des systèmes d'infor‐
1215 mation. ANSSI-BP-028 is a configuration recommendation for
1216 GNU/Linux systems.
1217
1218 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1219 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1220 securite-relatives-a-un-systeme-gnulinux/
1221
1222
1223 DRAFT - ANSSI-BP-028 (high)
1224
1225 Profile ID: xccdf_org.ssgproject.content_pro‐
1226 file_anssi_bp28_high
1227
1228 This profile contains configurations that align to ANSSI-BP-028
1229 at the high hardening level.
1230
1231 ANSSI is the French National Information Security Agency, and
1232 stands for Agence nationale de la sécurité des systèmes d'infor‐
1233 mation. ANSSI-BP-028 is a configuration recommendation for
1234 GNU/Linux systems.
1235
1236 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1237 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1238 securite-relatives-a-un-systeme-gnulinux/
1239
1240
1241 ANSSI-BP-028 (intermediary)
1242
1243 Profile ID: xccdf_org.ssgproject.content_pro‐
1244 file_anssi_bp28_intermediary
1245
1246 This profile contains configurations that align to ANSSI-BP-028
1247 at the intermediary hardening level.
1248
1249 ANSSI is the French National Information Security Agency, and
1250 stands for Agence nationale de la sécurité des systèmes d'infor‐
1251 mation. ANSSI-BP-028 is a configuration recommendation for
1252 GNU/Linux systems.
1253
1254 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1255 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1256 securite-relatives-a-un-systeme-gnulinux/
1257
1258
1259 ANSSI-BP-028 (minimal)
1260
1261 Profile ID: xccdf_org.ssgproject.content_pro‐
1262 file_anssi_bp28_minimal
1263
1264 This profile contains configurations that align to ANSSI-BP-028
1265 at the minimal hardening level.
1266
1267 ANSSI is the French National Information Security Agency, and
1268 stands for Agence nationale de la sécurité des systèmes d'infor‐
1269 mation. ANSSI-BP-028 is a configuration recommendation for
1270 GNU/Linux systems.
1271
1272 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1273 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1274 securite-relatives-a-un-systeme-gnulinux/
1275
1276
1277 CIS Red Hat Enterprise Linux 8 Benchmark
1278
1279 Profile ID: xccdf_org.ssgproject.content_profile_cis
1280
1281 This profile defines a baseline that aligns to the Center for
1282 Internet Security® Red Hat Enterprise Linux 8 Benchmark™,
1283 v1.0.0, released 09-30-2019.
1284
1285 This profile includes Center for Internet Security® Red Hat
1286 Enterprise Linux 8 CIS Benchmarks™ content.
1287
1288
1289 Criminal Justice Information Services (CJIS) Security Policy
1290
1291 Profile ID: xccdf_org.ssgproject.content_profile_cjis
1292
1293 This profile is derived from FBI's CJIS v5.4 Security Policy. A
1294 copy of this policy can be found at the CJIS Security Policy
1295 Resource Center:
1296
1297 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
1298 center
1299
1300
1301 Unclassified Information in Non-federal Information Systems and Organi‐
1302 zations (NIST 800-171)
1303
1304 Profile ID: xccdf_org.ssgproject.content_profile_cui
1305
1306 From NIST 800-171, Section 2.2: Security requirements for pro‐
1307 tecting the confidentiality of CUI in nonfederal information
1308 systems and organizations have a well-defined structure that
1309 consists of:
1310
1311 (i) a basic security requirements section; (ii) a derived secu‐
1312 rity requirements section.
1313
1314 The basic security requirements are obtained from FIPS Publica‐
1315 tion 200, which provides the high-level and fundamental security
1316 requirements for federal information and information systems.
1317 The derived security requirements, which supplement the basic
1318 security requirements, are taken from the security controls in
1319 NIST Special Publication 800-53.
1320
1321 This profile configures Red Hat Enterprise Linux 8 to the NIST
1322 Special Publication 800-53 controls identified for securing Con‐
1323 trolled Unclassified Information (CUI)."
