1scap-security-guide(8)      System Manager's Manual     scap-security-guide(8)
2
3
4

NAME

6       SCAP  Security Guide - Delivers security guidance, baselines, and asso‐
7       ciated validation mechanisms utilizing the Security Content  Automation
8       Protocol (SCAP).
9
10
11

DESCRIPTION

13       The project provides practical security hardening advice and also links
14       it to compliance requirements in order to ease  deployment  activities,
15       such  as certification and accreditation. These include requirements in
16       the U.S. government (Federal, Defense, and Intelligence  Community)  as
17       well as of the financial services and health care industries. For exam‐
18       ple, high-level and widely-accepted policies such as NIST  800-53  pro‐
19       vides  prose  stating that System Administrators must audit "privileged
20       user actions," but do not define what "privileged actions" are. The SSG
21       bridges  the  gap  between generalized policy requirements and specific
22       implementation guidance, in SCAP formats to support automation whenever
23       possible.
24
25       The  projects  homepage  is located at: https://www.open-scap.org/secu
26       rity-policies/scap-security-guide
27
28
29

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 7

31       Source Datastream:  ssg-centos7-ds.xml
32
33       The Guide to the Secure Configuration of Red Hat Enterprise Linux 7  is
34       broken  into  'profiles', groupings of security settings that correlate
35       to a known policy. Available profiles are:
36
37
38
39       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
40
41              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
42
43              Ensures PCI-DSS v3.2.1 security configuration settings  are  ap‐
44              plied.
45
46
47       Standard System Security Profile for Red Hat Enterprise Linux 7
48
49              Profile ID:  xccdf_org.ssgproject.content_profile_standard
50
51              This profile contains rules to ensure standard security baseline
52              of a Red Hat Enterprise Linux 7 system. Regardless of your  sys‐
53              tem's workload all of these checks should pass.
54
55
56
57
58

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 8

60       Source Datastream:  ssg-centos8-ds.xml
61
62       The  Guide to the Secure Configuration of Red Hat Enterprise Linux 8 is
63       broken into 'profiles', groupings of security settings  that  correlate
64       to a known policy. Available profiles are:
65
66
67
68       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
69
70              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
71
72              Ensures  PCI-DSS  v3.2.1 security configuration settings are ap‐
73              plied.
74
75
76       Standard System Security Profile for Red Hat Enterprise Linux 8
77
78              Profile ID:  xccdf_org.ssgproject.content_profile_standard
79
80              This profile contains rules to ensure standard security baseline
81              of  a Red Hat Enterprise Linux 8 system. Regardless of your sys‐
82              tem's workload all of these checks should pass.
83
84
85
86
87

Profiles in Guide to the Secure Configuration of Chromium

89       Source Datastream:  ssg-chromium-ds.xml
90
91       The Guide to the Secure Configuration of Chromium is broken into  'pro‐
92       files',  groupings  of security settings that correlate to a known pol‐
93       icy. Available profiles are:
94
95
96
97       Upstream STIG for Google Chromium
98
99              Profile ID:  xccdf_org.ssgproject.content_profile_stig
100
101              This profile is developed under the DoD consensus model and DISA
102              FSO Vendor STIG process, serving as the upstream development en‐
103              vironment for the Google Chromium STIG.
104
105              As a result of the upstream/downstream relationship between  the
106              SCAP Security Guide project and the official DISA FSO STIG base‐
107              line, users should expect variance between SSG and DISA FSO con‐
108              tent.  For official DISA FSO STIG content, refer to https://pub
109              lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
110              rity%2Cbrowser-guidance.
111
112              While  this  profile  is packaged by Red Hat as part of the SCAP
113              Security Guide package, please note that commercial  support  of
114              this  SCAP content is NOT available. This profile is provided as
115              example SCAP content with no endorsement for suitability or pro‐
116              duction  readiness.  Support for this profile is provided by the
117              upstream SCAP Security Guide community on a  best-effort  basis.
118              The upstream project homepage is https://www.open-scap.org/secu
119              rity-policies/scap-security-guide/.
120
121
122
123
124

Profiles in Guide to the Secure Configuration of Debian 10

126       Source Datastream:  ssg-debian10-ds.xml
127
128       The Guide to the Secure Configuration of Debian 10 is broken into 'pro‐
129       files',  groupings  of security settings that correlate to a known pol‐
130       icy. Available profiles are:
131
132
133
134       Profile for ANSSI DAT-NT28 Average (Intermediate) Level
135
136              Profile          ID:           xccdf_org.ssgproject.content_pro‐
137              file_anssi_np_nt28_average
138
139              This  profile contains items for GNU/Linux installations already
140              protected by multiple higher level security stacks.
141
142
143       Profile for ANSSI DAT-NT28 High (Enforced) Level
144
145              Profile          ID:           xccdf_org.ssgproject.content_pro‐
146              file_anssi_np_nt28_high
147
148              This  profile contains items for GNU/Linux installations storing
149              sensitive informations that can be accessible  from  unauthenti‐
150              cated or uncontroled networks.
151
152
153       Profile for ANSSI DAT-NT28 Minimal Level
154
155              Profile          ID:           xccdf_org.ssgproject.content_pro‐
156              file_anssi_np_nt28_minimal
157
158              This profile contains items to be applied systematically.
159
160
161       Profile for ANSSI DAT-NT28 Restrictive Level
162
163              Profile          ID:           xccdf_org.ssgproject.content_pro‐
164              file_anssi_np_nt28_restrictive
165
166              This  profile contains items for GNU/Linux installations exposed
167              to unauthenticated flows or multiple sources.
168
169
170       Standard System Security Profile for Debian 10
171
172              Profile ID:  xccdf_org.ssgproject.content_profile_standard
173
174              This profile contains rules to ensure standard security baseline
175              of  a Debian 10 system. Regardless of your system's workload all
176              of these checks should pass.
177
178
179
180
181

Profiles in Guide to the Secure Configuration of Debian 9

183       Source Datastream:  ssg-debian9-ds.xml
184
185       The Guide to the Secure Configuration of Debian 9 is broken into  'pro‐
186       files',  groupings  of security settings that correlate to a known pol‐
187       icy. Available profiles are:
188
189
190
191       Profile for ANSSI DAT-NT28 Average (Intermediate) Level
192
193              Profile          ID:           xccdf_org.ssgproject.content_pro‐
194              file_anssi_np_nt28_average
195
196              This  profile contains items for GNU/Linux installations already
197              protected by multiple higher level security stacks.
198
199
200       Profile for ANSSI DAT-NT28 High (Enforced) Level
201
202              Profile          ID:           xccdf_org.ssgproject.content_pro‐
203              file_anssi_np_nt28_high
204
205              This  profile contains items for GNU/Linux installations storing
206              sensitive informations that can be accessible  from  unauthenti‐
207              cated or uncontroled networks.
208
209
210       Profile for ANSSI DAT-NT28 Minimal Level
211
212              Profile          ID:           xccdf_org.ssgproject.content_pro‐
213              file_anssi_np_nt28_minimal
214
215              This profile contains items to be applied systematically.
216
217
218       Profile for ANSSI DAT-NT28 Restrictive Level
219
220              Profile          ID:           xccdf_org.ssgproject.content_pro‐
221              file_anssi_np_nt28_restrictive
222
223              This  profile contains items for GNU/Linux installations exposed
224              to unauthenticated flows or multiple sources.
225
226
227       Standard System Security Profile for Debian 9
228
229              Profile ID:  xccdf_org.ssgproject.content_profile_standard
230
231              This profile contains rules to ensure standard security baseline
232              of  a  Debian 9 system. Regardless of your system's workload all
233              of these checks should pass.
234
235
236
237
238

Profiles in Guide to the Secure Configuration of Fedora

240       Source Datastream:  ssg-fedora-ds.xml
241
242       The Guide to the Secure Configuration of Fedora is  broken  into  'pro‐
243       files',  groupings  of security settings that correlate to a known pol‐
244       icy. Available profiles are:
245
246
247
248       OSPP - Protection Profile for General Purpose Operating Systems
249
250              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
251
252              This profile reflects mandatory configuration  controls  identi‐
253              fied  in  the NIAP Configuration Annex to the Protection Profile
254              for General Purpose Operating Systems (Protection  Profile  Ver‐
255              sion 4.2).
256
257              As  Fedora  OS is moving target, this profile does not guarantee
258              to provide security levels required from  US  National  Security
259              Systems.  Main goal of the profile is to provide Fedora develop‐
260              ers with hardened environment similar to the one mandated by  US
261              National Security Systems.
262
263
264       PCI-DSS v3.2.1 Control Baseline for Fedora
265
266              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
267
268              Ensures  PCI-DSS  v3.2.1 related security configuration settings
269              are applied.
270
271
272       Standard System Security Profile for Fedora
273
274              Profile ID:  xccdf_org.ssgproject.content_profile_standard
275
276              This profile contains rules to ensure standard security baseline
277              of a Fedora system.  Regardless of your system's workload all of
278              these checks should pass.
279
280
281
282
283

