1scap-security-guide(8) System Manager's Manual scap-security-guide(8)
2
3
4
6 SCAP Security Guide - Delivers security guidance, baselines, and asso‐
7 ciated validation mechanisms utilizing the Security Content Automation
8 Protocol (SCAP).
9
10
11
13 The project provides practical security hardening advice and also links
14 it to compliance requirements in order to ease deployment activities,
15 such as certification and accreditation. These include requirements in
16 the U.S. government (Federal, Defense, and Intelligence Community) as
17 well as of the financial services and health care industries. For exam‐
18 ple, high-level and widely-accepted policies such as NIST 800-53 pro‐
19 vides prose stating that System Administrators must audit "privileged
20 user actions," but do not define what "privileged actions" are. The SSG
21 bridges the gap between generalized policy requirements and specific
22 implementation guidance, in SCAP formats to support automation whenever
23 possible.
24
25 The projects homepage is located at: https://www.open-scap.org/secu‐
26 rity-policies/scap-security-guide
27
28
29
31 Source Datastream: ssg-centos7-ds.xml
32
33 The Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
34 broken into 'profiles', groupings of security settings that correlate
35 to a known policy. Available profiles are:
36
37
38
39 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
40
41 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
42
43 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
44 plied.
45
46
47 Standard System Security Profile for Red Hat Enterprise Linux 7
48
49 Profile ID: xccdf_org.ssgproject.content_profile_standard
50
51 This profile contains rules to ensure standard security baseline
52 of a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
53 tem's workload all of these checks should pass.
54
55
56
57
58
60 Source Datastream: ssg-centos8-ds.xml
61
62 The Guide to the Secure Configuration of Red Hat Enterprise Linux 8 is
63 broken into 'profiles', groupings of security settings that correlate
64 to a known policy. Available profiles are:
65
66
67
68 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
69
70 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
71
72 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
73 plied.
74
75
76 Standard System Security Profile for Red Hat Enterprise Linux 8
77
78 Profile ID: xccdf_org.ssgproject.content_profile_standard
79
80 This profile contains rules to ensure standard security baseline
81 of a Red Hat Enterprise Linux 8 system. Regardless of your sys‐
82 tem's workload all of these checks should pass.
83
84
85
86
87
89 Source Datastream: ssg-chromium-ds.xml
90
91 The Guide to the Secure Configuration of Chromium is broken into 'pro‐
92 files', groupings of security settings that correlate to a known pol‐
93 icy. Available profiles are:
94
95
96
97 Upstream STIG for Google Chromium
98
99 Profile ID: xccdf_org.ssgproject.content_profile_stig
100
101 This profile is developed under the DoD consensus model and DISA
102 FSO Vendor STIG process, serving as the upstream development en‐
103 vironment for the Google Chromium STIG.
104
105 As a result of the upstream/downstream relationship between the
106 SCAP Security Guide project and the official DISA FSO STIG base‐
107 line, users should expect variance between SSG and DISA FSO con‐
108 tent. For official DISA FSO STIG content, refer to https://pub‐
109 lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
110 rity%2Cbrowser-guidance.
111
112 While this profile is packaged by Red Hat as part of the SCAP
113 Security Guide package, please note that commercial support of
114 this SCAP content is NOT available. This profile is provided as
115 example SCAP content with no endorsement for suitability or pro‐
116 duction readiness. Support for this profile is provided by the
117 upstream SCAP Security Guide community on a best-effort basis.
118 The upstream project homepage is https://www.open-scap.org/secu‐
119 rity-policies/scap-security-guide/.
120
121
122
123
124
126 Source Datastream: ssg-debian10-ds.xml
127
128 The Guide to the Secure Configuration of Debian 10 is broken into 'pro‐
129 files', groupings of security settings that correlate to a known pol‐
130 icy. Available profiles are:
131
132
133
134 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
135
136 Profile ID: xccdf_org.ssgproject.content_pro‐
137 file_anssi_np_nt28_average
138
139 This profile contains items for GNU/Linux installations already
140 protected by multiple higher level security stacks.
141
142
143 Profile for ANSSI DAT-NT28 High (Enforced) Level
144
145 Profile ID: xccdf_org.ssgproject.content_pro‐
146 file_anssi_np_nt28_high
147
148 This profile contains items for GNU/Linux installations storing
149 sensitive informations that can be accessible from unauthenti‐
150 cated or uncontroled networks.
151
152
153 Profile for ANSSI DAT-NT28 Minimal Level
154
155 Profile ID: xccdf_org.ssgproject.content_pro‐
156 file_anssi_np_nt28_minimal
157
158 This profile contains items to be applied systematically.
159
160
161 Profile for ANSSI DAT-NT28 Restrictive Level
162
163 Profile ID: xccdf_org.ssgproject.content_pro‐
164 file_anssi_np_nt28_restrictive
165
166 This profile contains items for GNU/Linux installations exposed
167 to unauthenticated flows or multiple sources.
168
169
170 Standard System Security Profile for Debian 10
171
172 Profile ID: xccdf_org.ssgproject.content_profile_standard
173
174 This profile contains rules to ensure standard security baseline
175 of a Debian 10 system. Regardless of your system's workload all
176 of these checks should pass.
177
178
179
180
181
183 Source Datastream: ssg-debian9-ds.xml
184
185 The Guide to the Secure Configuration of Debian 9 is broken into 'pro‐
186 files', groupings of security settings that correlate to a known pol‐
187 icy. Available profiles are:
188
189
190
191 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
192
193 Profile ID: xccdf_org.ssgproject.content_pro‐
194 file_anssi_np_nt28_average
195
196 This profile contains items for GNU/Linux installations already
197 protected by multiple higher level security stacks.
198
199
200 Profile for ANSSI DAT-NT28 High (Enforced) Level
201
202 Profile ID: xccdf_org.ssgproject.content_pro‐
203 file_anssi_np_nt28_high
204
205 This profile contains items for GNU/Linux installations storing
206 sensitive informations that can be accessible from unauthenti‐
207 cated or uncontroled networks.
208
209
210 Profile for ANSSI DAT-NT28 Minimal Level
211
212 Profile ID: xccdf_org.ssgproject.content_pro‐
213 file_anssi_np_nt28_minimal
214
215 This profile contains items to be applied systematically.
216
217
218 Profile for ANSSI DAT-NT28 Restrictive Level
219
220 Profile ID: xccdf_org.ssgproject.content_pro‐
221 file_anssi_np_nt28_restrictive
222
223 This profile contains items for GNU/Linux installations exposed
224 to unauthenticated flows or multiple sources.
225
226
227 Standard System Security Profile for Debian 9
228
229 Profile ID: xccdf_org.ssgproject.content_profile_standard
230
231 This profile contains rules to ensure standard security baseline
232 of a Debian 9 system. Regardless of your system's workload all
233 of these checks should pass.
234
235
236
237
238
240 Source Datastream: ssg-fedora-ds.xml
241
242 The Guide to the Secure Configuration of Fedora is broken into 'pro‐
243 files', groupings of security settings that correlate to a known pol‐
244 icy. Available profiles are:
245
246
247
248 OSPP - Protection Profile for General Purpose Operating Systems
249
250 Profile ID: xccdf_org.ssgproject.content_profile_ospp
251
252 This profile reflects mandatory configuration controls identi‐
253 fied in the NIAP Configuration Annex to the Protection Profile
254 for General Purpose Operating Systems (Protection Profile Ver‐
255 sion 4.2).
256
257 As Fedora OS is moving target, this profile does not guarantee
258 to provide security levels required from US National Security
259 Systems. Main goal of the profile is to provide Fedora develop‐
260 ers with hardened environment similar to the one mandated by US
261 National Security Systems.
262
263
264 PCI-DSS v3.2.1 Control Baseline for Fedora
265
266 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
267
268 Ensures PCI-DSS v3.2.1 related security configuration settings
269 are applied.
270
271
272 Standard System Security Profile for Fedora
273
274 Profile ID: xccdf_org.ssgproject.content_profile_standard
275
276 This profile contains rules to ensure standard security baseline
277 of a Fedora system. Regardless of your system's workload all of
278 these checks should pass.
279
280
281
282
283
285 Source Datastream: ssg-firefox-ds.xml
286
287 The Guide to the Secure Configuration of Firefox is broken into 'pro‐
288 files', groupings of security settings that correlate to a known pol‐
289 icy. Available profiles are:
290
291
292
293 Upstream Firefox STIG
294
295 Profile ID: xccdf_org.ssgproject.content_profile_stig
296
297 This profile is developed under the DoD consensus model and DISA
298 FSO Vendor STIG process, serving as the upstream development en‐
299 vironment for the Firefox STIG.
300
301 As a result of the upstream/downstream relationship between the
302 SCAP Security Guide project and the official DISA FSO STIG base‐
303 line, users should expect variance between SSG and DISA FSO con‐
304 tent. For official DISA FSO STIG content, refer to https://pub‐
305 lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
306 rity%2Cbrowser-guidance.
307
308 While this profile is packaged by Red Hat as part of the SCAP
309 Security Guide package, please note that commercial support of
310 this SCAP content is NOT available. This profile is provided as
311 example SCAP content with no endorsement for suitability or pro‐
312 duction readiness. Support for this profile is provided by the
313 upstream SCAP Security Guide community on a best-effort basis.
314 The upstream project homepage is https://www.open-scap.org/secu‐
315 rity-policies/scap-security-guide/.
316
317
318
319
320
322 Source Datastream: ssg-fuse6-ds.xml
323
324 The Guide to the Secure Configuration of JBoss Fuse 6 is broken into
325 'profiles', groupings of security settings that correlate to a known
326 policy. Available profiles are:
327
328
329
330 STIG for Apache ActiveMQ
331
332 Profile ID: xccdf_org.ssgproject.content_profile_amq-stig
333
334 This is a *draft* profile for STIG. This profile is being devel‐
335 oped under the DoD consensus model to become a STIG in coordina‐
336 tion with DISA FSO.
337
338
339 Standard System Security Profile for JBoss
340
341 Profile ID: xccdf_org.ssgproject.content_profile_standard
342
343 This profile contains rules to ensure standard security baseline
344 of JBoss Fuse. Regardless of your system's workload all of these
345 checks should pass.