1324
1325
1326 Australian Cyber Security Centre (ACSC) Essential Eight
1327
1328 Profile ID: xccdf_org.ssgproject.content_profile_e8
1329
1330 This profile contains configuration checks for Red Hat Enter‐
1331 prise Linux 8 that align to the Australian Cyber Security Centre
1332 (ACSC) Essential Eight.
1333
1334 A copy of the Essential Eight in Linux Environments guide can be
1335 found at the ACSC website:
1336
1337 https://www.cyber.gov.au/acsc/view-all-content/publica‐
1338 tions/hardening-linux-workstations-and-servers
1339
1340
1341 Health Insurance Portability and Accountability Act (HIPAA)
1342
1343 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
1344
1345 The HIPAA Security Rule establishes U.S. national standards to
1346 protect individuals’ electronic personal health information that
1347 is created, received, used, or maintained by a covered entity.
1348 The Security Rule requires appropriate administrative, physical
1349 and technical safeguards to ensure the confidentiality,
1350 integrity, and security of electronic protected health informa‐
1351 tion.
1352
1353 This profile configures Red Hat Enterprise Linux 8 to the HIPAA
1354 Security Rule identified for securing of electronic protected
1355 health information. Use of this profile in no way guarantees or
1356 makes claims against legal compliance against the HIPAA Security
1357 Rule(s).
1358
1359
1360 Australian Cyber Security Centre (ACSC) Information Security Manual
1361 (ISM) Official
1362
1363 Profile ID: xccdf_org.ssgproject.content_profile_ism_o
1364
1365 This profile contains configuration checks for Red Hat Enter‐
1366 prise Linux 8 that align to the Australian Cyber Security Centre
1367 (ACSC) Information Security Manual (ISM) with the Attorney-Gen‐
1368 eral’s Department (AGD)’s applicability marking of OFFICIAL.
1369
1370 A overview and list of Cyber security guidelines of the Informa‐
1371 tion Security Manual can be found at the ACSC website:
1372
1373 https://www.cyber.gov.au/ism
1374
1375
1376 Protection Profile for General Purpose Operating Systems
1377
1378 Profile ID: xccdf_org.ssgproject.content_profile_ospp
1379
1380 This profile reflects mandatory configuration controls identi‐
1381 fied in the NIAP Configuration Annex to the Protection Profile
1382 for General Purpose Operating Systems (Protection Profile Ver‐
1383 sion 4.2.1).
1384
1385 This configuration profile is consistent with CNSSI-1253, which
1386 requires U.S. National Security Systems to adhere to certain
1387 configuration parameters. Accordingly, this configuration pro‐
1388 file is suitable for use in U.S. National Security Systems.
1389
1390
1391 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
1392
1393 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1394
1395 Ensures PCI-DSS v3.2.1 security configuration settings are
1396 applied.
1397
1398
1399 [DRAFT] DISA STIG for Red Hat Enterprise Linux Virtualization Host
1400 (RHELH)
1401
1402 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-stig
1403
1404 This *draft* profile contains configuration checks that align to
1405 the DISA STIG for Red Hat Enterprise Linux Virtualization Host
1406 (RHELH).
1407
1408
1409 VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Enter‐
1410 prise Linux Hypervisor (RHELH)
1411
1412 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-vpp
1413
1414 This compliance profile reflects the core set of security
1415 related configuration settings for deployment of Red Hat Enter‐
1416 prise Linux Hypervisor (RHELH) 7.x into U.S. Defense, Intelli‐
1417 gence, and Civilian agencies. Development partners and sponsors
1418 include the U.S. National Institute of Standards and Technology
1419 (NIST), U.S. Department of Defense, the National Security
1420 Agency, and Red Hat.
1421
1422 This baseline implements configuration requirements from the
1423 following sources:
1424
1425 - Committee on National Security Systems Instruction No. 1253
1426 (CNSSI 1253) - NIST 800-53 control selections for MODERATE
1427 impact systems (NIST 800-53) - U.S. Government Configuration
1428 Baseline (USGCB) - NIAP Protection Profile for Virtualization
1429 v1.0 (VPP v1.0)
1430
1431 For any differing configuration requirements, e.g. password
1432 lengths, the stricter security setting was chosen. Security
1433 Requirement Traceability Guides (RTMs) and sample System Secu‐
1434 rity Configuration Guides are provided via the scap-security-
1435 guide-docs package.