Profiles in Guide to the Secure Configuration of Firefox

285       Source Datastream:  ssg-firefox-ds.xml
286
287       The Guide to the Secure Configuration of Firefox is broken  into  'pro‐
288       files',  groupings  of security settings that correlate to a known pol‐
289       icy. Available profiles are:
290
291
292
293       Upstream Firefox STIG
294
295              Profile ID:  xccdf_org.ssgproject.content_profile_stig
296
297              This profile is developed under the DoD consensus model and DISA
298              FSO Vendor STIG process, serving as the upstream development en‐
299              vironment for the Firefox STIG.
300
301              As a result of the upstream/downstream relationship between  the
302              SCAP Security Guide project and the official DISA FSO STIG base‐
303              line, users should expect variance between SSG and DISA FSO con‐
304              tent.  For official DISA FSO STIG content, refer to https://pub
305              lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
306              rity%2Cbrowser-guidance.
307
308              While  this  profile  is packaged by Red Hat as part of the SCAP
309              Security Guide package, please note that commercial  support  of
310              this  SCAP content is NOT available. This profile is provided as
311              example SCAP content with no endorsement for suitability or pro‐
312              duction  readiness.  Support for this profile is provided by the
313              upstream SCAP Security Guide community on a  best-effort  basis.
314              The upstream project homepage is https://www.open-scap.org/secu
315              rity-policies/scap-security-guide/.
316
317
318
319
320

Profiles in Guide to the Secure Configuration of JBoss Fuse 6

322       Source Datastream:  ssg-fuse6-ds.xml
323
324       The Guide to the Secure Configuration of JBoss Fuse 6  is  broken  into
325       'profiles',  groupings  of  security settings that correlate to a known
326       policy. Available profiles are:
327
328
329
330       STIG for Apache ActiveMQ
331
332              Profile ID:  xccdf_org.ssgproject.content_profile_amq-stig
333
334              This is a *draft* profile for STIG. This profile is being devel‐
335              oped under the DoD consensus model to become a STIG in coordina‐
336              tion with DISA FSO.
337
338
339       Standard System Security Profile for JBoss
340
341              Profile ID:  xccdf_org.ssgproject.content_profile_standard
342
343              This profile contains rules to ensure standard security baseline
344              of JBoss Fuse. Regardless of your system's workload all of these
345              checks should pass.
346
347
348       STIG for JBoss Fuse 6
349
350              Profile ID:  xccdf_org.ssgproject.content_profile_stig
351
352              This is a *draft* profile for STIG. This profile is being devel‐
353              oped under the DoD consensus model to become a STIG in coordina‐
354              tion with DISA FSO.
355
356
357
358
359

Profiles in Guide to the Secure Configuration of Java Runtime Environment

361       Source Datastream:  ssg-jre-ds.xml
362
363       The Guide to the Secure Configuration of Java  Runtime  Environment  is
364       broken  into  'profiles', groupings of security settings that correlate
365       to a known policy. Available profiles are:
366
367
368
369       Java Runtime Environment (JRE) STIG
370
371              Profile ID:  xccdf_org.ssgproject.content_profile_stig
372
373              The Java Runtime Environment (JRE) is a bundle developed and of‐
374              fered  by Oracle Corporation which includes the Java Virtual Ma‐
375              chine (JVM), class libraries, and other components necessary  to
376              run  Java  applications  and  applets.  Certain default settings
377              within the JRE pose a security risk so it is necessary to deploy
378              system  wide  properties  to  ensure a higher degree of security
379              when utilizing the JRE.
380
381              The IBM Corporation also develops and bundles the  Java  Runtime
382              Environment (JRE) as well as Red Hat with OpenJDK.
383
384
385
386
387

Profiles in Guide to the Secure Configuration of Apple macOS 10.15

389       Source Datastream:  ssg-macos1015-ds.xml
390
391       The  Guide  to  the Secure Configuration of Apple macOS 10.15 is broken
392       into 'profiles', groupings of security settings  that  correlate  to  a
393       known policy. Available profiles are:
394
395
396
397       NIST 800-53 Moderate-Impact Baseline for Apple macOS 10.15 Catalina
398
399              Profile ID:  xccdf_org.ssgproject.content_profile_moderate
400
401              This compliance profile reflects the core set of Moderate-Impact
402              Baseline configuration settings for deployment  of  Apple  macOS
403              10.15  Catalina  into  U.S.  Defense, Intelligence, and Civilian
404              agencies.  Development partners and sponsors  include  the  U.S.
405              National  Institute of Standards and Technology (NIST), U.S. De‐
406              partment of Defense, and the the National Security Agency.
407
408              This baseline implements  configuration  requirements  from  the
409              following sources:
410
411              -  NIST  800-53  control  selections for Moderate-Impact systems
412              (NIST 800-53)
413
414              For any  differing  configuration  requirements,  e.g.  password
415              lengths,  the stricter security setting was chosen. Security Re‐
416              quirement Traceability Guides (RTMs) and sample System  Security
417              Configuration  Guides  are provided via the scap-security-guide-
418              docs package.
419
420              This profile reflects U.S. Government consensus content  and  is
421              developed through the ComplianceAsCode initiative, championed by
422              the National Security Agency. Except for differences in  format‐
423              ting  to  accommodate publishing processes, this profile mirrors
424              ComplianceAsCode content as minor divergences, such as bugfixes,
425              work through the consensus and release processes.
426
427
428
429
430

Profiles in Guide to the Secure Configuration of Red Hat OpenShift Container

432       Platform 4
433       Source Datastream:  ssg-ocp4-ds.xml
434
435       The Guide to the Secure Configuration of Red  Hat  OpenShift  Container
436       Platform  4  is  broken into 'profiles', groupings of security settings
437       that correlate to a known policy. Available profiles are:
438
439
440
441       CIS Red Hat OpenShift Container Platform 4 Benchmark
442
443              Profile ID:  xccdf_org.ssgproject.content_profile_cis-node
444
445              This profile defines a baseline that aligns to  the  Center  for
446              Internet Security® Red Hat OpenShift Container Platform 4 Bench‐
447              mark™, V0.3, currently unreleased.
448
449              This profile includes Center  for  Internet  Security®  Red  Hat
450              OpenShift Container Platform 4 CIS Benchmarks™ content.
451
452              Note  that this part of the profile is meant to run on the Oper‐
453              ating System that Red Hat OpenShift Container Platform 4 runs on
454              top of.
455
456              This  profile  is  applicable  to  OpenShift  versions  4.6  and
457              greater.
458
459
460       CIS Red Hat OpenShift Container Platform 4 Benchmark
461
462              Profile ID:  xccdf_org.ssgproject.content_profile_cis
463
464              This profile defines a baseline that aligns to  the  Center  for
465              Internet Security® Red Hat OpenShift Container Platform 4 Bench‐
466              mark™, V0.3, currently unreleased.
467
468              This profile includes Center  for  Internet  Security®  Red  Hat
469              OpenShift Container Platform 4 CIS Benchmarks™ content.
470
471              Note  that this part of the profile is meant to run on the Plat‐
472              form that Red Hat OpenShift Container Platform 4 runs on top of.
473
474              This  profile  is  applicable  to  OpenShift  versions  4.6  and
475              greater.
476
477
478       Australian Cyber Security Centre (ACSC) Essential Eight
479
480              Profile ID:  xccdf_org.ssgproject.content_profile_e8
481
482              This profile contains configuration checks for Red Hat OpenShift
483              Container Platform that align to the Australian  Cyber  Security
484              Centre (ACSC) Essential Eight.
485
486              A copy of the Essential Eight in Linux Environments guide can be
487              found at the ACSC website:
488
489              https://www.cyber.gov.au/acsc/view-all-content/publica
490              tions/hardening-linux-workstations-and-servers
491
492
493       NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift
494
495              Profile ID:  xccdf_org.ssgproject.content_profile_moderate
496
497              This compliance profile reflects the core set of Moderate-Impact
498              Baseline configuration settings for deployment of Red Hat  Open‐
499              Shift  Container  Platform  into U.S. Defense, Intelligence, and
500              Civilian agencies.  Development partners  and  sponsors  include
501              the  U.S. National Institute of Standards and Technology (NIST),
502              U.S. Department of Defense, the National  Security  Agency,  and
503              Red Hat.
504
505              This  baseline  implements  configuration  requirements from the
506              following sources:
507
508              - NIST 800-53 control  selections  for  Moderate-Impact  systems
509              (NIST 800-53)
510
511              For  any  differing  configuration  requirements,  e.g. password
512              lengths, the stricter security setting was chosen. Security  Re‐
513              quirement  Traceability Guides (RTMs) and sample System Security
514              Configuration Guides are provided via  the  scap-security-guide-
515              docs package.
516
517              This  profile  reflects U.S. Government consensus content and is
518              developed through the ComplianceAsCode initiative, championed by
519              the  National Security Agency. Except for differences in format‐
520              ting to accommodate publishing processes, this  profile  mirrors
521              ComplianceAsCode content as minor divergences, such as bugfixes,
522              work through the consensus and release processes.
523
524
525       NIST National Checklist for Red Hat OpenShift Container Platform
526
527              Profile ID:  xccdf_org.ssgproject.content_profile_ncp
528
529              This compliance profile reflects the core set  of  security  re‐
530              lated configuration settings for deployment of Red Hat OpenShift
531              Container Platform into U.S. Defense, Intelligence, and Civilian
532              agencies.   Development  partners  and sponsors include the U.S.
533              National Institute of Standards and Technology (NIST), U.S.  De‐
534              partment of Defense, the National Security Agency, and Red Hat.
535
536              This  baseline  implements  configuration  requirements from the
537              following sources:
538
539              - Committee on National Security Systems  Instruction  No.  1253
540              (CNSSI  1253)  -  NIST Controlled Unclassified Information (NIST
541              800-171) - NIST 800-53 control  selections  for  Moderate-Impact
542              systems  (NIST  800-53) - U.S. Government Configuration Baseline
543              (USGCB) - NIAP Protection Profile for General Purpose  Operating
544              Systems  v4.2.1  (OSPP  v4.2.1) - DISA Operating System Security
545              Requirements Guide (OS SRG)
546
547              For any  differing  configuration  requirements,  e.g.  password
548              lengths,  the stricter security setting was chosen. Security Re‐
549              quirement Traceability Guides (RTMs) and sample System  Security
550              Configuration  Guides  are provided via the scap-security-guide-
551              docs package.
552
553              This profile reflects U.S. Government consensus content  and  is
554              developed through the ComplianceAsCode initiative, championed by
555              the National Security Agency. Except for differences in  format‐
556              ting  to  accommodate publishing processes, this profile mirrors
557              ComplianceAsCode content as minor divergences, such as bugfixes,
558              work through the consensus and release processes.
559
560
561
562
563