346
347
348 STIG for JBoss Fuse 6
349
350 Profile ID: xccdf_org.ssgproject.content_profile_stig
351
352 This is a *draft* profile for STIG. This profile is being devel‐
353 oped under the DoD consensus model to become a STIG in coordina‐
354 tion with DISA FSO.
355
356
357
358
359
361 Source Datastream: ssg-jre-ds.xml
362
363 The Guide to the Secure Configuration of Java Runtime Environment is
364 broken into 'profiles', groupings of security settings that correlate
365 to a known policy. Available profiles are:
366
367
368
369 Java Runtime Environment (JRE) STIG
370
371 Profile ID: xccdf_org.ssgproject.content_profile_stig
372
373 The Java Runtime Environment (JRE) is a bundle developed and of‐
374 fered by Oracle Corporation which includes the Java Virtual Ma‐
375 chine (JVM), class libraries, and other components necessary to
376 run Java applications and applets. Certain default settings
377 within the JRE pose a security risk so it is necessary to deploy
378 system wide properties to ensure a higher degree of security
379 when utilizing the JRE.
380
381 The IBM Corporation also develops and bundles the Java Runtime
382 Environment (JRE) as well as Red Hat with OpenJDK.
383
384
385
386
387
389 Source Datastream: ssg-macos1015-ds.xml
390
391 The Guide to the Secure Configuration of Apple macOS 10.15 is broken
392 into 'profiles', groupings of security settings that correlate to a
393 known policy. Available profiles are:
394
395
396
397 NIST 800-53 Moderate-Impact Baseline for Apple macOS 10.15 Catalina
398
399 Profile ID: xccdf_org.ssgproject.content_profile_moderate
400
401 This compliance profile reflects the core set of Moderate-Impact
402 Baseline configuration settings for deployment of Apple macOS
403 10.15 Catalina into U.S. Defense, Intelligence, and Civilian
404 agencies. Development partners and sponsors include the U.S.
405 National Institute of Standards and Technology (NIST), U.S. De‐
406 partment of Defense, and the the National Security Agency.
407
408 This baseline implements configuration requirements from the
409 following sources:
410
411 - NIST 800-53 control selections for Moderate-Impact systems
412 (NIST 800-53)
413
414 For any differing configuration requirements, e.g. password
415 lengths, the stricter security setting was chosen. Security Re‐
416 quirement Traceability Guides (RTMs) and sample System Security
417 Configuration Guides are provided via the scap-security-guide-
418 docs package.
419
420 This profile reflects U.S. Government consensus content and is
421 developed through the ComplianceAsCode initiative, championed by
422 the National Security Agency. Except for differences in format‐
423 ting to accommodate publishing processes, this profile mirrors
424 ComplianceAsCode content as minor divergences, such as bugfixes,
425 work through the consensus and release processes.
426
427
428
429
430
432 Platform 4
433 Source Datastream: ssg-ocp4-ds.xml
434
435 The Guide to the Secure Configuration of Red Hat OpenShift Container
436 Platform 4 is broken into 'profiles', groupings of security settings
437 that correlate to a known policy. Available profiles are:
438
439
440
441 CIS Red Hat OpenShift Container Platform 4 Benchmark
442
443 Profile ID: xccdf_org.ssgproject.content_profile_cis-node
444
445 This profile defines a baseline that aligns to the Center for
446 Internet Security® Red Hat OpenShift Container Platform 4 Bench‐
447 mark™, V0.3, currently unreleased.
448
449 This profile includes Center for Internet Security® Red Hat
450 OpenShift Container Platform 4 CIS Benchmarks™ content.
451
452 Note that this part of the profile is meant to run on the Oper‐
453 ating System that Red Hat OpenShift Container Platform 4 runs on
454 top of.
455
456 This profile is applicable to OpenShift versions 4.6 and
457 greater.
458
459
460 CIS Red Hat OpenShift Container Platform 4 Benchmark
461
462 Profile ID: xccdf_org.ssgproject.content_profile_cis
463
464 This profile defines a baseline that aligns to the Center for
465 Internet Security® Red Hat OpenShift Container Platform 4 Bench‐
466 mark™, V0.3, currently unreleased.
467
468 This profile includes Center for Internet Security® Red Hat
469 OpenShift Container Platform 4 CIS Benchmarks™ content.
470
471 Note that this part of the profile is meant to run on the Plat‐
472 form that Red Hat OpenShift Container Platform 4 runs on top of.
473
474 This profile is applicable to OpenShift versions 4.6 and
475 greater.
476
477
478 Australian Cyber Security Centre (ACSC) Essential Eight
479
480 Profile ID: xccdf_org.ssgproject.content_profile_e8
481
482 This profile contains configuration checks for Red Hat OpenShift
483 Container Platform that align to the Australian Cyber Security
484 Centre (ACSC) Essential Eight.
485
486 A copy of the Essential Eight in Linux Environments guide can be
487 found at the ACSC website:
488
489 https://www.cyber.gov.au/acsc/view-all-content/publica‐
490 tions/hardening-linux-workstations-and-servers
491
492
493 NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift
494
495 Profile ID: xccdf_org.ssgproject.content_profile_moderate
496
497 This compliance profile reflects the core set of Moderate-Impact
498 Baseline configuration settings for deployment of Red Hat Open‐
499 Shift Container Platform into U.S. Defense, Intelligence, and
500 Civilian agencies. Development partners and sponsors include
501 the U.S. National Institute of Standards and Technology (NIST),
502 U.S. Department of Defense, the National Security Agency, and
503 Red Hat.
504
505 This baseline implements configuration requirements from the
506 following sources:
507
508 - NIST 800-53 control selections for Moderate-Impact systems
509 (NIST 800-53)
510
511 For any differing configuration requirements, e.g. password
512 lengths, the stricter security setting was chosen. Security Re‐
513 quirement Traceability Guides (RTMs) and sample System Security
514 Configuration Guides are provided via the scap-security-guide-
515 docs package.
516
517 This profile reflects U.S. Government consensus content and is
518 developed through the ComplianceAsCode initiative, championed by
519 the National Security Agency. Except for differences in format‐
520 ting to accommodate publishing processes, this profile mirrors
521 ComplianceAsCode content as minor divergences, such as bugfixes,
522 work through the consensus and release processes.
523
524
525 NIST National Checklist for Red Hat OpenShift Container Platform
526
527 Profile ID: xccdf_org.ssgproject.content_profile_ncp
528
529 This compliance profile reflects the core set of security re‐
530 lated configuration settings for deployment of Red Hat OpenShift
531 Container Platform into U.S. Defense, Intelligence, and Civilian
532 agencies. Development partners and sponsors include the U.S.
533 National Institute of Standards and Technology (NIST), U.S. De‐
534 partment of Defense, the National Security Agency, and Red Hat.
535
536 This baseline implements configuration requirements from the
537 following sources:
538
539 - Committee on National Security Systems Instruction No. 1253
540 (CNSSI 1253) - NIST Controlled Unclassified Information (NIST
541 800-171) - NIST 800-53 control selections for Moderate-Impact
542 systems (NIST 800-53) - U.S. Government Configuration Baseline
543 (USGCB) - NIAP Protection Profile for General Purpose Operating
544 Systems v4.2.1 (OSPP v4.2.1) - DISA Operating System Security
545 Requirements Guide (OS SRG)
546
547 For any differing configuration requirements, e.g. password
548 lengths, the stricter security setting was chosen. Security Re‐
549 quirement Traceability Guides (RTMs) and sample System Security
550 Configuration Guides are provided via the scap-security-guide-
551 docs package.
552
553 This profile reflects U.S. Government consensus content and is
554 developed through the ComplianceAsCode initiative, championed by
555 the National Security Agency. Except for differences in format‐
556 ting to accommodate publishing processes, this profile mirrors
557 ComplianceAsCode content as minor divergences, such as bugfixes,
558 work through the consensus and release processes.
559
560
561
562
563
565 Source Datastream: ssg-ol7-ds.xml
566
567 The Guide to the Secure Configuration of Oracle Linux 7 is broken into
568 'profiles', groupings of security settings that correlate to a known
569 policy. Available profiles are:
570
571
572
573 ANSSI-BP-028 (enhanced)
574
575 Profile ID: xccdf_org.ssgproject.content_profile_anssi_nt28_en‐
576 hanced
577
578 This profile contains configurations that align to ANSSI-BP-028
579 at the enhanced hardening level.
580
581 ANSSI is the French National Information Security Agency, and
582 stands for Agence nationale de la sécurité des systèmes d'infor‐
583 mation. ANSSI-BP-028 is a configuration recommendation for
584 GNU/Linux systems.
585
586 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
587 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
588 securite-relatives-a-un-systeme-gnulinux/
589
590
591 DRAFT - ANSSI-BP-028 (high)
592
593 Profile ID: xccdf_org.ssgproject.content_pro‐
594 file_anssi_nt28_high
595
596 This profile contains configurations that align to ANSSI-BP-028
597 at the high hardening level.
598
599 ANSSI is the French National Information Security Agency, and
600 stands for Agence nationale de la sécurité des systèmes d'infor‐
601 mation. ANSSI-BP-028 is a configuration recommendation for
602 GNU/Linux systems.
603
604 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
605 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
606 securite-relatives-a-un-systeme-gnulinux/
607
608
609 ANSSI-BP-028 (intermediary)
610
611 Profile ID: xccdf_org.ssgproject.content_profile_anssi_nt28_in‐
612 termediary
613
614 This profile contains configurations that align to ANSSI-BP-028
615 at the intermediary hardening level.
616
617 ANSSI is the French National Information Security Agency, and
618 stands for Agence nationale de la sécurité des systèmes d'infor‐
619 mation. ANSSI-BP-028 is a configuration recommendation for
620 GNU/Linux systems.
621
622 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
623 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
624 securite-relatives-a-un-systeme-gnulinux/
625
626
627 ANSSI-BP-028 (minimal)
628
629 Profile ID: xccdf_org.ssgproject.content_pro‐
630 file_anssi_nt28_minimal
631
632 This profile contains configurations that align to ANSSI-BP-028
633 at the minimal hardening level.