1436
1437 This profile reflects U.S. Government consensus content and is
1438 developed through the ComplianceAsCode project, championed by
1439 the National Security Agency. Except for differences in format‐
1440 ting to accommodate publishing processes, this profile mirrors
1441 ComplianceAsCode content as minor divergences, such as bugfixes,
1442 work through the consensus and release processes.
1443
1444
1445 Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
1446
1447 Profile ID: xccdf_org.ssgproject.content_profile_rht-ccp
1448
1449 This profile contains the minimum security relevant configura‐
1450 tion settings recommended by Red Hat, Inc for Red Hat Enterprise
1451 Linux 8 instances deployed by Red Hat Certified Cloud Providers.
1452
1453
1454 Standard System Security Profile for Red Hat Enterprise Linux 8
1455
1456 Profile ID: xccdf_org.ssgproject.content_profile_standard
1457
1458 This profile contains rules to ensure standard security baseline
1459 of a Red Hat Enterprise Linux 8 system. Regardless of your sys‐
1460 tem's workload all of these checks should pass.
1461
1462
1463 DISA STIG for Red Hat Enterprise Linux 8
1464
1465 Profile ID: xccdf_org.ssgproject.content_profile_stig
1466
1467 This profile contains configuration checks that align to the
1468 DISA STIG for Red Hat Enterprise Linux 8.
1469
1470 In addition to being applicable to Red Hat Enterprise Linux 8,
1471 DISA recognizes this configuration baseline as applicable to the
1472 operating system tier of Red Hat technologies that are based on
1473 Red Hat Enterprise Linux 8, such as:
1474
1475 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
1476 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1477 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1478 8 image
1479
1480
1481
1482
1483
1485
1486 Source Datastream: ssg-rhosp10-ds.xml
1487
1488 The Guide to the Secure Configuration of Red Hat OpenStack Platform 10
1489 is broken into 'profiles', groupings of security settings that corre‐
1490 late to a known policy. Available profiles are:
1491
1492
1493
1494 [DRAFT] Controlled Unclassified Infomration (CUI) Profile for Red Hat
1495 OpenStack Plaform 10
1496
1497 Profile ID: xccdf_org.ssgproject.content_profile_cui
1498
1499 These are the controls for scanning against CUI for rhosp10
1500
1501
1502 [DRAFT] STIG for Red Hat OpenStack Plaform 10
1503
1504 Profile ID: xccdf_org.ssgproject.content_profile_stig
1505
1506 Controls for scanning against classified STIG for rhosp10
1507
1508
1509
1510
1511
1513
1514 Source Datastream: ssg-rhosp13-ds.xml
1515
1516 The Guide to the Secure Configuration of Red Hat OpenStack Platform 13
1517 is broken into 'profiles', groupings of security settings that corre‐
1518 late to a known policy. Available profiles are:
1519
1520
1521
1522 RHOSP STIG
1523
1524 Profile ID: xccdf_org.ssgproject.content_profile_stig
1525
1526 Sample profile description.
1527
1528
1529
1530
1531
1533 Source Datastream: ssg-rhv4-ds.xml
1534
1535 The Guide to the Secure Configuration of Red Hat Virtualization 4 is
1536 broken into 'profiles', groupings of security settings that correlate
1537 to a known policy. Available profiles are:
1538
1539
1540
1541 [DRAFT] DISA STIG for Red Hat Virtualization Host (RHVH)
1542
1543 Profile ID: xccdf_org.ssgproject.content_profile_rhvh-stig
1544
1545 This *draft* profile contains configuration checks that align to
1546 the DISA STIG for Red Hat Virtualization Host (RHVH).