Profiles in Guide to the Secure Configuration of Oracle Linux 7

565       Source Datastream:  ssg-ol7-ds.xml
566
567       The  Guide to the Secure Configuration of Oracle Linux 7 is broken into
568       'profiles', groupings of security settings that correlate  to  a  known
569       policy. Available profiles are:
570
571
572
573       ANSSI-BP-028 (enhanced)
574
575              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_nt28_en‐
576              hanced
577
578              This profile contains configurations that align to  ANSSI-BP-028
579              at the enhanced hardening level.
580
581              ANSSI  is  the  French National Information Security Agency, and
582              stands for Agence nationale de la sécurité des systèmes d'infor‐
583              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
584              GNU/Linux systems.
585
586              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
587              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
588              securite-relatives-a-un-systeme-gnulinux/
589
590
591       DRAFT - ANSSI-BP-028 (high)
592
593              Profile          ID:           xccdf_org.ssgproject.content_pro‐
594              file_anssi_nt28_high
595
596              This  profile contains configurations that align to ANSSI-BP-028
597              at the high hardening level.
598
599              ANSSI is the French National Information  Security  Agency,  and
600              stands for Agence nationale de la sécurité des systèmes d'infor‐
601              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
602              GNU/Linux systems.
603
604              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
605              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
606              securite-relatives-a-un-systeme-gnulinux/
607
608
609       ANSSI-BP-028 (intermediary)
610
611              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_nt28_in‐
612              termediary
613
614              This profile contains configurations that align to  ANSSI-BP-028
615              at the intermediary hardening level.
616
617              ANSSI  is  the  French National Information Security Agency, and
618              stands for Agence nationale de la sécurité des systèmes d'infor‐
619              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
620              GNU/Linux systems.
621
622              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
623              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
624              securite-relatives-a-un-systeme-gnulinux/
625
626
627       ANSSI-BP-028 (minimal)
628
629              Profile          ID:           xccdf_org.ssgproject.content_pro‐
630              file_anssi_nt28_minimal
631
632              This  profile contains configurations that align to ANSSI-BP-028
633              at the minimal hardening level.
634
635              ANSSI is the French National Information  Security  Agency,  and
636              stands for Agence nationale de la sécurité des systèmes d'infor‐
637              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
638              GNU/Linux systems.
639
640              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
641              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
642              securite-relatives-a-un-systeme-gnulinux/
643
644
645       Criminal Justice Information Services (CJIS) Security Policy
646
647              Profile ID:  xccdf_org.ssgproject.content_profile_cjis
648
649              This  profile is derived from FBI's CJIS v5.4 Security Policy. A
650              copy of this policy can be found at the CJIS Security Policy Re‐
651              source Center:
652
653              https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
654              center
655
656
657       Unclassified Information in Non-federal Information Systems and Organi‐
658       zations (NIST 800-171)
659
660              Profile ID:  xccdf_org.ssgproject.content_profile_cui
661
662              From  NIST  800-171, Section 2.2: Security requirements for pro‐
663              tecting the confidentiality of CUI  in  non-federal  information
664              systems  and  organizations  have  a well-defined structure that
665              consists of:
666
667              (i) a basic security requirements section; (ii) a derived  secu‐
668              rity requirements section.
669
670              The  basic security requirements are obtained from FIPS Publica‐
671              tion 200, which provides the high-level and fundamental security
672              requirements  for  federal  information and information systems.
673              The derived security requirements, which  supplement  the  basic
674              security  requirements,  are taken from the security controls in
675              NIST Special Publication 800-53.
676
677              This profile configures Oracle Linux 7 to the NIST Special  Pub‐
678              lication  800-53 controls identified for securing Controlled Un‐
679              classified Information (CUI).
680
681
682       [DRAFT] Australian Cyber Security Centre (ACSC) Essential Eight
683
684              Profile ID:  xccdf_org.ssgproject.content_profile_e8
685
686              This profile contains configuration checks for  Oracle  Linux  7
687              that align to the Australian Cyber Security Centre (ACSC) Essen‐
688              tial Eight.
689
690              A copy of the Essential Eight in Linux Environments guide can be
691              found at the ACSC website:
692
693              https://www.cyber.gov.au/acsc/view-all-content/publica
694              tions/hardening-linux-workstations-and-servers
695
696
697       Health Insurance Portability and Accountability Act (HIPAA)
698
699              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
700
701              The HIPAA Security Rule establishes U.S. national  standards  to
702              protect individuals’ electronic personal health information that
703              is created, received, used, or maintained by a  covered  entity.
704              The  Security Rule requires appropriate administrative, physical
705              and technical safeguards to ensure the  confidentiality,  integ‐
706              rity, and security of electronic protected health information.
707
708              This  profile  configures  Oracle  Linux 7 to the HIPAA Security
709              Rule identified for securing of electronic protected health  in‐
710              formation.   Use  of  this profile in no way guarantees or makes
711              claims against  legal  compliance  against  the  HIPAA  Security
712              Rule(s).
713
714
715       [DRAFT] Protection Profile for General Purpose Operating Systems
716
717              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
718
719              This  profile  reflects mandatory configuration controls identi‐
720              fied in the NIAP Configuration Annex to the  Protection  Profile
721              for  General  Purpose Operating Systems (Protection Profile Ver‐
722              sion 4.2.1).
723
724              This configuration profile is consistent with CNSSI-1253,  which
725              requires  U.S.  National  Security  Systems to adhere to certain
726              configuration parameters. Accordingly, this  configuration  pro‐
727              file is suitable for use in U.S. National Security Systems.
728
729
730       PCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 7
731
732              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
733
734              Ensures  PCI-DSS  v3.2.1 related security configuration settings
735              are applied.
736
737
738       Security Profile of Oracle Linux 7 for SAP
739
740              Profile ID:  xccdf_org.ssgproject.content_profile_sap
741
742              This profile contains rules for Oracle Linux 7 Operating  System
743              in  compliance  with  SAP note 2069760 and SAP Security Baseline
744              Template version 1.9 Item I-8 and section  4.1.2.2.   Regardless
745              of your system's workload all of these checks should pass.
746
747
748       Standard System Security Profile for Oracle Linux 7
749
750              Profile ID:  xccdf_org.ssgproject.content_profile_standard
751
752              This profile contains rules to ensure standard security baseline
753              of Oracle Linux 7 system. Regardless of your  system's  workload
754              all of these checks should pass.
755
756
757       DISA STIG for Oracle Linux 7
758
759              Profile ID:  xccdf_org.ssgproject.content_profile_stig
760
761              This  profile  contains  configuration  checks that align to the
762              DISA STIG for Oracle Linux V2R2.
763
764
765
766
767