634
635 ANSSI is the French National Information Security Agency, and
636 stands for Agence nationale de la sécurité des systèmes d'infor‐
637 mation. ANSSI-BP-028 is a configuration recommendation for
638 GNU/Linux systems.
639
640 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
641 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
642 securite-relatives-a-un-systeme-gnulinux/
643
644
645 Criminal Justice Information Services (CJIS) Security Policy
646
647 Profile ID: xccdf_org.ssgproject.content_profile_cjis
648
649 This profile is derived from FBI's CJIS v5.4 Security Policy. A
650 copy of this policy can be found at the CJIS Security Policy Re‐
651 source Center:
652
653 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
654 center
655
656
657 Unclassified Information in Non-federal Information Systems and Organi‐
658 zations (NIST 800-171)
659
660 Profile ID: xccdf_org.ssgproject.content_profile_cui
661
662 From NIST 800-171, Section 2.2: Security requirements for pro‐
663 tecting the confidentiality of CUI in non-federal information
664 systems and organizations have a well-defined structure that
665 consists of:
666
667 (i) a basic security requirements section; (ii) a derived secu‐
668 rity requirements section.
669
670 The basic security requirements are obtained from FIPS Publica‐
671 tion 200, which provides the high-level and fundamental security
672 requirements for federal information and information systems.
673 The derived security requirements, which supplement the basic
674 security requirements, are taken from the security controls in
675 NIST Special Publication 800-53.
676
677 This profile configures Oracle Linux 7 to the NIST Special Pub‐
678 lication 800-53 controls identified for securing Controlled Un‐
679 classified Information (CUI).
680
681
682 [DRAFT] Australian Cyber Security Centre (ACSC) Essential Eight
683
684 Profile ID: xccdf_org.ssgproject.content_profile_e8
685
686 This profile contains configuration checks for Oracle Linux 7
687 that align to the Australian Cyber Security Centre (ACSC) Essen‐
688 tial Eight.
689
690 A copy of the Essential Eight in Linux Environments guide can be
691 found at the ACSC website:
692
693 https://www.cyber.gov.au/acsc/view-all-content/publica‐
694 tions/hardening-linux-workstations-and-servers
695
696
697 Health Insurance Portability and Accountability Act (HIPAA)
698
699 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
700
701 The HIPAA Security Rule establishes U.S. national standards to
702 protect individuals’ electronic personal health information that
703 is created, received, used, or maintained by a covered entity.
704 The Security Rule requires appropriate administrative, physical
705 and technical safeguards to ensure the confidentiality, integ‐
706 rity, and security of electronic protected health information.
707
708 This profile configures Oracle Linux 7 to the HIPAA Security
709 Rule identified for securing of electronic protected health in‐
710 formation. Use of this profile in no way guarantees or makes
711 claims against legal compliance against the HIPAA Security
712 Rule(s).
713
714
715 [DRAFT] Protection Profile for General Purpose Operating Systems
716
717 Profile ID: xccdf_org.ssgproject.content_profile_ospp
718
719 This profile reflects mandatory configuration controls identi‐
720 fied in the NIAP Configuration Annex to the Protection Profile
721 for General Purpose Operating Systems (Protection Profile Ver‐
722 sion 4.2.1).
723
724 This configuration profile is consistent with CNSSI-1253, which
725 requires U.S. National Security Systems to adhere to certain
726 configuration parameters. Accordingly, this configuration pro‐
727 file is suitable for use in U.S. National Security Systems.
728
729
730 PCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 7
731
732 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
733
734 Ensures PCI-DSS v3.2.1 related security configuration settings
735 are applied.
736
737
738 Security Profile of Oracle Linux 7 for SAP
739
740 Profile ID: xccdf_org.ssgproject.content_profile_sap
741
742 This profile contains rules for Oracle Linux 7 Operating System
743 in compliance with SAP note 2069760 and SAP Security Baseline
744 Template version 1.9 Item I-8 and section 4.1.2.2. Regardless
745 of your system's workload all of these checks should pass.
746
747
748 Standard System Security Profile for Oracle Linux 7
749
750 Profile ID: xccdf_org.ssgproject.content_profile_standard
751
752 This profile contains rules to ensure standard security baseline
753 of Oracle Linux 7 system. Regardless of your system's workload
754 all of these checks should pass.
755
756
757 DISA STIG for Oracle Linux 7
758
759 Profile ID: xccdf_org.ssgproject.content_profile_stig
760
761 This profile contains configuration checks that align to the
762 DISA STIG for Oracle Linux V2R2.
763
764
765
766
767
769 Source Datastream: ssg-ol8-ds.xml
770
771 The Guide to the Secure Configuration of Oracle Linux 8 is broken into
772 'profiles', groupings of security settings that correlate to a known
773 policy. Available profiles are:
774
775
776
777 ANSSI-BP-028 (enhanced)
778
779 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
780 hanced
781
782 This profile contains configurations that align to ANSSI-BP-028
783 at the enhanced hardening level.
784
785 ANSSI is the French National Information Security Agency, and
786 stands for Agence nationale de la sécurité des systèmes d'infor‐
787 mation. ANSSI-BP-028 is a configuration recommendation for
788 GNU/Linux systems.
789
790 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
791 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
792 securite-relatives-a-un-systeme-gnulinux/
793
794
795 DRAFT - ANSSI-BP-028 (high)
796
797 Profile ID: xccdf_org.ssgproject.content_pro‐
798 file_anssi_bp28_high
799
800 This profile contains configurations that align to ANSSI-BP-028
801 at the high hardening level.
802
803 ANSSI is the French National Information Security Agency, and
804 stands for Agence nationale de la sécurité des systèmes d'infor‐
805 mation. ANSSI-BP-028 is a configuration recommendation for
806 GNU/Linux systems.
807
808 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
809 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
810 securite-relatives-a-un-systeme-gnulinux/
811
812
813 ANSSI-BP-028 (intermediary)
814
815 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
816 termediary
817
818 This profile contains configurations that align to ANSSI-BP-028
819 at the intermediary hardening level.
820
821 ANSSI is the French National Information Security Agency, and
822 stands for Agence nationale de la sécurité des systèmes d'infor‐
823 mation. ANSSI-BP-028 is a configuration recommendation for
824 GNU/Linux systems.
825
826 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
827 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
828 securite-relatives-a-un-systeme-gnulinux/
829
830
831 ANSSI-BP-028 (minimal)
832
833 Profile ID: xccdf_org.ssgproject.content_pro‐
834 file_anssi_bp28_minimal
835
836 This profile contains configurations that align to ANSSI-BP-028
837 at the minimal hardening level.
838
839 ANSSI is the French National Information Security Agency, and
840 stands for Agence nationale de la sécurité des systèmes d'infor‐
841 mation. ANSSI-BP-028 is a configuration recommendation for
842 GNU/Linux systems.
843
844 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
845 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
846 securite-relatives-a-un-systeme-gnulinux/
847
848
849 Criminal Justice Information Services (CJIS) Security Policy
850
851 Profile ID: xccdf_org.ssgproject.content_profile_cjis
852
853 This profile is derived from FBI's CJIS v5.4 Security Policy. A
854 copy of this policy can be found at the CJIS Security Policy Re‐
855 source Center:
856
857 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
858 center
859
860
861 Unclassified Information in Non-federal Information Systems and Organi‐
862 zations (NIST 800-171)
863
864 Profile ID: xccdf_org.ssgproject.content_profile_cui
865
866 From NIST 800-171, Section 2.2: Security requirements for pro‐
867 tecting the confidentiality of CUI in non-federal information
868 systems and organizations have a well-defined structure that
869 consists of:
870
871 (i) a basic security requirements section; (ii) a derived secu‐
872 rity requirements section.
873
874 The basic security requirements are obtained from FIPS Publica‐
875 tion 200, which provides the high-level and fundamental security
876 requirements for federal information and information systems.
877 The derived security requirements, which supplement the basic
878 security requirements, are taken from the security controls in
879 NIST Special Publication 800-53.
880
881 This profile configures Oracle Linux 8 to the NIST Special Pub‐
882 lication 800-53 controls identified for securing Controlled Un‐
883 classified Information (CUI).
884
885
886 [DRAFT] Australian Cyber Security Centre (ACSC) Essential Eight
887
888 Profile ID: xccdf_org.ssgproject.content_profile_e8
889
890 This profile contains configuration checks for Oracle Linux 8
891 that align to the Australian Cyber Security Centre (ACSC) Essen‐
892 tial Eight.
893
894 A copy of the Essential Eight in Linux Environments guide can be
895 found at the ACSC website:
896
897 https://www.cyber.gov.au/acsc/view-all-content/publica‐
898 tions/hardening-linux-workstations-and-servers
899
900
901 Health Insurance Portability and Accountability Act (HIPAA)
902
903 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
904
905 The HIPAA Security Rule establishes U.S. national standards to
906 protect individuals’ electronic personal health information that
907 is created, received, used, or maintained by a covered entity.
908 The Security Rule requires appropriate administrative, physical
909 and technical safeguards to ensure the confidentiality, integ‐
910 rity, and security of electronic protected health information.
911
912 This profile configures Oracle Linux 8 to the HIPAA Security
913 Rule identified for securing of electronic protected health in‐
914 formation. Use of this profile in no way guarantees or makes
915 claims against legal compliance against the HIPAA Security
916 Rule(s).
917
918
919 [DRAFT] Protection Profile for General Purpose Operating Systems
920
921 Profile ID: xccdf_org.ssgproject.content_profile_ospp
922
923 This profile reflects mandatory configuration controls identi‐
924 fied in the NIAP Configuration Annex to the Protection Profile
925 for General Purpose Operating Systems (Protection Profile Ver‐
926 sion 4.2.1).
927
928 This configuration profile is consistent with CNSSI-1253, which
929 requires U.S. National Security Systems to adhere to certain
930 configuration parameters. Accordingly, this configuration pro‐
931 file is suitable for use in U.S. National Security Systems.
932
933
934 PCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 8
935
936 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
937
938 Ensures PCI-DSS v3.2.1 related security configuration settings
939 are applied.
940
941
942 Standard System Security Profile for Oracle Linux 8
943
944 Profile ID: xccdf_org.ssgproject.content_profile_standard
945
946 This profile contains rules to ensure standard security baseline
947 of Oracle Linux 8 system. Regardless of your system's workload
948 all of these checks should pass.