1547
1548
1549 VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Virtual‐
1550 ization Host (RHVH)
1551
1552 Profile ID: xccdf_org.ssgproject.content_profile_rhvh-vpp
1553
1554 This compliance profile reflects the core set of security
1555 related configuration settings for deployment of Red Hat Virtu‐
1556 alization Host (RHVH) 4.x into U.S. Defense, Intelligence, and
1557 Civilian agencies. Development partners and sponsors include
1558 the U.S. National Institute of Standards and Technology (NIST),
1559 U.S. Department of Defense, the National Security Agency, and
1560 Red Hat.
1561
1562 This baseline implements configuration requirements from the
1563 following sources:
1564
1565 - Committee on National Security Systems Instruction No. 1253
1566 (CNSSI 1253) - NIST 800-53 control selections for MODERATE
1567 impact systems (NIST 800-53) - U.S. Government Configuration
1568 Baseline (USGCB) - NIAP Protection Profile for Virtualization
1569 v1.0 (VPP v1.0)
1570
1571 For any differing configuration requirements, e.g. password
1572 lengths, the stricter security setting was chosen. Security
1573 Requirement Traceability Guides (RTMs) and sample System Secu‐
1574 rity Configuration Guides are provided via the scap-security-
1575 guide-docs package.
1576
1577 This profile reflects U.S. Government consensus content and is
1578 developed through the ComplianceAsCode project, championed by
1579 the National Security Agency. Except for differences in format‐
1580 ting to accommodate publishing processes, this profile mirrors
1581 ComplianceAsCode content as minor divergences, such as bugfixes,
1582 work through the consensus and release processes.
1583
1584
1585
1586
1587
1589 Source Datastream: ssg-sl7-ds.xml
1590
1591 The Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
1592 broken into 'profiles', groupings of security settings that correlate
1593 to a known policy. Available profiles are:
1594
1595
1596
1597 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
1598
1599 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1600
1601 Ensures PCI-DSS v3.2.1 security configuration settings are
1602 applied.
1603
1604
1605 Standard System Security Profile for Red Hat Enterprise Linux 7
1606
1607 Profile ID: xccdf_org.ssgproject.content_profile_standard
1608
1609 This profile contains rules to ensure standard security baseline
1610 of a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
1611 tem's workload all of these checks should pass.
1612
1613
1614
1615
1616
1618 Source Datastream: ssg-sle12-ds.xml
1619
1620 The Guide to the Secure Configuration of SUSE Linux Enterprise 12 is
1621 broken into 'profiles', groupings of security settings that correlate
1622 to a known policy. Available profiles are:
1623
1624
1625
1626 Standard System Security Profile for SUSE Linux Enterprise 12
1627
1628 Profile ID: xccdf_org.ssgproject.content_profile_standard
1629
1630 This profile contains rules to ensure standard security baseline
1631 of a SUSE Linux Enterprise 12 system. Regardless of your sys‐
1632 tem's workload all of these checks should pass.
1633
1634
1635 DISA STIG for SUSE Linux Enterprise 12
1636
1637 Profile ID: xccdf_org.ssgproject.content_profile_stig
1638
1639 This profile contains configuration checks that align to the
1640 DISA STIG for SUSE Linux Enterprise 12 V1R2.
1641
1642
1643
1644
1645
1647 Source Datastream: ssg-sle15-ds.xml
1648
1649 The Guide to the Secure Configuration of SUSE Linux Enterprise 15 is
1650 broken into 'profiles', groupings of security settings that correlate
1651 to a known policy. Available profiles are:
1652
1653
1654
1655 CIS SUSE Linux Enterprise 15 Benchmark
1656
1657 Profile ID: xccdf_org.ssgproject.content_profile_cis
1658
1659 This baseline aligns to the Center for Internet Security SUSE
1660 Linux Enterprise 15 Benchmark, v1.0.0, currently in draft.
1661
1662
1663 Standard System Security Profile for SUSE Linux Enterprise 15
1664
1665 Profile ID: xccdf_org.ssgproject.content_profile_standard
1666
1667 This profile contains rules to ensure standard security baseline
1668 of a SUSE Linux Enterprise 15 system based off of the SUSE Hard‐
1669 ening Guide. Regardless of your system's workload all of these
1670 checks should pass.
1671
1672
1673
1674
1675
1677 Source Datastream: ssg-ubuntu1604-ds.xml
1678
1679 The Guide to the Secure Configuration of Ubuntu 16.04 is broken into
1680 'profiles', groupings of security settings that correlate to a known
1681 policy. Available profiles are:
1682
1683
1684
1685 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
1686
1687 Profile ID: xccdf_org.ssgproject.content_pro‐
1688 file_anssi_np_nt28_average
1689
1690 This profile contains items for GNU/Linux installations already
1691 protected by multiple higher level security stacks.