Profiles in Guide to the Secure Configuration of Oracle Linux 8

769       Source Datastream:  ssg-ol8-ds.xml
770
771       The Guide to the Secure Configuration of Oracle Linux 8 is broken  into
772       'profiles',  groupings  of  security settings that correlate to a known
773       policy. Available profiles are:
774
775
776
777       ANSSI-BP-028 (enhanced)
778
779              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
780              hanced
781
782              This  profile contains configurations that align to ANSSI-BP-028
783              at the enhanced hardening level.
784
785              ANSSI is the French National Information  Security  Agency,  and
786              stands for Agence nationale de la sécurité des systèmes d'infor‐
787              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
788              GNU/Linux systems.
789
790              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
791              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
792              securite-relatives-a-un-systeme-gnulinux/
793
794
795       DRAFT - ANSSI-BP-028 (high)
796
797              Profile          ID:           xccdf_org.ssgproject.content_pro‐
798              file_anssi_bp28_high
799
800              This profile contains configurations that align to  ANSSI-BP-028
801              at the high hardening level.
802
803              ANSSI  is  the  French National Information Security Agency, and
804              stands for Agence nationale de la sécurité des systèmes d'infor‐
805              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
806              GNU/Linux systems.
807
808              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
809              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
810              securite-relatives-a-un-systeme-gnulinux/
811
812
813       ANSSI-BP-028 (intermediary)
814
815              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
816              termediary
817
818              This  profile contains configurations that align to ANSSI-BP-028
819              at the intermediary hardening level.
820
821              ANSSI is the French National Information  Security  Agency,  and
822              stands for Agence nationale de la sécurité des systèmes d'infor‐
823              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
824              GNU/Linux systems.
825
826              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
827              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
828              securite-relatives-a-un-systeme-gnulinux/
829
830
831       ANSSI-BP-028 (minimal)
832
833              Profile          ID:           xccdf_org.ssgproject.content_pro‐
834              file_anssi_bp28_minimal
835
836              This profile contains configurations that align to  ANSSI-BP-028
837              at the minimal hardening level.
838
839              ANSSI  is  the  French National Information Security Agency, and
840              stands for Agence nationale de la sécurité des systèmes d'infor‐
841              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
842              GNU/Linux systems.
843
844              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
845              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
846              securite-relatives-a-un-systeme-gnulinux/
847
848
849       Criminal Justice Information Services (CJIS) Security Policy
850
851              Profile ID:  xccdf_org.ssgproject.content_profile_cjis
852
853              This profile is derived from FBI's CJIS v5.4 Security Policy.  A
854              copy of this policy can be found at the CJIS Security Policy Re‐
855              source Center:
856
857              https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
858              center
859
860
861       Unclassified Information in Non-federal Information Systems and Organi‐
862       zations (NIST 800-171)
863
864              Profile ID:  xccdf_org.ssgproject.content_profile_cui
865
866              From NIST 800-171, Section 2.2: Security requirements  for  pro‐
867              tecting  the  confidentiality  of CUI in non-federal information
868              systems and organizations have  a  well-defined  structure  that
869              consists of:
870
871              (i)  a basic security requirements section; (ii) a derived secu‐
872              rity requirements section.
873
874              The basic security requirements are obtained from FIPS  Publica‐
875              tion 200, which provides the high-level and fundamental security
876              requirements for federal information  and  information  systems.
877              The  derived  security  requirements, which supplement the basic
878              security requirements, are taken from the security  controls  in
879              NIST Special Publication 800-53.
880
881              This  profile configures Oracle Linux 8 to the NIST Special Pub‐
882              lication 800-53 controls identified for securing Controlled  Un‐
883              classified Information (CUI).
884
885
886       [DRAFT] Australian Cyber Security Centre (ACSC) Essential Eight
887
888              Profile ID:  xccdf_org.ssgproject.content_profile_e8
889
890              This  profile  contains  configuration checks for Oracle Linux 8
891              that align to the Australian Cyber Security Centre (ACSC) Essen‐
892              tial Eight.
893
894              A copy of the Essential Eight in Linux Environments guide can be
895              found at the ACSC website:
896
897              https://www.cyber.gov.au/acsc/view-all-content/publica
898              tions/hardening-linux-workstations-and-servers
899
900
901       Health Insurance Portability and Accountability Act (HIPAA)
902
903              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
904
905              The  HIPAA  Security Rule establishes U.S. national standards to
906              protect individuals’ electronic personal health information that
907              is  created,  received, used, or maintained by a covered entity.
908              The Security Rule requires appropriate administrative,  physical
909              and  technical  safeguards to ensure the confidentiality, integ‐
910              rity, and security of electronic protected health information.
911
912              This profile configures Oracle Linux 8  to  the  HIPAA  Security
913              Rule  identified for securing of electronic protected health in‐
914              formation.  Use of this profile in no way  guarantees  or  makes
915              claims  against  legal  compliance  against  the  HIPAA Security
916              Rule(s).
917
918
919       [DRAFT] Protection Profile for General Purpose Operating Systems
920
921              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
922
923              This profile reflects mandatory configuration  controls  identi‐
924              fied  in  the NIAP Configuration Annex to the Protection Profile
925              for General Purpose Operating Systems (Protection  Profile  Ver‐
926              sion 4.2.1).
927
928              This  configuration profile is consistent with CNSSI-1253, which
929              requires U.S. National Security Systems  to  adhere  to  certain
930              configuration  parameters.  Accordingly, this configuration pro‐
931              file is suitable for use in U.S. National Security Systems.
932
933
934       PCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 8
935
936              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
937
938              Ensures PCI-DSS v3.2.1 related security  configuration  settings
939              are applied.
940
941
942       Standard System Security Profile for Oracle Linux 8
943
944              Profile ID:  xccdf_org.ssgproject.content_profile_standard
945
946              This profile contains rules to ensure standard security baseline
947              of Oracle Linux 8 system. Regardless of your  system's  workload
948              all of these checks should pass.
949
950
951
952
953

Profiles in Guide to the Secure Configuration of openSUSE

955       Source Datastream:  ssg-opensuse-ds.xml
956
957       The  Guide to the Secure Configuration of openSUSE is broken into 'pro‐
958       files', groupings of security settings that correlate to a  known  pol‐
959       icy. Available profiles are:
960
961
962
963       Standard System Security Profile for openSUSE
964
965              Profile ID:  xccdf_org.ssgproject.content_profile_standard
966
967              This profile contains rules to ensure standard security baseline
968              of an openSUSE system. Regardless of your system's workload  all
969              of these checks should pass.
970
971
972
973
974