949
950
951
952
953
955 Source Datastream: ssg-opensuse-ds.xml
956
957 The Guide to the Secure Configuration of openSUSE is broken into 'pro‐
958 files', groupings of security settings that correlate to a known pol‐
959 icy. Available profiles are:
960
961
962
963 Standard System Security Profile for openSUSE
964
965 Profile ID: xccdf_org.ssgproject.content_profile_standard
966
967 This profile contains rules to ensure standard security baseline
968 of an openSUSE system. Regardless of your system's workload all
969 of these checks should pass.
970
971
972
973
974
976 CoreOS 4
977 Source Datastream: ssg-rhcos4-ds.xml
978
979 The Guide to the Secure Configuration of Red Hat Enterprise Linux
980 CoreOS 4 is broken into 'profiles', groupings of security settings that
981 correlate to a known policy. Available profiles are:
982
983
984
985 DRAFT - ANSSI-BP-028 (enhanced)
986
987 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
988 hanced
989
990 This profile contains configurations that align to ANSSI-BP-028
991 at the enhanced hardening level.
992
993 ANSSI is the French National Information Security Agency, and
994 stands for Agence nationale de la sécurité des systèmes d'infor‐
995 mation. ANSSI-BP-028 is a configuration recommendation for
996 GNU/Linux systems.
997
998 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
999 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1000 securite-relatives-a-un-systeme-gnulinux/
1001
1002
1003 DRAFT - ANSSI-BP-028 (high)
1004
1005 Profile ID: xccdf_org.ssgproject.content_pro‐
1006 file_anssi_bp28_high
1007
1008 This profile contains configurations that align to ANSSI-BP-028
1009 at the high hardening level.
1010
1011 ANSSI is the French National Information Security Agency, and
1012 stands for Agence nationale de la sécurité des systèmes d'infor‐
1013 mation. ANSSI-BP-028 is a configuration recommendation for
1014 GNU/Linux systems.
1015
1016 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1017 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1018 securite-relatives-a-un-systeme-gnulinux/
1019
1020
1021 DRAFT - ANSSI-BP-028 (intermediary)
1022
1023 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
1024 termediary
1025
1026 This profile contains configurations that align to ANSSI-BP-028
1027 at the intermediary hardening level.
1028
1029 ANSSI is the French National Information Security Agency, and
1030 stands for Agence nationale de la sécurité des systèmes d'infor‐
1031 mation. ANSSI-BP-028 is a configuration recommendation for
1032 GNU/Linux systems.
1033
1034 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1035 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1036 securite-relatives-a-un-systeme-gnulinux/
1037
1038
1039 DRAFT - ANSSI-BP-028 (minimal)
1040
1041 Profile ID: xccdf_org.ssgproject.content_pro‐
1042 file_anssi_bp28_minimal
1043
1044 This profile contains configurations that align to ANSSI-BP-028
1045 at the minimal hardening level.
1046
1047 ANSSI is the French National Information Security Agency, and
1048 stands for Agence nationale de la sécurité des systèmes d'infor‐
1049 mation. ANSSI-BP-028 is a configuration recommendation for
1050 GNU/Linux systems.
1051
1052 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1053 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1054 securite-relatives-a-un-systeme-gnulinux/
1055
1056
1057 Australian Cyber Security Centre (ACSC) Essential Eight
1058
1059 Profile ID: xccdf_org.ssgproject.content_profile_e8
1060
1061 This profile contains configuration checks for Red Hat Enter‐
1062 prise Linux CoreOS that align to the Australian Cyber Security
1063 Centre (ACSC) Essential Eight.
1064
1065 A copy of the Essential Eight in Linux Environments guide can be
1066 found at the ACSC website:
1067
1068 https://www.cyber.gov.au/acsc/view-all-content/publica‐
1069 tions/hardening-linux-workstations-and-servers
1070
1071
1072 NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux
1073 CoreOS
1074
1075 Profile ID: xccdf_org.ssgproject.content_profile_moderate
1076
1077 This compliance profile reflects the core set of Moderate-Impact
1078 Baseline configuration settings for deployment of Red Hat Enter‐
1079 prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
1080 agencies. Development partners and sponsors include the U.S.
1081 National Institute of Standards and Technology (NIST), U.S. De‐
1082 partment of Defense, the National Security Agency, and Red Hat.
1083
1084 This baseline implements configuration requirements from the
1085 following sources:
1086
1087 - NIST 800-53 control selections for Moderate-Impact systems
1088 (NIST 800-53)
1089
1090 For any differing configuration requirements, e.g. password
1091 lengths, the stricter security setting was chosen. Security Re‐
1092 quirement Traceability Guides (RTMs) and sample System Security
1093 Configuration Guides are provided via the scap-security-guide-
1094 docs package.
1095
1096 This profile reflects U.S. Government consensus content and is
1097 developed through the ComplianceAsCode initiative, championed by
1098 the National Security Agency. Except for differences in format‐
1099 ting to accommodate publishing processes, this profile mirrors
1100 ComplianceAsCode content as minor divergences, such as bugfixes,
1101 work through the consensus and release processes.
1102
1103
1104 NIST National Checklist for Red Hat Enterprise Linux CoreOS
1105
1106 Profile ID: xccdf_org.ssgproject.content_profile_ncp
1107
1108 This compliance profile reflects the core set of security re‐
1109 lated configuration settings for deployment of Red Hat Enter‐
1110 prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
1111 agencies. Development partners and sponsors include the U.S.
1112 National Institute of Standards and Technology (NIST), U.S. De‐
1113 partment of Defense, the National Security Agency, and Red Hat.
1114
1115 This baseline implements configuration requirements from the
1116 following sources:
1117
1118 - Committee on National Security Systems Instruction No. 1253
1119 (CNSSI 1253) - NIST Controlled Unclassified Information (NIST
1120 800-171) - NIST 800-53 control selections for Moderate-Impact
1121 systems (NIST 800-53) - U.S. Government Configuration Baseline
1122 (USGCB) - NIAP Protection Profile for General Purpose Operating
1123 Systems v4.2.1 (OSPP v4.2.1) - DISA Operating System Security
1124 Requirements Guide (OS SRG)
1125
1126 For any differing configuration requirements, e.g. password
1127 lengths, the stricter security setting was chosen. Security Re‐
1128 quirement Traceability Guides (RTMs) and sample System Security
1129 Configuration Guides are provided via the scap-security-guide-
1130 docs package.
1131
1132 This profile reflects U.S. Government consensus content and is
1133 developed through the ComplianceAsCode initiative, championed by
1134 the National Security Agency. Except for differences in format‐
1135 ting to accommodate publishing processes, this profile mirrors
1136 ComplianceAsCode content as minor divergences, such as bugfixes,
1137 work through the consensus and release processes.
1138
1139
1140 Protection Profile for General Purpose Operating Systems
1141
1142 Profile ID: xccdf_org.ssgproject.content_profile_ospp
1143
1144 This profile reflects mandatory configuration controls identi‐
1145 fied in the NIAP Configuration Annex to the Protection Profile
1146 for General Purpose Operating Systems (Protection Profile Ver‐
1147 sion 4.2.1).
1148
1149 This configuration profile is consistent with CNSSI-1253, which
1150 requires U.S. National Security Systems to adhere to certain
1151 configuration parameters. Accordingly, this configuration pro‐
1152 file is suitable for use in U.S. National Security Systems.
1153
1154
1155 [DRAFT] DISA STIG for Red Hat Enterprise Linux CoreOS
1156
1157 Profile ID: xccdf_org.ssgproject.content_profile_stig
1158
1159 This profile contains configuration checks that align to the
1160 [DRAFT] DISA STIG for Red Hat Enterprise Linux CoreOS which is
1161 the operating system layer of Red Hat OpenShift Container Plat‐
1162 form.
1163
1164
1165
1166
1167
1169 Source Datastream: ssg-rhel7-ds.xml
1170
1171 The Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
1172 broken into 'profiles', groupings of security settings that correlate
1173 to a known policy. Available profiles are:
1174
1175
1176
1177 C2S for Red Hat Enterprise Linux 7
1178
1179 Profile ID: xccdf_org.ssgproject.content_profile_C2S
1180
1181 This profile demonstrates compliance against the U.S. Government
1182 Commercial Cloud Services (C2S) baseline.
1183
1184 This baseline was inspired by the Center for Internet Security
1185 (CIS) Red Hat Enterprise Linux 7 Benchmark, v2.1.1 - 01-31-2017.
1186
1187 For the SCAP Security Guide project to remain in compliance with
1188 CIS' terms and conditions, specifically Restrictions(8), note
1189 there is no representation or claim that the C2S profile will
1190 ensure a system is in compliance or consistency with the CIS
1191 baseline.
1192
1193
1194 ANSSI-BP-028 (enhanced)
1195
1196 Profile ID: xccdf_org.ssgproject.content_profile_anssi_nt28_en‐
1197 hanced
1198
1199 This profile contains configurations that align to ANSSI-BP-028
1200 at the enhanced hardening level.
1201
1202 ANSSI is the French National Information Security Agency, and
1203 stands for Agence nationale de la sécurité des systèmes d'infor‐
1204 mation. ANSSI-BP-028 is a configuration recommendation for
1205 GNU/Linux systems.
1206
1207 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1208 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1209 securite-relatives-a-un-systeme-gnulinux/
1210
1211
1212 DRAFT - ANSSI-BP-028 (high)
1213
1214 Profile ID: xccdf_org.ssgproject.content_pro‐
1215 file_anssi_nt28_high
1216
1217 This profile contains configurations that align to ANSSI-BP-028
1218 at the high hardening level.
1219
1220 ANSSI is the French National Information Security Agency, and
1221 stands for Agence nationale de la sécurité des systèmes d'infor‐
1222 mation. ANSSI-BP-028 is a configuration recommendation for
1223 GNU/Linux systems.
1224
1225 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1226 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1227 securite-relatives-a-un-systeme-gnulinux/
1228
1229
1230 ANSSI-BP-028 (intermediary)
1231
1232 Profile ID: xccdf_org.ssgproject.content_profile_anssi_nt28_in‐
1233 termediary
1234
1235 This profile contains configurations that align to ANSSI-BP-028
1236 at the intermediary hardening level.