1692
1693
1694 Profile for ANSSI DAT-NT28 High (Enforced) Level
1695
1696 Profile ID: xccdf_org.ssgproject.content_pro‐
1697 file_anssi_np_nt28_high
1698
1699 This profile contains items for GNU/Linux installations storing
1700 sensitive informations that can be accessible from unauthenti‐
1701 cated or uncontroled networks.
1702
1703
1704 Profile for ANSSI DAT-NT28 Minimal Level
1705
1706 Profile ID: xccdf_org.ssgproject.content_pro‐
1707 file_anssi_np_nt28_minimal
1708
1709 This profile contains items to be applied systematically.
1710
1711
1712 Profile for ANSSI DAT-NT28 Restrictive Level
1713
1714 Profile ID: xccdf_org.ssgproject.content_pro‐
1715 file_anssi_np_nt28_restrictive
1716
1717 This profile contains items for GNU/Linux installations exposed
1718 to unauthenticated flows or multiple sources.
1719
1720
1721 Standard System Security Profile for Ubuntu 16.04
1722
1723 Profile ID: xccdf_org.ssgproject.content_profile_standard
1724
1725 This profile contains rules to ensure standard security baseline
1726 of an Ubuntu 16.04 system. Regardless of your system's workload
1727 all of these checks should pass.
1728
1729
1730
1731
1732
1734 Source Datastream: ssg-ubuntu1804-ds.xml
1735
1736 The Guide to the Secure Configuration of Ubuntu 18.04 is broken into
1737 'profiles', groupings of security settings that correlate to a known
1738 policy. Available profiles are:
1739
1740
1741
1742 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
1743
1744 Profile ID: xccdf_org.ssgproject.content_pro‐
1745 file_anssi_np_nt28_average
1746
1747 This profile contains items for GNU/Linux installations already
1748 protected by multiple higher level security stacks.
1749
1750
1751 Profile for ANSSI DAT-NT28 High (Enforced) Level
1752
1753 Profile ID: xccdf_org.ssgproject.content_pro‐
1754 file_anssi_np_nt28_high
1755
1756 This profile contains items for GNU/Linux installations storing
1757 sensitive informations that can be accessible from unauthenti‐
1758 cated or uncontroled networks.
1759
1760
1761 Profile for ANSSI DAT-NT28 Minimal Level
1762
1763 Profile ID: xccdf_org.ssgproject.content_pro‐
1764 file_anssi_np_nt28_minimal
1765
1766 This profile contains items to be applied systematically.
1767
1768
1769 Profile for ANSSI DAT-NT28 Restrictive Level
1770
1771 Profile ID: xccdf_org.ssgproject.content_pro‐
1772 file_anssi_np_nt28_restrictive
1773
1774 This profile contains items for GNU/Linux installations exposed
1775 to unauthenticated flows or multiple sources.
1776
1777
1778 CIS Ubuntu 18.04 LTS Benchmark
1779
1780 Profile ID: xccdf_org.ssgproject.content_profile_cis
1781
1782 This baseline aligns to the Center for Internet Security Ubuntu
1783 18.04 LTS Benchmark, v1.0.0, released 08-13-2018.
1784
1785
1786 Standard System Security Profile for Ubuntu 18.04
1787
1788 Profile ID: xccdf_org.ssgproject.content_profile_standard
1789
1790 This profile contains rules to ensure standard security baseline
1791 of an Ubuntu 18.04 system. Regardless of your system's workload
1792 all of these checks should pass.
1793
1794
1795
1796
1797
1799 Source Datastream: ssg-ubuntu2004-ds.xml
1800
1801 The Guide to the Secure Configuration of Ubuntu 20.04 is broken into
1802 'profiles', groupings of security settings that correlate to a known
1803 policy. Available profiles are:
1804
1805
1806
1807 Standard System Security Profile for Ubuntu 20.04
1808
1809 Profile ID: xccdf_org.ssgproject.content_profile_standard
1810
1811 This profile contains rules to ensure standard security baseline
1812 of an Ubuntu 20.04 system. Regardless of your system's workload
1813 all of these checks should pass.