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux

976       CoreOS 4
977       Source Datastream:  ssg-rhcos4-ds.xml
978
979       The Guide to the Secure  Configuration  of  Red  Hat  Enterprise  Linux
980       CoreOS 4 is broken into 'profiles', groupings of security settings that
981       correlate to a known policy. Available profiles are:
982
983
984
985       DRAFT - ANSSI-BP-028 (enhanced)
986
987              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
988              hanced
989
990              This  profile contains configurations that align to ANSSI-BP-028
991              at the enhanced hardening level.
992
993              ANSSI is the French National Information  Security  Agency,  and
994              stands for Agence nationale de la sécurité des systèmes d'infor‐
995              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
996              GNU/Linux systems.
997
998              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
999              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1000              securite-relatives-a-un-systeme-gnulinux/
1001
1002
1003       DRAFT - ANSSI-BP-028 (high)
1004
1005              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1006              file_anssi_bp28_high
1007
1008              This profile contains configurations that align to  ANSSI-BP-028
1009              at the high hardening level.
1010
1011              ANSSI  is  the  French National Information Security Agency, and
1012              stands for Agence nationale de la sécurité des systèmes d'infor‐
1013              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
1014              GNU/Linux systems.
1015
1016              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1017              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1018              securite-relatives-a-un-systeme-gnulinux/
1019
1020
1021       DRAFT - ANSSI-BP-028 (intermediary)
1022
1023              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
1024              termediary
1025
1026              This  profile contains configurations that align to ANSSI-BP-028
1027              at the intermediary hardening level.
1028
1029              ANSSI is the French National Information  Security  Agency,  and
1030              stands for Agence nationale de la sécurité des systèmes d'infor‐
1031              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
1032              GNU/Linux systems.
1033
1034              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
1035              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1036              securite-relatives-a-un-systeme-gnulinux/
1037
1038
1039       DRAFT - ANSSI-BP-028 (minimal)
1040
1041              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1042              file_anssi_bp28_minimal
1043
1044              This profile contains configurations that align to  ANSSI-BP-028
1045              at the minimal hardening level.
1046
1047              ANSSI  is  the  French National Information Security Agency, and
1048              stands for Agence nationale de la sécurité des systèmes d'infor‐
1049              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
1050              GNU/Linux systems.
1051
1052              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1053              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1054              securite-relatives-a-un-systeme-gnulinux/
1055
1056
1057       Australian Cyber Security Centre (ACSC) Essential Eight
1058
1059              Profile ID:  xccdf_org.ssgproject.content_profile_e8
1060
1061              This profile contains configuration checks for  Red  Hat  Enter‐
1062              prise  Linux  CoreOS that align to the Australian Cyber Security
1063              Centre (ACSC) Essential Eight.
1064
1065              A copy of the Essential Eight in Linux Environments guide can be
1066              found at the ACSC website:
1067
1068              https://www.cyber.gov.au/acsc/view-all-content/publica
1069              tions/hardening-linux-workstations-and-servers
1070
1071
1072       NIST 800-53 Moderate-Impact  Baseline  for  Red  Hat  Enterprise  Linux
1073       CoreOS
1074
1075              Profile ID:  xccdf_org.ssgproject.content_profile_moderate
1076
1077              This compliance profile reflects the core set of Moderate-Impact
1078              Baseline configuration settings for deployment of Red Hat Enter‐
1079              prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
1080              agencies.  Development partners and sponsors  include  the  U.S.
1081              National  Institute of Standards and Technology (NIST), U.S. De‐
1082              partment of Defense, the National Security Agency, and Red Hat.
1083
1084              This baseline implements  configuration  requirements  from  the
1085              following sources:
1086
1087              -  NIST  800-53  control  selections for Moderate-Impact systems
1088              (NIST 800-53)
1089
1090              For any  differing  configuration  requirements,  e.g.  password
1091              lengths,  the stricter security setting was chosen. Security Re‐
1092              quirement Traceability Guides (RTMs) and sample System  Security
1093              Configuration  Guides  are provided via the scap-security-guide-
1094              docs package.
1095
1096              This profile reflects U.S. Government consensus content  and  is
1097              developed through the ComplianceAsCode initiative, championed by
1098              the National Security Agency. Except for differences in  format‐
1099              ting  to  accommodate publishing processes, this profile mirrors
1100              ComplianceAsCode content as minor divergences, such as bugfixes,
1101              work through the consensus and release processes.
1102
1103
1104       NIST National Checklist for Red Hat Enterprise Linux CoreOS
1105
1106              Profile ID:  xccdf_org.ssgproject.content_profile_ncp
1107
1108              This  compliance  profile  reflects the core set of security re‐
1109              lated configuration settings for deployment of  Red  Hat  Enter‐
1110              prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
1111              agencies.  Development partners and sponsors  include  the  U.S.
1112              National  Institute of Standards and Technology (NIST), U.S. De‐
1113              partment of Defense, the National Security Agency, and Red Hat.
1114
1115              This baseline implements  configuration  requirements  from  the
1116              following sources:
1117
1118              -  Committee  on  National Security Systems Instruction No. 1253
1119              (CNSSI 1253) - NIST Controlled  Unclassified  Information  (NIST
1120              800-171)  -  NIST  800-53 control selections for Moderate-Impact
1121              systems (NIST 800-53) - U.S. Government  Configuration  Baseline
1122              (USGCB)  - NIAP Protection Profile for General Purpose Operating
1123              Systems v4.2.1 (OSPP v4.2.1) - DISA  Operating  System  Security
1124              Requirements Guide (OS SRG)
1125
1126              For  any  differing  configuration  requirements,  e.g. password
1127              lengths, the stricter security setting was chosen. Security  Re‐
1128              quirement  Traceability Guides (RTMs) and sample System Security
1129              Configuration Guides are provided via  the  scap-security-guide-
1130              docs package.
1131
1132              This  profile  reflects U.S. Government consensus content and is
1133              developed through the ComplianceAsCode initiative, championed by
1134              the  National Security Agency. Except for differences in format‐
1135              ting to accommodate publishing processes, this  profile  mirrors
1136              ComplianceAsCode content as minor divergences, such as bugfixes,
1137              work through the consensus and release processes.
1138
1139
1140       Protection Profile for General Purpose Operating Systems
1141
1142              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
1143
1144              This profile reflects mandatory configuration  controls  identi‐
1145              fied  in  the NIAP Configuration Annex to the Protection Profile
1146              for General Purpose Operating Systems (Protection  Profile  Ver‐
1147              sion 4.2.1).
1148
1149              This  configuration profile is consistent with CNSSI-1253, which
1150              requires U.S. National Security Systems  to  adhere  to  certain
1151              configuration  parameters.  Accordingly, this configuration pro‐
1152              file is suitable for use in U.S. National Security Systems.
1153
1154
1155       [DRAFT] DISA STIG for Red Hat Enterprise Linux CoreOS
1156
1157              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1158
1159              This profile contains configuration checks  that  align  to  the
1160              [DRAFT]  DISA  STIG for Red Hat Enterprise Linux CoreOS which is
1161              the operating system layer of Red Hat OpenShift Container  Plat‐
1162              form.
1163
1164
1165
1166
1167