1237
1238 ANSSI is the French National Information Security Agency, and
1239 stands for Agence nationale de la sécurité des systèmes d'infor‐
1240 mation. ANSSI-BP-028 is a configuration recommendation for
1241 GNU/Linux systems.
1242
1243 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1244 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1245 securite-relatives-a-un-systeme-gnulinux/
1246
1247
1248 ANSSI-BP-028 (minimal)
1249
1250 Profile ID: xccdf_org.ssgproject.content_pro‐
1251 file_anssi_nt28_minimal
1252
1253 This profile contains configurations that align to ANSSI-BP-028
1254 at the minimal hardening level.
1255
1256 ANSSI is the French National Information Security Agency, and
1257 stands for Agence nationale de la sécurité des systèmes d'infor‐
1258 mation. ANSSI-BP-028 is a configuration recommendation for
1259 GNU/Linux systems.
1260
1261 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1262 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1263 securite-relatives-a-un-systeme-gnulinux/
1264
1265
1266 CIS Red Hat Enterprise Linux 7 Benchmark
1267
1268 Profile ID: xccdf_org.ssgproject.content_profile_cis
1269
1270 This profile defines a baseline that aligns to the Center for
1271 Internet Security® Red Hat Enterprise Linux 7 Benchmark™,
1272 v2.2.0, released 12-27-2017.
1273
1274 This profile includes Center for Internet Security® Red Hat En‐
1275 terprise Linux 7 CIS Benchmarks™ content.
1276
1277
1278 Criminal Justice Information Services (CJIS) Security Policy
1279
1280 Profile ID: xccdf_org.ssgproject.content_profile_cjis
1281
1282 This profile is derived from FBI's CJIS v5.4 Security Policy. A
1283 copy of this policy can be found at the CJIS Security Policy Re‐
1284 source Center:
1285
1286 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
1287 center
1288
1289
1290 Unclassified Information in Non-federal Information Systems and Organi‐
1291 zations (NIST 800-171)
1292
1293 Profile ID: xccdf_org.ssgproject.content_profile_cui
1294
1295 From NIST 800-171, Section 2.2: Security requirements for pro‐
1296 tecting the confidentiality of CUI in non-federal information
1297 systems and organizations have a well-defined structure that
1298 consists of:
1299
1300 (i) a basic security requirements section; (ii) a derived secu‐
1301 rity requirements section.
1302
1303 The basic security requirements are obtained from FIPS Publica‐
1304 tion 200, which provides the high-level and fundamental security
1305 requirements for federal information and information systems.
1306 The derived security requirements, which supplement the basic
1307 security requirements, are taken from the security controls in
1308 NIST Special Publication 800-53.
1309
1310 This profile configures Red Hat Enterprise Linux 7 to the NIST
1311 Special Publication 800-53 controls identified for securing Con‐
1312 trolled Unclassified Information (CUI).
1313
1314
1315 Australian Cyber Security Centre (ACSC) Essential Eight
1316
1317 Profile ID: xccdf_org.ssgproject.content_profile_e8
1318
1319 This profile contains configuration checks for Red Hat Enter‐
1320 prise Linux 7 that align to the Australian Cyber Security Centre
1321 (ACSC) Essential Eight.
1322
1323 A copy of the Essential Eight in Linux Environments guide can be
1324 found at the ACSC website:
1325
1326 https://www.cyber.gov.au/acsc/view-all-content/publica‐
1327 tions/hardening-linux-workstations-and-servers
1328
1329
1330 Health Insurance Portability and Accountability Act (HIPAA)
1331
1332 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
1333
1334 The HIPAA Security Rule establishes U.S. national standards to
1335 protect individuals’ electronic personal health information that
1336 is created, received, used, or maintained by a covered entity.
1337 The Security Rule requires appropriate administrative, physical
1338 and technical safeguards to ensure the confidentiality, integ‐
1339 rity, and security of electronic protected health information.
1340
1341 This profile configures Red Hat Enterprise Linux 7 to the HIPAA
1342 Security Rule identified for securing of electronic protected
1343 health information. Use of this profile in no way guarantees or
1344 makes claims against legal compliance against the HIPAA Security
1345 Rule(s).
1346
1347
1348 NIST National Checklist Program Security Guide
1349
1350 Profile ID: xccdf_org.ssgproject.content_profile_ncp
1351
1352 This compliance profile reflects the core set of security re‐
1353 lated configuration settings for deployment of Red Hat Enter‐
1354 prise Linux 7.x into U.S. Defense, Intelligence, and Civilian
1355 agencies. Development partners and sponsors include the U.S.
1356 National Institute of Standards and Technology (NIST), U.S. De‐
1357 partment of Defense, the National Security Agency, and Red Hat.
1358
1359 This baseline implements configuration requirements from the
1360 following sources:
1361
1362 - Committee on National Security Systems Instruction No. 1253
1363 (CNSSI 1253) - NIST Controlled Unclassified Information (NIST
1364 800-171) - NIST 800-53 control selections for MODERATE impact
1365 systems (NIST 800-53) - U.S. Government Configuration Baseline
1366 (USGCB) - NIAP Protection Profile for General Purpose Operating
1367 Systems v4.2.1 (OSPP v4.2.1) - DISA Operating System Security
1368 Requirements Guide (OS SRG)
1369
1370 For any differing configuration requirements, e.g. password
1371 lengths, the stricter security setting was chosen. Security Re‐
1372 quirement Traceability Guides (RTMs) and sample System Security
1373 Configuration Guides are provided via the scap-security-guide-
1374 docs package.
1375
1376 This profile reflects U.S. Government consensus content and is
1377 developed through the OpenSCAP/SCAP Security Guide initiative,
1378 championed by the National Security Agency. Except for differ‐
1379 ences in formatting to accommodate publishing processes, this
1380 profile mirrors OpenSCAP/SCAP Security Guide content as minor
1381 divergences, such as bugfixes, work through the consensus and
1382 release processes.
1383
1384
1385 OSPP - Protection Profile for General Purpose Operating Systems v4.2.1
1386
1387 Profile ID: xccdf_org.ssgproject.content_profile_ospp
1388
1389 This profile reflects mandatory configuration controls identi‐
1390 fied in the NIAP Configuration Annex to the Protection Profile
1391 for General Purpose Operating Systems (Protection Profile Ver‐
1392 sion 4.2.1).
1393
1394 This configuration profile is consistent with CNSSI-1253, which
1395 requires U.S. National Security Systems to adhere to certain
1396 configuration parameters. Accordingly, this configuration pro‐
1397 file is suitable for use in U.S. National Security Systems.
1398
1399
1400 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
1401
1402 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1403
1404 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
1405 plied.
1406
1407
1408 [DRAFT] DISA STIG for Red Hat Enterprise Linux Virtualization Host
1409 (RHELH)
1410
1411 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-stig
1412
1413 This *draft* profile contains configuration checks that align to
1414 the DISA STIG for Red Hat Enterprise Linux Virtualization Host
1415 (RHELH).
1416
1417
1418 VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Enter‐
1419 prise Linux Hypervisor (RHELH)
1420
1421 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-vpp
1422
1423 This compliance profile reflects the core set of security re‐
1424 lated configuration settings for deployment of Red Hat Enter‐
1425 prise Linux Hypervisor (RHELH) 7.x into U.S. Defense, Intelli‐
1426 gence, and Civilian agencies. Development partners and sponsors
1427 include the U.S. National Institute of Standards and Technology
1428 (NIST), U.S. Department of Defense, the National Security
1429 Agency, and Red Hat.
1430
1431 This baseline implements configuration requirements from the
1432 following sources:
1433
1434 - Committee on National Security Systems Instruction No. 1253
1435 (CNSSI 1253) - NIST 800-53 control selections for MODERATE im‐
1436 pact systems (NIST 800-53) - U.S. Government Configuration Base‐
1437 line (USGCB) - NIAP Protection Profile for Virtualization v1.0
1438 (VPP v1.0)
1439
1440 For any differing configuration requirements, e.g. password
1441 lengths, the stricter security setting was chosen. Security Re‐
1442 quirement Traceability Guides (RTMs) and sample System Security
1443 Configuration Guides are provided via the scap-security-guide-
1444 docs package.
1445
1446 This profile reflects U.S. Government consensus content and is
1447 developed through the ComplianceAsCode project, championed by
1448 the National Security Agency. Except for differences in format‐
1449 ting to accommodate publishing processes, this profile mirrors
1450 ComplianceAsCode content as minor divergences, such as bugfixes,
1451 work through the consensus and release processes.
1452
1453
1454 Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
1455
1456 Profile ID: xccdf_org.ssgproject.content_profile_rht-ccp
1457
1458 This profile contains the minimum security relevant configura‐
1459 tion settings recommended by Red Hat, Inc for Red Hat Enterprise
1460 Linux 7 instances deployed by Red Hat Certified Cloud Providers.
1461
1462
1463 Standard System Security Profile for Red Hat Enterprise Linux 7
1464
1465 Profile ID: xccdf_org.ssgproject.content_profile_standard
1466
1467 This profile contains rules to ensure standard security baseline
1468 of a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
1469 tem's workload all of these checks should pass.
1470
1471
1472 DISA STIG for Red Hat Enterprise Linux 7
1473
1474 Profile ID: xccdf_org.ssgproject.content_profile_stig
1475
1476 This profile contains configuration checks that align to the
1477 DISA STIG for Red Hat Enterprise Linux V3R3.
1478
1479 In addition to being applicable to Red Hat Enterprise Linux 7,
1480 DISA recognizes this configuration baseline as applicable to the
1481 operating system tier of Red Hat technologies that are based on
1482 Red Hat Enterprise Linux 7, such as:
1483
1484 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
1485 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1486 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1487 7 image
1488
1489
1490 DISA STIG with GUI for Red Hat Enterprise Linux 7
1491
1492 Profile ID: xccdf_org.ssgproject.content_profile_stig_gui
1493
1494 This profile contains configuration checks that align to the
1495 DISA STIG with GUI for Red Hat Enterprise Linux V3R3.
1496
1497 In addition to being applicable to Red Hat Enterprise Linux 7,
1498 DISA recognizes this configuration baseline as applicable to the
1499 operating system tier of Red Hat technologies that are based on
1500 Red Hat Enterprise Linux 7, such as:
1501
1502 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
1503 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1504 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1505 7 image
1506
1507 Warning: The installation and use of a Graphical User Interface
1508 (GUI) increases your attack vector and decreases your overall
1509 security posture. If your Information Systems Security Officer
1510 (ISSO) lacks a documented operational requirement for a graphi‐
1511 cal user interface, please consider using the standard DISA STIG
1512 for Red Hat Enterprise Linux 7 profile.