1814
1815
1816
1817
1818
1820 for Linux
1821 Source Datastream: ssg-vsel-ds.xml
1822
1823 The Guide to the Secure Configuration of McAfee VirusScan Enterprise
1824 for Linux is broken into 'profiles', groupings of security settings
1825 that correlate to a known policy. Available profiles are:
1826
1827
1828
1829 McAfee VirusScan Enterprise for Linux (VSEL) STIG
1830
1831 Profile ID: xccdf_org.ssgproject.content_profile_stig
1832
1833 The McAfee VirusScan Enterprise for Linux software provides a
1834 realtime virus scanner for Linux systems.
1835
1836
1837
1838
1839
1841 Source Datastream: ssg-wrlinux1019-ds.xml
1842
1843 The Guide to the Secure Configuration of WRLinux 1019 is broken into
1844 'profiles', groupings of security settings that correlate to a known
1845 policy. Available profiles are:
1846
1847
1848
1849 Basic Profile for Embedded Systems
1850
1851 Profile ID: xccdf_org.ssgproject.content_profile_basic-embedded
1852
1853 This profile contains items common to many embedded Linux
1854 installations. Regardless of your system's deployment objec‐
1855 tive, all of these checks should pass.
1856
1857
1858 DRAFT DISA STIG for Wind River Linux
1859
1860 Profile ID: xccdf_org.ssgproject.content_pro‐
1861 file_draft_stig_wrlinux_disa
1862
1863 This profile contains configuration checks that align to the
1864 DISA STIG for Wind River Linux. This profile is being developed
1865 under the DoD consensus model to become a STIG in coordination
1866 with DISA FSO. What is the status of the Wind River Linux STIG?
1867 The Wind River Linux STIG is in development under the DoD con‐
1868 sensus model and Wind River has started the process to get
1869 approval from DISA. However, in the absence of an approved SRG
1870 or STIG, vendor recommendations may be used instead. The current
1871 contents constitute the vendor recommendations at the time of
1872 the product release containing these contents. Note that
1873 changes are expected before approval is granted, and those
1874 changes will be made available in future Wind River Linux Secu‐
1875 rity Profile 1019 RCPL releases. More information, including
1876 the following, is available from the DISA FAQs at https://pub‐
1877 lic.cyber.mil/stigs/faqs/
1878
1879
1880
1881
1882
1884 Source Datastream: ssg-wrlinux8-ds.xml
1885
1886 The Guide to the Secure Configuration of WRLinux 8 is broken into 'pro‐
1887 files', groupings of security settings that correlate to a known pol‐
1888 icy. Available profiles are:
1889
1890
1891
1892 Basic Profile for Embedded Systems
1893
1894 Profile ID: xccdf_org.ssgproject.content_profile_basic-embedded
1895
1896 This profile contains items common to many embedded Linux
1897 installations. Regardless of your system's deployment objec‐
1898 tive, all of these checks should pass.
1899
1900
1901
1902
1903
1904
1906 To scan your system utilizing the OpenSCAP utility against the ospp
1907 profile:
1908
1909 oscap xccdf eval --profile ospp --results /tmp/`hostname`-ssg-
1910 results.xml --report /tmp/`hostname`-ssg-results.html --oval-results
1911 /usr/share/xml/scap/ssg/content/ssg-rhel7-xccdf.xml
1912
1913 Additional details can be found on the projects wiki page:
1914 https://www.github.com/OpenSCAP/scap-security-guide/wiki
1915
1916
1917
1919 /usr/share/xml/scap/ssg/content
1920 Houses SCAP content utilizing the following naming conventions:
1921
1922 SCAP Source Datastreams: ssg-{product}-ds.xml
1923
1924 CPE Dictionaries: ssg-{product}-cpe-dictionary.xml
1925
1926 CPE OVAL Content: ssg-{product}-cpe-oval.xml
1927
1928 OVAL Content: ssg-{product}-oval.xml
1929
1930 XCCDF Content: ssg-{product}-xccdf.xml
1931
1932 /usr/share/doc/scap-security-guide/guides/
1933 HTML versions of SSG profiles.
1934
1935 /usr/share/scap-security-guide/ansible/
1936 Contains Ansible Playbooks for SSG profiles.
1937
1938 /usr/share/scap-security-guide/bash/
1939 Contains Bash remediation scripts for SSG profiles.
1940
1941
1943 The SCAP Security Guide, an open source project jointly maintained by
1944 Red Hat and the NSA, provides XCCDF and OVAL content for Red Hat tech‐
1945 nologies. As an open source project, community participation extends
1946 into U.S. Department of Defense agencies, civilian agencies, academia,
1947 and other industrial partners.