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 7

1169       Source Datastream:  ssg-rhel7-ds.xml
1170
1171       The  Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
1172       broken into 'profiles', groupings of security settings  that  correlate
1173       to a known policy. Available profiles are:
1174
1175
1176
1177       C2S for Red Hat Enterprise Linux 7
1178
1179              Profile ID:  xccdf_org.ssgproject.content_profile_C2S
1180
1181              This profile demonstrates compliance against the U.S. Government
1182              Commercial Cloud Services (C2S) baseline.
1183
1184              This baseline was inspired by the Center for  Internet  Security
1185              (CIS) Red Hat Enterprise Linux 7 Benchmark, v2.1.1 - 01-31-2017.
1186
1187              For the SCAP Security Guide project to remain in compliance with
1188              CIS' terms and conditions,  specifically  Restrictions(8),  note
1189              there  is  no  representation or claim that the C2S profile will
1190              ensure a system is in compliance or  consistency  with  the  CIS
1191              baseline.
1192
1193
1194       ANSSI-BP-028 (enhanced)
1195
1196              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_nt28_en‐
1197              hanced
1198
1199              This profile contains configurations that align to  ANSSI-BP-028
1200              at the enhanced hardening level.
1201
1202              ANSSI  is  the  French National Information Security Agency, and
1203              stands for Agence nationale de la sécurité des systèmes d'infor‐
1204              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
1205              GNU/Linux systems.
1206
1207              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1208              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1209              securite-relatives-a-un-systeme-gnulinux/
1210
1211
1212       DRAFT - ANSSI-BP-028 (high)
1213
1214              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1215              file_anssi_nt28_high
1216
1217              This  profile contains configurations that align to ANSSI-BP-028
1218              at the high hardening level.
1219
1220              ANSSI is the French National Information  Security  Agency,  and
1221              stands for Agence nationale de la sécurité des systèmes d'infor‐
1222              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
1223              GNU/Linux systems.
1224
1225              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
1226              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1227              securite-relatives-a-un-systeme-gnulinux/
1228
1229
1230       ANSSI-BP-028 (intermediary)
1231
1232              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_nt28_in‐
1233              termediary
1234
1235              This profile contains configurations that align to  ANSSI-BP-028
1236              at the intermediary hardening level.
1237
1238              ANSSI  is  the  French National Information Security Agency, and
1239              stands for Agence nationale de la sécurité des systèmes d'infor‐
1240              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
1241              GNU/Linux systems.
1242
1243              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1244              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1245              securite-relatives-a-un-systeme-gnulinux/
1246
1247
1248       ANSSI-BP-028 (minimal)
1249
1250              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1251              file_anssi_nt28_minimal
1252
1253              This  profile contains configurations that align to ANSSI-BP-028
1254              at the minimal hardening level.
1255
1256              ANSSI is the French National Information  Security  Agency,  and
1257              stands for Agence nationale de la sécurité des systèmes d'infor‐
1258              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
1259              GNU/Linux systems.
1260
1261              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
1262              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1263              securite-relatives-a-un-systeme-gnulinux/
1264
1265
1266       CIS Red Hat Enterprise Linux 7 Benchmark
1267
1268              Profile ID:  xccdf_org.ssgproject.content_profile_cis
1269
1270              This  profile  defines  a baseline that aligns to the Center for
1271              Internet  Security®  Red  Hat  Enterprise  Linux  7  Benchmark™,
1272              v2.2.0, released 12-27-2017.
1273
1274              This  profile includes Center for Internet Security® Red Hat En‐
1275              terprise Linux 7 CIS Benchmarks™ content.
1276
1277
1278       Criminal Justice Information Services (CJIS) Security Policy
1279
1280              Profile ID:  xccdf_org.ssgproject.content_profile_cjis
1281
1282              This profile is derived from FBI's CJIS v5.4 Security Policy.  A
1283              copy of this policy can be found at the CJIS Security Policy Re‐
1284              source Center:
1285
1286              https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
1287              center
1288
1289
1290       Unclassified Information in Non-federal Information Systems and Organi‐
1291       zations (NIST 800-171)
1292
1293              Profile ID:  xccdf_org.ssgproject.content_profile_cui
1294
1295              From NIST 800-171, Section 2.2: Security requirements  for  pro‐
1296              tecting  the  confidentiality  of CUI in non-federal information
1297              systems and organizations have  a  well-defined  structure  that
1298              consists of:
1299
1300              (i)  a basic security requirements section; (ii) a derived secu‐
1301              rity requirements section.
1302
1303              The basic security requirements are obtained from FIPS  Publica‐
1304              tion 200, which provides the high-level and fundamental security
1305              requirements for federal information  and  information  systems.
1306              The  derived  security  requirements, which supplement the basic
1307              security requirements, are taken from the security  controls  in
1308              NIST Special Publication 800-53.
1309
1310              This  profile  configures Red Hat Enterprise Linux 7 to the NIST
1311              Special Publication 800-53 controls identified for securing Con‐
1312              trolled Unclassified Information (CUI).
1313
1314
1315       Australian Cyber Security Centre (ACSC) Essential Eight
1316
1317              Profile ID:  xccdf_org.ssgproject.content_profile_e8
1318
1319              This  profile  contains  configuration checks for Red Hat Enter‐
1320              prise Linux 7 that align to the Australian Cyber Security Centre
1321              (ACSC) Essential Eight.
1322
1323              A copy of the Essential Eight in Linux Environments guide can be
1324              found at the ACSC website:
1325
1326              https://www.cyber.gov.au/acsc/view-all-content/publica
1327              tions/hardening-linux-workstations-and-servers
1328
1329
1330       Health Insurance Portability and Accountability Act (HIPAA)
1331
1332              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
1333
1334              The  HIPAA  Security Rule establishes U.S. national standards to
1335              protect individuals’ electronic personal health information that
1336              is  created,  received, used, or maintained by a covered entity.
1337              The Security Rule requires appropriate administrative,  physical
1338              and  technical  safeguards to ensure the confidentiality, integ‐
1339              rity, and security of electronic protected health information.
1340
1341              This profile configures Red Hat Enterprise Linux 7 to the  HIPAA
1342              Security  Rule  identified  for securing of electronic protected
1343              health information.  Use of this profile in no way guarantees or
1344              makes claims against legal compliance against the HIPAA Security
1345              Rule(s).
1346
1347
1348       NIST National Checklist Program Security Guide
1349
1350              Profile ID:  xccdf_org.ssgproject.content_profile_ncp
1351
1352              This compliance profile reflects the core set  of  security  re‐
1353              lated  configuration  settings  for deployment of Red Hat Enter‐
1354              prise Linux 7.x into U.S. Defense,  Intelligence,  and  Civilian
1355              agencies.   Development  partners  and sponsors include the U.S.
1356              National Institute of Standards and Technology (NIST), U.S.  De‐
1357              partment of Defense, the National Security Agency, and Red Hat.
1358
1359              This  baseline  implements  configuration  requirements from the
1360              following sources:
1361
1362              - Committee on National Security Systems  Instruction  No.  1253
1363              (CNSSI  1253)  -  NIST Controlled Unclassified Information (NIST
1364              800-171) - NIST 800-53 control selections  for  MODERATE  impact
1365              systems  (NIST  800-53) - U.S. Government Configuration Baseline
1366              (USGCB) - NIAP Protection Profile for General Purpose  Operating
1367              Systems  v4.2.1  (OSPP  v4.2.1) - DISA Operating System Security
1368              Requirements Guide (OS SRG)
1369
1370              For any  differing  configuration  requirements,  e.g.  password
1371              lengths,  the stricter security setting was chosen. Security Re‐
1372              quirement Traceability Guides (RTMs) and sample System  Security
1373              Configuration  Guides  are provided via the scap-security-guide-
1374              docs package.
1375
1376              This profile reflects U.S. Government consensus content  and  is
1377              developed  through  the OpenSCAP/SCAP Security Guide initiative,
1378              championed by the National Security Agency. Except  for  differ‐
1379              ences  in  formatting  to accommodate publishing processes, this
1380              profile mirrors OpenSCAP/SCAP Security Guide  content  as  minor
1381              divergences,  such  as  bugfixes, work through the consensus and
1382              release processes.
1383
1384
1385       OSPP - Protection Profile for General Purpose Operating Systems v4.2.1
1386
1387              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
1388
1389              This profile reflects mandatory configuration  controls  identi‐
1390              fied  in  the NIAP Configuration Annex to the Protection Profile
1391              for General Purpose Operating Systems (Protection  Profile  Ver‐
1392              sion 4.2.1).
1393
1394              This  configuration profile is consistent with CNSSI-1253, which
1395              requires U.S. National Security Systems  to  adhere  to  certain
1396              configuration  parameters.  Accordingly, this configuration pro‐
1397              file is suitable for use in U.S. National Security Systems.
1398
1399
1400       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
1401
1402              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
1403
1404              Ensures PCI-DSS v3.2.1 security configuration settings  are  ap‐
1405              plied.
1406
1407
1408       [DRAFT]  DISA  STIG  for  Red  Hat Enterprise Linux Virtualization Host
1409       (RHELH)
1410
1411              Profile ID:  xccdf_org.ssgproject.content_profile_rhelh-stig
1412
1413              This *draft* profile contains configuration checks that align to
1414              the  DISA  STIG for Red Hat Enterprise Linux Virtualization Host
1415              (RHELH).
1416
1417
1418       VPP - Protection Profile for Virtualization v. 1.0 for Red  Hat  Enter‐
1419       prise Linux Hypervisor (RHELH)
1420
1421              Profile ID:  xccdf_org.ssgproject.content_profile_rhelh-vpp
1422
1423              This  compliance  profile  reflects the core set of security re‐
1424              lated configuration settings for deployment of  Red  Hat  Enter‐
1425              prise  Linux  Hypervisor (RHELH) 7.x into U.S. Defense, Intelli‐
1426              gence, and Civilian agencies.  Development partners and sponsors
1427              include  the U.S. National Institute of Standards and Technology
1428              (NIST),  U.S.  Department  of  Defense,  the  National  Security
1429              Agency, and Red Hat.
1430
1431              This  baseline  implements  configuration  requirements from the
1432              following sources:
1433
1434              - Committee on National Security Systems  Instruction  No.  1253
1435              (CNSSI  1253)  - NIST 800-53 control selections for MODERATE im‐
1436              pact systems (NIST 800-53) - U.S. Government Configuration Base‐
1437              line  (USGCB)  - NIAP Protection Profile for Virtualization v1.0
1438              (VPP v1.0)
1439
1440              For any  differing  configuration  requirements,  e.g.  password
1441              lengths,  the stricter security setting was chosen. Security Re‐
1442              quirement Traceability Guides (RTMs) and sample System  Security
1443              Configuration  Guides  are provided via the scap-security-guide-
1444              docs package.
1445
1446              This profile reflects U.S. Government consensus content  and  is
1447              developed  through  the  ComplianceAsCode project, championed by
1448              the National Security Agency. Except for differences in  format‐
1449              ting  to  accommodate publishing processes, this profile mirrors
1450              ComplianceAsCode content as minor divergences, such as bugfixes,
1451              work through the consensus and release processes.
1452
1453
1454       Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
1455
1456              Profile ID:  xccdf_org.ssgproject.content_profile_rht-ccp
1457
1458              This  profile  contains the minimum security relevant configura‐
1459              tion settings recommended by Red Hat, Inc for Red Hat Enterprise
1460              Linux 7 instances deployed by Red Hat Certified Cloud Providers.
1461
1462
1463       Standard System Security Profile for Red Hat Enterprise Linux 7
1464
1465              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1466
1467              This profile contains rules to ensure standard security baseline
1468              of a Red Hat Enterprise Linux 7 system. Regardless of your  sys‐
1469              tem's workload all of these checks should pass.
1470
1471
1472       DISA STIG for Red Hat Enterprise Linux 7
1473
1474              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1475
1476              This  profile  contains  configuration  checks that align to the
1477              DISA STIG for Red Hat Enterprise Linux V3R3.
1478
1479              In addition to being applicable to Red Hat Enterprise  Linux  7,
1480              DISA recognizes this configuration baseline as applicable to the
1481              operating system tier of Red Hat technologies that are based  on
1482              Red Hat Enterprise Linux 7, such as:
1483
1484              -  Red  Hat  Enterprise  Linux Server - Red Hat Enterprise Linux
1485              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1486              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1487              7 image
1488
1489
1490       DISA STIG with GUI for Red Hat Enterprise Linux 7
1491
1492              Profile ID:  xccdf_org.ssgproject.content_profile_stig_gui
1493
1494              This profile contains configuration checks  that  align  to  the
1495              DISA STIG with GUI for Red Hat Enterprise Linux V3R3.
1496
1497              In  addition  to being applicable to Red Hat Enterprise Linux 7,
1498              DISA recognizes this configuration baseline as applicable to the
1499              operating  system tier of Red Hat technologies that are based on
1500              Red Hat Enterprise Linux 7, such as:
1501
1502              - Red Hat Enterprise Linux Server -  Red  Hat  Enterprise  Linux
1503              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1504              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1505              7 image
1506
1507              Warning:  The installation and use of a Graphical User Interface
1508              (GUI) increases your attack vector and  decreases  your  overall
1509              security  posture.  If your Information Systems Security Officer
1510              (ISSO) lacks a documented operational requirement for a  graphi‐
1511              cal user interface, please consider using the standard DISA STIG
1512              for Red Hat Enterprise Linux 7 profile.
1513
1514
1515
1516
1517