1513
1514
1515
1516
1517
1519 Source Datastream: ssg-rhel8-ds.xml
1520
1521 The Guide to the Secure Configuration of Red Hat Enterprise Linux 8 is
1522 broken into 'profiles', groupings of security settings that correlate
1523 to a known policy. Available profiles are:
1524
1525
1526
1527 ANSSI-BP-028 (enhanced)
1528
1529 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
1530 hanced
1531
1532 This profile contains configurations that align to ANSSI-BP-028
1533 at the enhanced hardening level.
1534
1535 ANSSI is the French National Information Security Agency, and
1536 stands for Agence nationale de la sécurité des systèmes d'infor‐
1537 mation. ANSSI-BP-028 is a configuration recommendation for
1538 GNU/Linux systems.
1539
1540 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1541 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1542 securite-relatives-a-un-systeme-gnulinux/
1543
1544
1545 DRAFT - ANSSI-BP-028 (high)
1546
1547 Profile ID: xccdf_org.ssgproject.content_pro‐
1548 file_anssi_bp28_high
1549
1550 This profile contains configurations that align to ANSSI-BP-028
1551 at the high hardening level.
1552
1553 ANSSI is the French National Information Security Agency, and
1554 stands for Agence nationale de la sécurité des systèmes d'infor‐
1555 mation. ANSSI-BP-028 is a configuration recommendation for
1556 GNU/Linux systems.
1557
1558 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1559 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1560 securite-relatives-a-un-systeme-gnulinux/
1561
1562
1563 ANSSI-BP-028 (intermediary)
1564
1565 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
1566 termediary
1567
1568 This profile contains configurations that align to ANSSI-BP-028
1569 at the intermediary hardening level.
1570
1571 ANSSI is the French National Information Security Agency, and
1572 stands for Agence nationale de la sécurité des systèmes d'infor‐
1573 mation. ANSSI-BP-028 is a configuration recommendation for
1574 GNU/Linux systems.
1575
1576 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1577 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1578 securite-relatives-a-un-systeme-gnulinux/
1579
1580
1581 ANSSI-BP-028 (minimal)
1582
1583 Profile ID: xccdf_org.ssgproject.content_pro‐
1584 file_anssi_bp28_minimal
1585
1586 This profile contains configurations that align to ANSSI-BP-028
1587 at the minimal hardening level.
1588
1589 ANSSI is the French National Information Security Agency, and
1590 stands for Agence nationale de la sécurité des systèmes d'infor‐
1591 mation. ANSSI-BP-028 is a configuration recommendation for
1592 GNU/Linux systems.
1593
1594 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1595 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1596 securite-relatives-a-un-systeme-gnulinux/
1597
1598
1599 CIS Red Hat Enterprise Linux 8 Benchmark
1600
1601 Profile ID: xccdf_org.ssgproject.content_profile_cis
1602
1603 This profile defines a baseline that aligns to the Center for
1604 Internet Security® Red Hat Enterprise Linux 8 Benchmark™,
1605 v1.0.0, released 09-30-2019.
1606
1607 This profile includes Center for Internet Security® Red Hat En‐
1608 terprise Linux 8 CIS Benchmarks™ content.
1609
1610
1611 Criminal Justice Information Services (CJIS) Security Policy
1612
1613 Profile ID: xccdf_org.ssgproject.content_profile_cjis
1614
1615 This profile is derived from FBI's CJIS v5.4 Security Policy. A
1616 copy of this policy can be found at the CJIS Security Policy Re‐
1617 source Center:
1618
1619 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
1620 center
1621
1622
1623 Unclassified Information in Non-federal Information Systems and Organi‐
1624 zations (NIST 800-171)
1625
1626 Profile ID: xccdf_org.ssgproject.content_profile_cui
1627
1628 From NIST 800-171, Section 2.2: Security requirements for pro‐
1629 tecting the confidentiality of CUI in nonfederal information
1630 systems and organizations have a well-defined structure that
1631 consists of:
1632
1633 (i) a basic security requirements section; (ii) a derived secu‐
1634 rity requirements section.
1635
1636 The basic security requirements are obtained from FIPS Publica‐
1637 tion 200, which provides the high-level and fundamental security
1638 requirements for federal information and information systems.
1639 The derived security requirements, which supplement the basic
1640 security requirements, are taken from the security controls in
1641 NIST Special Publication 800-53.
1642
1643 This profile configures Red Hat Enterprise Linux 8 to the NIST
1644 Special Publication 800-53 controls identified for securing Con‐
1645 trolled Unclassified Information (CUI)."
1646
1647
1648 Australian Cyber Security Centre (ACSC) Essential Eight
1649
1650 Profile ID: xccdf_org.ssgproject.content_profile_e8
1651
1652 This profile contains configuration checks for Red Hat Enter‐
1653 prise Linux 8 that align to the Australian Cyber Security Centre
1654 (ACSC) Essential Eight.
1655
1656 A copy of the Essential Eight in Linux Environments guide can be
1657 found at the ACSC website:
1658
1659 https://www.cyber.gov.au/acsc/view-all-content/publica‐
1660 tions/hardening-linux-workstations-and-servers
1661
1662
1663 Health Insurance Portability and Accountability Act (HIPAA)
1664
1665 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
1666
1667 The HIPAA Security Rule establishes U.S. national standards to
1668 protect individuals’ electronic personal health information that
1669 is created, received, used, or maintained by a covered entity.
1670 The Security Rule requires appropriate administrative, physical
1671 and technical safeguards to ensure the confidentiality, integ‐
1672 rity, and security of electronic protected health information.
1673
1674 This profile configures Red Hat Enterprise Linux 8 to the HIPAA
1675 Security Rule identified for securing of electronic protected
1676 health information. Use of this profile in no way guarantees or
1677 makes claims against legal compliance against the HIPAA Security
1678 Rule(s).
1679
1680
1681 Australian Cyber Security Centre (ACSC) ISM Official
1682
1683 Profile ID: xccdf_org.ssgproject.content_profile_ism_o
1684
1685 This profile contains configuration checks for Red Hat Enter‐
1686 prise Linux 8 that align to the Australian Cyber Security Centre
1687 (ACSC) Information Security Manual (ISM) with the applicability
1688 marking of OFFICIAL.
1689
1690 The ISM uses a risk-based approach to cyber security. This pro‐
1691 file provides a guide to aligning Red Hat Enterprise Linux secu‐
1692 rity controls with the ISM, which can be used to select controls
1693 specific to an organisation's security posture and risk profile.
1694
1695 A copy of the ISM can be found at the ACSC website:
1696
1697 https://www.cyber.gov.au/ism
1698
1699
1700 Protection Profile for General Purpose Operating Systems
1701
1702 Profile ID: xccdf_org.ssgproject.content_profile_ospp
1703
1704 This profile reflects mandatory configuration controls identi‐
1705 fied in the NIAP Configuration Annex to the Protection Profile
1706 for General Purpose Operating Systems (Protection Profile Ver‐
1707 sion 4.2.1).
1708
1709 This configuration profile is consistent with CNSSI-1253, which
1710 requires U.S. National Security Systems to adhere to certain
1711 configuration parameters. Accordingly, this configuration pro‐
1712 file is suitable for use in U.S. National Security Systems.
1713
1714
1715 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
1716
1717 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1718
1719 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
1720 plied.
1721
1722
1723 [DRAFT] DISA STIG for Red Hat Enterprise Linux Virtualization Host
1724 (RHELH)
1725
1726 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-stig
1727
1728 This *draft* profile contains configuration checks that align to
1729 the DISA STIG for Red Hat Enterprise Linux Virtualization Host
1730 (RHELH).
1731
1732
1733 VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Enter‐
1734 prise Linux Hypervisor (RHELH)
1735
1736 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-vpp
1737
1738 This compliance profile reflects the core set of security re‐
1739 lated configuration settings for deployment of Red Hat Enter‐
1740 prise Linux Hypervisor (RHELH) 7.x into U.S. Defense, Intelli‐
1741 gence, and Civilian agencies. Development partners and sponsors
1742 include the U.S. National Institute of Standards and Technology
1743 (NIST), U.S. Department of Defense, the National Security
1744 Agency, and Red Hat.
1745
1746 This baseline implements configuration requirements from the
1747 following sources:
1748
1749 - Committee on National Security Systems Instruction No. 1253
1750 (CNSSI 1253) - NIST 800-53 control selections for MODERATE im‐
1751 pact systems (NIST 800-53) - U.S. Government Configuration Base‐
1752 line (USGCB) - NIAP Protection Profile for Virtualization v1.0
1753 (VPP v1.0)
1754
1755 For any differing configuration requirements, e.g. password
1756 lengths, the stricter security setting was chosen. Security Re‐
1757 quirement Traceability Guides (RTMs) and sample System Security
1758 Configuration Guides are provided via the scap-security-guide-
1759 docs package.
1760
1761 This profile reflects U.S. Government consensus content and is
1762 developed through the ComplianceAsCode project, championed by
1763 the National Security Agency. Except for differences in format‐
1764 ting to accommodate publishing processes, this profile mirrors
1765 ComplianceAsCode content as minor divergences, such as bugfixes,
1766 work through the consensus and release processes.
1767
1768
1769 Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
1770
1771 Profile ID: xccdf_org.ssgproject.content_profile_rht-ccp
1772
1773 This profile contains the minimum security relevant configura‐
1774 tion settings recommended by Red Hat, Inc for Red Hat Enterprise
1775 Linux 8 instances deployed by Red Hat Certified Cloud Providers.
1776
1777
1778 Standard System Security Profile for Red Hat Enterprise Linux 8
1779
1780 Profile ID: xccdf_org.ssgproject.content_profile_standard
1781
1782 This profile contains rules to ensure standard security baseline
1783 of a Red Hat Enterprise Linux 8 system. Regardless of your sys‐
1784 tem's workload all of these checks should pass.