1948
1949 SCAP Security Guide is provided to consumers through Red Hat's Extended
1950 Packages for Enterprise Linux (EPEL) repository. As such, SCAP Security
1951 Guide content is considered "vendor provided."
1952
1953 Note that while Red Hat hosts the infrastructure for this project and
1954 Red Hat engineers are involved as maintainers and leaders, there is no
1955 commercial support contracts or service level agreements provided by
1956 Red Hat.
1957
1958 Support, for both users and developers, is provided through the SCAP
1959 Security Guide community.
1960
1961 Homepage: https://www.open-scap.org/security-policies/scap-security-
1962 guide
1963
1964 Mailing List: https://lists.fedorahosted.org/mailman/listinfo/scap-
1965 security-guide
1966
1967
1968
1970 SCAP Security Guide content is considered vendor (Red Hat) provided
1971 content. Per guidance from the U.S. National Institute of Standards
1972 and Technology (NIST), U.S. Government programs are allowed to use Ven‐
1973 dor produced SCAP content in absence of "Governmental Authority" check‐
1974 lists. The specific NIST verbage:
1975 http://web.nvd.nist.gov/view/ncp/repository/glossary?cid=1#Authority
1976
1977
1978
1980 DoD Directive (DoDD) 8500.1 requires that "all IA and IA-enabled IT
1981 products incorporated into DoD information systems shall be configured
1982 in accordance with DoD-approved security configuration guidelines" and
1983 tasks Defense Information Systems Agency (DISA) to "develop and provide
1984 security configuration guidance for IA and IA-enabled IT products in
1985 coordination with Director, NSA." The output of this authority is the
1986 DISA Security Technical Implementation Guides, or STIGs. DISA FSO is in
1987 the process of moving the STIGs towards the use of the NIST Security
1988 Content Automation Protocol (SCAP) in order to "automate" compliance
1989 reporting of the STIGs.
1990
1991 Through a common, shared vision, the SCAP Security Guide community
1992 enjoys close collaboration directly with NSA, NIST, and DISA FSO. As
1993 stated in Section 1.1 of the Red Hat Enterprise Linux 6 STIG Overview,
1994 Version 1, Release 2, issued on 03-JUNE-2013:
1995
1996 "The consensus content was developed using an open-source project
1997 called SCAP Security Guide. The project's website is https://www.open-
1998 scap.org/security-policies/scap-security-guide. Except for differences
1999 in formatting to accomodate the DISA STIG publishing process, the con‐
2000 tent of the Red Hat Enterprise Linux 6 STIG should mirror the SCAP
2001 Security Guide content with only minor divergence as updates from mul‐
2002 tiple sources work through the consensus process."
2003
2004 The DoD STIG for Red Hat Enterprise Linux 7, revision V2R4, was
2005 released in July 2019 Currently, the DoD Red Hat Enterprise Linux 7
2006 STIG contains only XCCDF content and is available online: https://pub‐
2007 lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=operating-sys‐
2008 tems%2Cunix-linux
2009
2010 Content published against the public.cyber.mil website is authoritative
2011 STIG content. The SCAP Security Guide project, as noted in the STIG
2012 overview, is considered upstream content. Unlike DISA FSO, the SCAP
2013 Security Guide project does publish OVAL automation content. Individual
2014 programs and C&A evaluators make program-level determinations on the
2015 direct usage of the SCAP Security Guide. Currently there is no blanket
2016 approval.
2017
2018
2019
2021 oscap(8)
2022
2023
2024
2026 Please direct all questions to the SSG mailing list:
2027 https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
2028
2029
2030
2031version 1 26 Jan 2013 scap-security-guide(8)