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 8

1519       Source Datastream:  ssg-rhel8-ds.xml
1520
1521       The Guide to the Secure Configuration of Red Hat Enterprise Linux 8  is
1522       broken  into  'profiles', groupings of security settings that correlate
1523       to a known policy. Available profiles are:
1524
1525
1526
1527       ANSSI-BP-028 (enhanced)
1528
1529              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
1530              hanced
1531
1532              This  profile contains configurations that align to ANSSI-BP-028
1533              at the enhanced hardening level.
1534
1535              ANSSI is the French National Information  Security  Agency,  and
1536              stands for Agence nationale de la sécurité des systèmes d'infor‐
1537              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
1538              GNU/Linux systems.
1539
1540              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
1541              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1542              securite-relatives-a-un-systeme-gnulinux/
1543
1544
1545       DRAFT - ANSSI-BP-028 (high)
1546
1547              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1548              file_anssi_bp28_high
1549
1550              This profile contains configurations that align to  ANSSI-BP-028
1551              at the high hardening level.
1552
1553              ANSSI  is  the  French National Information Security Agency, and
1554              stands for Agence nationale de la sécurité des systèmes d'infor‐
1555              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
1556              GNU/Linux systems.
1557
1558              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1559              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1560              securite-relatives-a-un-systeme-gnulinux/
1561
1562
1563       ANSSI-BP-028 (intermediary)
1564
1565              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
1566              termediary
1567
1568              This  profile contains configurations that align to ANSSI-BP-028
1569              at the intermediary hardening level.
1570
1571              ANSSI is the French National Information  Security  Agency,  and
1572              stands for Agence nationale de la sécurité des systèmes d'infor‐
1573              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
1574              GNU/Linux systems.
1575
1576              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
1577              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1578              securite-relatives-a-un-systeme-gnulinux/
1579
1580
1581       ANSSI-BP-028 (minimal)
1582
1583              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1584              file_anssi_bp28_minimal
1585
1586              This profile contains configurations that align to  ANSSI-BP-028
1587              at the minimal hardening level.
1588
1589              ANSSI  is  the  French National Information Security Agency, and
1590              stands for Agence nationale de la sécurité des systèmes d'infor‐
1591              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
1592              GNU/Linux systems.
1593
1594              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1595              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1596              securite-relatives-a-un-systeme-gnulinux/
1597
1598
1599       CIS Red Hat Enterprise Linux 8 Benchmark
1600
1601              Profile ID:  xccdf_org.ssgproject.content_profile_cis
1602
1603              This profile defines a baseline that aligns to  the  Center  for
1604              Internet  Security®  Red  Hat  Enterprise  Linux  8  Benchmark™,
1605              v1.0.0, released 09-30-2019.
1606
1607              This profile includes Center for Internet Security® Red Hat  En‐
1608              terprise Linux 8 CIS Benchmarks™ content.
1609
1610
1611       Criminal Justice Information Services (CJIS) Security Policy
1612
1613              Profile ID:  xccdf_org.ssgproject.content_profile_cjis
1614
1615              This  profile is derived from FBI's CJIS v5.4 Security Policy. A
1616              copy of this policy can be found at the CJIS Security Policy Re‐
1617              source Center:
1618
1619              https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
1620              center
1621
1622
1623       Unclassified Information in Non-federal Information Systems and Organi‐
1624       zations (NIST 800-171)
1625
1626              Profile ID:  xccdf_org.ssgproject.content_profile_cui
1627
1628              From  NIST  800-171, Section 2.2: Security requirements for pro‐
1629              tecting the confidentiality of  CUI  in  nonfederal  information
1630              systems  and  organizations  have  a well-defined structure that
1631              consists of:
1632
1633              (i) a basic security requirements section; (ii) a derived  secu‐
1634              rity requirements section.
1635
1636              The  basic security requirements are obtained from FIPS Publica‐
1637              tion 200, which provides the high-level and fundamental security
1638              requirements  for  federal  information and information systems.
1639              The derived security requirements, which  supplement  the  basic
1640              security  requirements,  are taken from the security controls in
1641              NIST Special Publication 800-53.
1642
1643              This profile configures Red Hat Enterprise Linux 8 to  the  NIST
1644              Special Publication 800-53 controls identified for securing Con‐
1645              trolled Unclassified Information (CUI)."
1646
1647
1648       Australian Cyber Security Centre (ACSC) Essential Eight
1649
1650              Profile ID:  xccdf_org.ssgproject.content_profile_e8
1651
1652              This profile contains configuration checks for  Red  Hat  Enter‐
1653              prise Linux 8 that align to the Australian Cyber Security Centre
1654              (ACSC) Essential Eight.
1655
1656              A copy of the Essential Eight in Linux Environments guide can be
1657              found at the ACSC website:
1658
1659              https://www.cyber.gov.au/acsc/view-all-content/publica
1660              tions/hardening-linux-workstations-and-servers
1661
1662
1663       Health Insurance Portability and Accountability Act (HIPAA)
1664
1665              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
1666
1667              The HIPAA Security Rule establishes U.S. national  standards  to
1668              protect individuals’ electronic personal health information that
1669              is created, received, used, or maintained by a  covered  entity.
1670              The  Security Rule requires appropriate administrative, physical
1671              and technical safeguards to ensure the  confidentiality,  integ‐
1672              rity, and security of electronic protected health information.
1673
1674              This  profile configures Red Hat Enterprise Linux 8 to the HIPAA
1675              Security Rule identified for securing  of  electronic  protected
1676              health information.  Use of this profile in no way guarantees or
1677              makes claims against legal compliance against the HIPAA Security
1678              Rule(s).
1679
1680
1681       Australian Cyber Security Centre (ACSC) ISM Official
1682
1683              Profile ID:  xccdf_org.ssgproject.content_profile_ism_o
1684
1685              This  profile  contains  configuration checks for Red Hat Enter‐
1686              prise Linux 8 that align to the Australian Cyber Security Centre
1687              (ACSC)  Information Security Manual (ISM) with the applicability
1688              marking of OFFICIAL.
1689
1690              The ISM uses a risk-based approach to cyber security. This  pro‐
1691              file provides a guide to aligning Red Hat Enterprise Linux secu‐
1692              rity controls with the ISM, which can be used to select controls
1693              specific to an organisation's security posture and risk profile.
1694
1695              A copy of the ISM can be found at the ACSC website:
1696
1697              https://www.cyber.gov.au/ism
1698
1699
1700       Protection Profile for General Purpose Operating Systems
1701
1702              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
1703
1704              This  profile  reflects mandatory configuration controls identi‐
1705              fied in the NIAP Configuration Annex to the  Protection  Profile
1706              for  General  Purpose Operating Systems (Protection Profile Ver‐
1707              sion 4.2.1).
1708
1709              This configuration profile is consistent with CNSSI-1253,  which
1710              requires  U.S.  National  Security  Systems to adhere to certain
1711              configuration parameters. Accordingly, this  configuration  pro‐
1712              file is suitable for use in U.S. National Security Systems.
1713
1714
1715       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
1716
1717              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
1718
1719              Ensures  PCI-DSS  v3.2.1 security configuration settings are ap‐
1720              plied.
1721
1722
1723       [DRAFT] DISA STIG for Red  Hat  Enterprise  Linux  Virtualization  Host
1724       (RHELH)
1725
1726              Profile ID:  xccdf_org.ssgproject.content_profile_rhelh-stig
1727
1728              This *draft* profile contains configuration checks that align to
1729              the DISA STIG for Red Hat Enterprise Linux  Virtualization  Host
1730              (RHELH).
1731
1732
1733       VPP  -  Protection Profile for Virtualization v. 1.0 for Red Hat Enter‐
1734       prise Linux Hypervisor (RHELH)
1735
1736              Profile ID:  xccdf_org.ssgproject.content_profile_rhelh-vpp
1737
1738              This compliance profile reflects the core set  of  security  re‐
1739              lated  configuration  settings  for deployment of Red Hat Enter‐
1740              prise Linux Hypervisor (RHELH) 7.x into U.S.  Defense,  Intelli‐
1741              gence, and Civilian agencies.  Development partners and sponsors
1742              include the U.S. National Institute of Standards and  Technology
1743              (NIST),  U.S.  Department  of  Defense,  the  National  Security
1744              Agency, and Red Hat.
1745
1746              This baseline implements  configuration  requirements  from  the
1747              following sources:
1748
1749              -  Committee  on  National Security Systems Instruction No. 1253
1750              (CNSSI 1253) - NIST 800-53 control selections for  MODERATE  im‐
1751              pact systems (NIST 800-53) - U.S. Government Configuration Base‐
1752              line (USGCB) - NIAP Protection Profile for  Virtualization  v1.0
1753              (VPP v1.0)
1754
1755              For  any  differing  configuration  requirements,  e.g. password
1756              lengths, the stricter security setting was chosen. Security  Re‐
1757              quirement  Traceability Guides (RTMs) and sample System Security
1758              Configuration Guides are provided via  the  scap-security-guide-
1759              docs package.
1760
1761              This  profile  reflects U.S. Government consensus content and is
1762              developed through the ComplianceAsCode  project,  championed  by
1763              the  National Security Agency. Except for differences in format‐
1764              ting to accommodate publishing processes, this  profile  mirrors
1765              ComplianceAsCode content as minor divergences, such as bugfixes,
1766              work through the consensus and release processes.
1767
1768
1769       Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
1770
1771              Profile ID:  xccdf_org.ssgproject.content_profile_rht-ccp
1772
1773              This profile contains the minimum security  relevant  configura‐
1774              tion settings recommended by Red Hat, Inc for Red Hat Enterprise
1775              Linux 8 instances deployed by Red Hat Certified Cloud Providers.
1776
1777
1778       Standard System Security Profile for Red Hat Enterprise Linux 8
1779
1780              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1781
1782              This profile contains rules to ensure standard security baseline
1783              of  a Red Hat Enterprise Linux 8 system. Regardless of your sys‐
1784              tem's workload all of these checks should pass.
1785
1786
1787       DISA STIG for Red Hat Enterprise Linux 8
1788
1789              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1790
1791              This profile contains configuration checks  that  align  to  the
1792              DISA STIG for Red Hat Enterprise Linux 8 V1R2.
1793
1794              In  addition  to being applicable to Red Hat Enterprise Linux 8,
1795              DISA recognizes this configuration baseline as applicable to the
1796              operating  system tier of Red Hat technologies that are based on
1797              Red Hat Enterprise Linux 8, such as:
1798
1799              - Red Hat Enterprise Linux Server -  Red  Hat  Enterprise  Linux
1800              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1801              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1802              8 image
1803
1804
1805       DISA STIG with GUI for Red Hat Enterprise Linux 8
1806
1807              Profile ID:  xccdf_org.ssgproject.content_profile_stig_gui
1808
1809              This  profile  contains  configuration  checks that align to the
1810              DISA STIG with GUI for Red Hat Enterprise Linux 8 V1R2.
1811
1812              In addition to being applicable to Red Hat Enterprise  Linux  8,
1813              DISA recognizes this configuration baseline as applicable to the
1814              operating system tier of Red Hat technologies that are based  on
1815              Red Hat Enterprise Linux 8, such as:
1816
1817              -  Red  Hat  Enterprise  Linux Server - Red Hat Enterprise Linux
1818              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1819              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1820              8 image
1821
1822              Warning: The installation and use of a Graphical User  Interface
1823              (GUI)  increases  your  attack vector and decreases your overall
1824              security posture. If your Information Systems  Security  Officer
1825              (ISSO)  lacks a documented operational requirement for a graphi‐
1826              cal user interface, please consider using the standard DISA STIG
1827              for Red Hat Enterprise Linux 8 profile.
1828
1829
1830
1831
1832