1785
1786
1787 DISA STIG for Red Hat Enterprise Linux 8
1788
1789 Profile ID: xccdf_org.ssgproject.content_profile_stig
1790
1791 This profile contains configuration checks that align to the
1792 DISA STIG for Red Hat Enterprise Linux 8 V1R2.
1793
1794 In addition to being applicable to Red Hat Enterprise Linux 8,
1795 DISA recognizes this configuration baseline as applicable to the
1796 operating system tier of Red Hat technologies that are based on
1797 Red Hat Enterprise Linux 8, such as:
1798
1799 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
1800 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1801 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1802 8 image
1803
1804
1805 DISA STIG with GUI for Red Hat Enterprise Linux 8
1806
1807 Profile ID: xccdf_org.ssgproject.content_profile_stig_gui
1808
1809 This profile contains configuration checks that align to the
1810 DISA STIG with GUI for Red Hat Enterprise Linux 8 V1R2.
1811
1812 In addition to being applicable to Red Hat Enterprise Linux 8,
1813 DISA recognizes this configuration baseline as applicable to the
1814 operating system tier of Red Hat technologies that are based on
1815 Red Hat Enterprise Linux 8, such as:
1816
1817 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
1818 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1819 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1820 8 image
1821
1822 Warning: The installation and use of a Graphical User Interface
1823 (GUI) increases your attack vector and decreases your overall
1824 security posture. If your Information Systems Security Officer
1825 (ISSO) lacks a documented operational requirement for a graphi‐
1826 cal user interface, please consider using the standard DISA STIG
1827 for Red Hat Enterprise Linux 8 profile.
1828
1829
1830
1831
1832
1834 Source Datastream: ssg-rhel9-ds.xml
1835
1836 The Guide to the Secure Configuration of Red Hat Enterprise Linux 9 is
1837 broken into 'profiles', groupings of security settings that correlate
1838 to a known policy. Available profiles are:
1839
1840
1841
1842 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 9
1843
1844 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1845
1846 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
1847 plied.
1848
1849
1850
1851
1852
1854
1855 Source Datastream: ssg-rhosp10-ds.xml
1856
1857 The Guide to the Secure Configuration of Red Hat OpenStack Platform 10
1858 is broken into 'profiles', groupings of security settings that corre‐
1859 late to a known policy. Available profiles are:
1860
1861
1862
1863 [DRAFT] Controlled Unclassified Infomration (CUI) Profile for Red Hat
1864 OpenStack Plaform 10
1865
1866 Profile ID: xccdf_org.ssgproject.content_profile_cui
1867
1868 These are the controls for scanning against CUI for rhosp10
1869
1870
1871 [DRAFT] STIG for Red Hat OpenStack Plaform 10
1872
1873 Profile ID: xccdf_org.ssgproject.content_profile_stig
1874
1875 Controls for scanning against classified STIG for rhosp10
1876
1877
1878
1879
1880
1882
1883 Source Datastream: ssg-rhosp13-ds.xml
1884
1885 The Guide to the Secure Configuration of Red Hat OpenStack Platform 13
1886 is broken into 'profiles', groupings of security settings that corre‐
1887 late to a known policy. Available profiles are:
1888
1889
1890
1891 RHOSP STIG
1892
1893 Profile ID: xccdf_org.ssgproject.content_profile_stig
1894
1895 Sample profile description.
1896
1897
1898
1899
1900
1902 Source Datastream: ssg-rhv4-ds.xml
1903
1904 The Guide to the Secure Configuration of Red Hat Virtualization 4 is
1905 broken into 'profiles', groupings of security settings that correlate
1906 to a known policy. Available profiles are:
1907
1908
1909
1910 PCI-DSS v3.2.1 Control Baseline for Red Hat Virtualization Host (RHVH)
1911
1912 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1913
1914 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
1915 plied.
1916
1917
1918 [DRAFT] DISA STIG for Red Hat Virtualization Host (RHVH)
1919
1920 Profile ID: xccdf_org.ssgproject.content_profile_rhvh-stig
1921
1922 This *draft* profile contains configuration checks that align to
1923 the DISA STIG for Red Hat Virtualization Host (RHVH).
1924
1925
1926 VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Virtual‐
1927 ization Host (RHVH)
1928
1929 Profile ID: xccdf_org.ssgproject.content_profile_rhvh-vpp
1930
1931 This compliance profile reflects the core set of security re‐
1932 lated configuration settings for deployment of Red Hat Virtual‐
1933 ization Host (RHVH) 4.x into U.S. Defense, Intelligence, and
1934 Civilian agencies. Development partners and sponsors include
1935 the U.S. National Institute of Standards and Technology (NIST),
1936 U.S. Department of Defense, the National Security Agency, and
1937 Red Hat.
1938
1939 This baseline implements configuration requirements from the
1940 following sources:
1941
1942 - Committee on National Security Systems Instruction No. 1253
1943 (CNSSI 1253) - NIST 800-53 control selections for MODERATE im‐
1944 pact systems (NIST 800-53) - U.S. Government Configuration Base‐
1945 line (USGCB) - NIAP Protection Profile for Virtualization v1.0
1946 (VPP v1.0)
1947
1948 For any differing configuration requirements, e.g. password
1949 lengths, the stricter security setting was chosen. Security Re‐
1950 quirement Traceability Guides (RTMs) and sample System Security
1951 Configuration Guides are provided via the scap-security-guide-
1952 docs package.
1953
1954 This profile reflects U.S. Government consensus content and is
1955 developed through the ComplianceAsCode project, championed by
1956 the National Security Agency. Except for differences in format‐
1957 ting to accommodate publishing processes, this profile mirrors
1958 ComplianceAsCode content as minor divergences, such as bugfixes,
1959 work through the consensus and release processes.
1960
1961
1962
1963
1964
1966 Source Datastream: ssg-sl7-ds.xml
1967
1968 The Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
1969 broken into 'profiles', groupings of security settings that correlate
1970 to a known policy. Available profiles are:
1971
1972
1973
1974 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
1975
1976 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1977
1978 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
1979 plied.
1980
1981
1982 Standard System Security Profile for Red Hat Enterprise Linux 7
1983
1984 Profile ID: xccdf_org.ssgproject.content_profile_standard
1985
1986 This profile contains rules to ensure standard security baseline
1987 of a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
1988 tem's workload all of these checks should pass.
1989
1990
1991
1992
1993
1995 Source Datastream: ssg-sle12-ds.xml
1996
1997 The Guide to the Secure Configuration of SUSE Linux Enterprise 12 is
1998 broken into 'profiles', groupings of security settings that correlate
1999 to a known policy. Available profiles are:
2000
2001
2002
2003 Standard System Security Profile for SUSE Linux Enterprise 12
2004
2005 Profile ID: xccdf_org.ssgproject.content_profile_standard
2006
2007 This profile contains rules to ensure standard security baseline
2008 of a SUSE Linux Enterprise 12 system. Regardless of your sys‐
2009 tem's workload all of these checks should pass.
2010
2011
2012 DISA STIG for SUSE Linux Enterprise 12
2013
2014 Profile ID: xccdf_org.ssgproject.content_profile_stig
2015
2016 This profile contains configuration checks that align to the
2017 DISA STIG for SUSE Linux Enterprise 12 V2R3.
2018
2019
2020
2021
2022
2024 Source Datastream: ssg-sle15-ds.xml
2025
2026 The Guide to the Secure Configuration of SUSE Linux Enterprise 15 is
2027 broken into 'profiles', groupings of security settings that correlate
2028 to a known policy. Available profiles are:
2029
2030
2031
2032 CIS SUSE Linux Enterprise 15 Benchmark
2033
2034 Profile ID: xccdf_org.ssgproject.content_profile_cis
2035
2036 This baseline aligns to the Center for Internet Security SUSE
2037 Linux Enterprise 15 Benchmark, v1.0.0, currently in draft.
2038
2039
2040 Standard System Security Profile for SUSE Linux Enterprise 15
2041
2042 Profile ID: xccdf_org.ssgproject.content_profile_standard
2043
2044 This profile contains rules to ensure standard security baseline
2045 of a SUSE Linux Enterprise 15 system based off of the SUSE Hard‐
2046 ening Guide. Regardless of your system's workload all of these
2047 checks should pass.
2048
2049
2050 DISA STIG for SUSE Linux Enterprise 15
2051
2052 Profile ID: xccdf_org.ssgproject.content_profile_stig
2053
2054 This profile contains configuration checks that align to the
2055 DISA STIG for SUSE Linux Enterprise 15 V1R2.
2056
2057
2058
2059
2060
2062 Source Datastream: ssg-ubuntu1604-ds.xml
2063
2064 The Guide to the Secure Configuration of Ubuntu 16.04 is broken into
2065 'profiles', groupings of security settings that correlate to a known
2066 policy. Available profiles are:
2067
2068
2069
2070 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
2071
2072 Profile ID: xccdf_org.ssgproject.content_pro‐
2073 file_anssi_np_nt28_average
2074
2075 This profile contains items for GNU/Linux installations already
2076 protected by multiple higher level security stacks.
2077
2078
2079 Profile for ANSSI DAT-NT28 High (Enforced) Level
2080
2081 Profile ID: xccdf_org.ssgproject.content_pro‐
2082 file_anssi_np_nt28_high
2083
2084 This profile contains items for GNU/Linux installations storing
2085 sensitive informations that can be accessible from unauthenti‐
2086 cated or uncontroled networks.
2087
2088
2089 Profile for ANSSI DAT-NT28 Minimal Level
2090
2091 Profile ID: xccdf_org.ssgproject.content_pro‐
2092 file_anssi_np_nt28_minimal
2093
2094 This profile contains items to be applied systematically.
2095
2096
2097 Profile for ANSSI DAT-NT28 Restrictive Level
2098
2099 Profile ID: xccdf_org.ssgproject.content_pro‐
2100 file_anssi_np_nt28_restrictive
2101
2102 This profile contains items for GNU/Linux installations exposed
2103 to unauthenticated flows or multiple sources.
2104
2105
2106 Standard System Security Profile for Ubuntu 16.04
2107
2108 Profile ID: xccdf_org.ssgproject.content_profile_standard
2109
2110 This profile contains rules to ensure standard security baseline
2111 of an Ubuntu 16.04 system. Regardless of your system's workload
2112 all of these checks should pass.
2113
2114
2115
2116
2117
2119 Source Datastream: ssg-ubuntu1804-ds.xml
2120
2121 The Guide to the Secure Configuration of Ubuntu 18.04 is broken into
2122 'profiles', groupings of security settings that correlate to a known
2123 policy. Available profiles are:
2124
2125
2126
2127 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
2128
2129 Profile ID: xccdf_org.ssgproject.content_pro‐
2130 file_anssi_np_nt28_average
2131
2132 This profile contains items for GNU/Linux installations already
2133 protected by multiple higher level security stacks.
2134
2135
2136 Profile for ANSSI DAT-NT28 High (Enforced) Level
2137
2138 Profile ID: xccdf_org.ssgproject.content_pro‐
2139 file_anssi_np_nt28_high
2140
2141 This profile contains items for GNU/Linux installations storing
2142 sensitive informations that can be accessible from unauthenti‐
2143 cated or uncontroled networks.
2144
2145
2146 Profile for ANSSI DAT-NT28 Minimal Level
2147
2148 Profile ID: xccdf_org.ssgproject.content_pro‐
2149 file_anssi_np_nt28_minimal
2150
2151 This profile contains items to be applied systematically.
2152
2153
2154 Profile for ANSSI DAT-NT28 Restrictive Level
2155
2156 Profile ID: xccdf_org.ssgproject.content_pro‐
2157 file_anssi_np_nt28_restrictive
2158
2159 This profile contains items for GNU/Linux installations exposed
2160 to unauthenticated flows or multiple sources.
2161
2162
2163 CIS Ubuntu 18.04 LTS Benchmark
2164
2165 Profile ID: xccdf_org.ssgproject.content_profile_cis
2166
2167 This baseline aligns to the Center for Internet Security Ubuntu
2168 18.04 LTS Benchmark, v1.0.0, released 08-13-2018.
2169
2170
2171 Standard System Security Profile for Ubuntu 18.04
2172
2173 Profile ID: xccdf_org.ssgproject.content_profile_standard
2174
2175 This profile contains rules to ensure standard security baseline
2176 of an Ubuntu 18.04 system. Regardless of your system's workload
2177 all of these checks should pass.
2178
2179
2180
2181
2182
2184 Source Datastream: ssg-ubuntu2004-ds.xml
2185
2186 The Guide to the Secure Configuration of Ubuntu 20.04 is broken into
2187 'profiles', groupings of security settings that correlate to a known
2188 policy. Available profiles are:
2189
2190
2191
2192 Standard System Security Profile for Ubuntu 20.04
2193
2194 Profile ID: xccdf_org.ssgproject.content_profile_standard
2195
2196 This profile contains rules to ensure standard security baseline
2197 of an Ubuntu 20.04 system. Regardless of your system's workload
2198 all of these checks should pass.
2199
2200
2201
2202
2203
2205 for Linux
2206 Source Datastream: ssg-vsel-ds.xml
2207
2208 The Guide to the Secure Configuration of McAfee VirusScan Enterprise
2209 for Linux is broken into 'profiles', groupings of security settings
2210 that correlate to a known policy. Available profiles are:
2211
2212
2213
2214 McAfee VirusScan Enterprise for Linux (VSEL) STIG
2215
2216 Profile ID: xccdf_org.ssgproject.content_profile_stig
2217
2218 The McAfee VirusScan Enterprise for Linux software provides a
2219 realtime virus scanner for Linux systems.
2220
2221
2222
2223
2224
2226 Source Datastream: ssg-wrlinux1019-ds.xml
2227
2228 The Guide to the Secure Configuration of WRLinux 1019 is broken into
2229 'profiles', groupings of security settings that correlate to a known
2230 policy. Available profiles are:
2231
2232
2233
2234 Basic Profile for Embedded Systems
2235
2236 Profile ID: xccdf_org.ssgproject.content_profile_basic-embedded
2237
2238 This profile contains items common to many embedded Linux in‐
2239 stallations. Regardless of your system's deployment objective,
2240 all of these checks should pass.
2241
2242
2243 DRAFT DISA STIG for Wind River Linux
2244
2245 Profile ID: xccdf_org.ssgproject.content_profile_draft_stig_wr‐
2246 linux_disa
2247
2248 This profile contains configuration checks that align to the
2249 DISA STIG for Wind River Linux. This profile is being developed
2250 under the DoD consensus model to become a STIG in coordination
2251 with DISA FSO. What is the status of the Wind River Linux STIG?
2252 The Wind River Linux STIG is in development under the DoD con‐
2253 sensus model and Wind River has started the process to get ap‐
2254 proval from DISA. However, in the absence of an approved SRG or
2255 STIG, vendor recommendations may be used instead. The current
2256 contents constitute the vendor recommendations at the time of
2257 the product release containing these contents. Note that
2258 changes are expected before approval is granted, and those
2259 changes will be made available in future Wind River Linux Secu‐
2260 rity Profile 1019 RCPL releases. More information, including
2261 the following, is available from the DISA FAQs at https://pub‐
2262 lic.cyber.mil/stigs/faqs/
2263
2264
2265
2266
2267
2269 Source Datastream: ssg-wrlinux8-ds.xml
2270
2271 The Guide to the Secure Configuration of WRLinux 8 is broken into 'pro‐
2272 files', groupings of security settings that correlate to a known pol‐
2273 icy. Available profiles are:
2274
2275
2276
2277 Basic Profile for Embedded Systems
2278
2279 Profile ID: xccdf_org.ssgproject.content_profile_basic-embedded
2280
2281 This profile contains items common to many embedded Linux in‐
2282 stallations. Regardless of your system's deployment objective,
2283 all of these checks should pass.
2284
2285
2286
2287
2288
2289
2291 To scan your system utilizing the OpenSCAP utility against the ospp
2292 profile:
2293
2294 oscap xccdf eval --profile ospp --results /tmp/`hostname`-ssg-re‐
2295 sults.xml --report /tmp/`hostname`-ssg-results.html --oval-results
2296 /usr/share/xml/scap/ssg/content/ssg-{product}-xccdf.xml
2297
2298 Additional details can be found on the projects wiki page:
2299 https://www.github.com/OpenSCAP/scap-security-guide/wiki
2300
2301
2302
2304 /usr/share/xml/scap/ssg/content
2305 Houses SCAP content utilizing the following naming conventions:
2306
2307 SCAP Source Datastreams: ssg-{product}-ds.xml
2308
2309 CPE Dictionaries: ssg-{product}-cpe-dictionary.xml
2310
2311 CPE OVAL Content: ssg-{product}-cpe-oval.xml
2312
2313 OVAL Content: ssg-{product}-oval.xml
2314
2315 XCCDF Content: ssg-{product}-xccdf.xml
2316
2317 /usr/share/doc/scap-security-guide/guides/
2318 HTML versions of SSG profiles.
2319
2320 /usr/share/scap-security-guide/ansible/
2321 Contains Ansible Playbooks for SSG profiles.
2322
2323 /usr/share/scap-security-guide/bash/
2324 Contains Bash remediation scripts for SSG profiles.
2325
2326
2327
2329 SCAP Security Guide content is considered vendor (Red Hat) provided
2330 content. Per guidance from the U.S. National Institute of Standards
2331 and Technology (NIST), U.S. Government programs are allowed to use Ven‐
2332 dor produced SCAP content in absence of "Governmental Authority" check‐
2333 lists. The specific NIST verbage:
2334 http://web.nvd.nist.gov/view/ncp/repository/glossary?cid=1#Authority
2335
2336
2337
2339 DoD Directive (DoDD) 8500.1 requires that "all IA and IA-enabled IT
2340 products incorporated into DoD information systems shall be configured
2341 in accordance with DoD-approved security configuration guidelines" and
2342 tasks Defense Information Systems Agency (DISA) to "develop and provide
2343 security configuration guidance for IA and IA-enabled IT products in
2344 coordination with Director, NSA." The output of this authority is the
2345 DISA Security Technical Implementation Guides, or STIGs. DISA FSO is in
2346 the process of moving the STIGs towards the use of the NIST Security
2347 Content Automation Protocol (SCAP) in order to "automate" compliance
2348 reporting of the STIGs.
2349
2350 Through a common, shared vision, the SCAP Security Guide community en‐
2351 joys close collaboration directly with NSA, NIST, and DISA FSO. As
2352 stated in Section 1.1 of the Red Hat Enterprise Linux 6 STIG Overview,
2353 Version 1, Release 2, issued on 03-JUNE-2013:
2354
2355 "The consensus content was developed using an open-source project
2356 called SCAP Security Guide. The project's website is https://www.open-
2357 scap.org/security-policies/scap-security-guide. Except for differences
2358 in formatting to accomodate the DISA STIG publishing process, the con‐
2359 tent of the Red Hat Enterprise Linux 6 STIG should mirror the SCAP Se‐
2360 curity Guide content with only minor divergence as updates from multi‐
2361 ple sources work through the consensus process."
2362
2363 The DoD STIG for Red Hat Enterprise Linux 7, revision V2R4, was re‐
2364 leased in July 2019 Currently, the DoD Red Hat Enterprise Linux 7 STIG
2365 contains only XCCDF content and is available online: https://public.cy‐
2366 ber.mil/stigs/downloads/?_dl_facet_stigs=operating-systems%2Cunix-linux
2367
2368 Content published against the public.cyber.mil website is authoritative
2369 STIG content. The SCAP Security Guide project, as noted in the STIG
2370 overview, is considered upstream content. Unlike DISA FSO, the SCAP Se‐
2371 curity Guide project does publish OVAL automation content. Individual
2372 programs and C&A evaluators make program-level determinations on the
2373 direct usage of the SCAP Security Guide. Currently there is no blanket
2374 approval.
2375
2376
2377
2379 oscap(8)
2380
2381
2382
2384 Please direct all questions to the SSG mailing list: https://lists.fe‐
2385 dorahosted.org/mailman/listinfo/scap-security-guide
2386
2387
2388
2389version 1 26 Jan 2013 scap-security-guide(8)