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 9

1834       Source Datastream:  ssg-rhel9-ds.xml
1835
1836       The  Guide to the Secure Configuration of Red Hat Enterprise Linux 9 is
1837       broken into 'profiles', groupings of security settings  that  correlate
1838       to a known policy. Available profiles are:
1839
1840
1841
1842       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 9
1843
1844              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
1845
1846              Ensures  PCI-DSS  v3.2.1 security configuration settings are ap‐
1847              plied.
1848
1849
1850
1851
1852

Profiles in Guide to the Secure Configuration of Red Hat OpenStack Platform 10

1854
1855       Source Datastream:  ssg-rhosp10-ds.xml
1856
1857       The  Guide to the Secure Configuration of Red Hat OpenStack Platform 10
1858       is broken into 'profiles', groupings of security settings  that  corre‐
1859       late to a known policy. Available profiles are:
1860
1861
1862
1863       [DRAFT]  Controlled  Unclassified Infomration (CUI) Profile for Red Hat
1864       OpenStack Plaform 10
1865
1866              Profile ID:  xccdf_org.ssgproject.content_profile_cui
1867
1868              These are the controls for scanning against CUI for rhosp10
1869
1870
1871       [DRAFT] STIG for Red Hat OpenStack Plaform 10
1872
1873              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1874
1875              Controls for scanning against classified STIG for rhosp10
1876
1877
1878
1879
1880

Profiles in Guide to the Secure Configuration of Red Hat OpenStack Platform 13

1882
1883       Source Datastream:  ssg-rhosp13-ds.xml
1884
1885       The  Guide to the Secure Configuration of Red Hat OpenStack Platform 13
1886       is broken into 'profiles', groupings of security settings  that  corre‐
1887       late to a known policy. Available profiles are:
1888
1889
1890
1891       RHOSP STIG
1892
1893              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1894
1895              Sample profile description.
1896
1897
1898
1899
1900

Profiles in Guide to the Secure Configuration of Red Hat Virtualization 4

1902       Source Datastream:  ssg-rhv4-ds.xml
1903
1904       The  Guide  to  the Secure Configuration of Red Hat Virtualization 4 is
1905       broken into 'profiles', groupings of security settings  that  correlate
1906       to a known policy. Available profiles are:
1907
1908
1909
1910       PCI-DSS v3.2.1 Control Baseline for Red Hat Virtualization Host (RHVH)
1911
1912              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
1913
1914              Ensures  PCI-DSS  v3.2.1 security configuration settings are ap‐
1915              plied.
1916
1917
1918       [DRAFT] DISA STIG for Red Hat Virtualization Host (RHVH)
1919
1920              Profile ID:  xccdf_org.ssgproject.content_profile_rhvh-stig
1921
1922              This *draft* profile contains configuration checks that align to
1923              the DISA STIG for Red Hat Virtualization Host (RHVH).
1924
1925
1926       VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Virtual‐
1927       ization Host (RHVH)
1928
1929              Profile ID:  xccdf_org.ssgproject.content_profile_rhvh-vpp
1930
1931              This compliance profile reflects the core set  of  security  re‐
1932              lated  configuration settings for deployment of Red Hat Virtual‐
1933              ization Host (RHVH) 4.x into  U.S.  Defense,  Intelligence,  and
1934              Civilian  agencies.   Development  partners and sponsors include
1935              the U.S. National Institute of Standards and Technology  (NIST),
1936              U.S.  Department  of  Defense, the National Security Agency, and
1937              Red Hat.
1938
1939              This baseline implements  configuration  requirements  from  the
1940              following sources:
1941
1942              -  Committee  on  National Security Systems Instruction No. 1253
1943              (CNSSI 1253) - NIST 800-53 control selections for  MODERATE  im‐
1944              pact systems (NIST 800-53) - U.S. Government Configuration Base‐
1945              line (USGCB) - NIAP Protection Profile for  Virtualization  v1.0
1946              (VPP v1.0)
1947
1948              For  any  differing  configuration  requirements,  e.g. password
1949              lengths, the stricter security setting was chosen. Security  Re‐
1950              quirement  Traceability Guides (RTMs) and sample System Security
1951              Configuration Guides are provided via  the  scap-security-guide-
1952              docs package.
1953
1954              This  profile  reflects U.S. Government consensus content and is
1955              developed through the ComplianceAsCode  project,  championed  by
1956              the  National Security Agency. Except for differences in format‐
1957              ting to accommodate publishing processes, this  profile  mirrors
1958              ComplianceAsCode content as minor divergences, such as bugfixes,
1959              work through the consensus and release processes.
1960
1961
1962
1963
1964

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 7

1966       Source Datastream:  ssg-sl7-ds.xml
1967
1968       The Guide to the Secure Configuration of Red Hat Enterprise Linux 7  is
1969       broken  into  'profiles', groupings of security settings that correlate
1970       to a known policy. Available profiles are:
1971
1972
1973
1974       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
1975
1976              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
1977
1978              Ensures PCI-DSS v3.2.1 security configuration settings  are  ap‐
1979              plied.
1980
1981
1982       Standard System Security Profile for Red Hat Enterprise Linux 7
1983
1984              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1985
1986              This profile contains rules to ensure standard security baseline
1987              of a Red Hat Enterprise Linux 7 system. Regardless of your  sys‐
1988              tem's workload all of these checks should pass.
1989
1990
1991
1992
1993

Profiles in Guide to the Secure Configuration of SUSE Linux Enterprise 12

1995       Source Datastream:  ssg-sle12-ds.xml
1996
1997       The  Guide  to  the Secure Configuration of SUSE Linux Enterprise 12 is
1998       broken into 'profiles', groupings of security settings  that  correlate
1999       to a known policy. Available profiles are:
2000
2001
2002
2003       Standard System Security Profile for SUSE Linux Enterprise 12
2004
2005              Profile ID:  xccdf_org.ssgproject.content_profile_standard
2006
2007              This profile contains rules to ensure standard security baseline
2008              of a SUSE Linux Enterprise 12 system. Regardless  of  your  sys‐
2009              tem's workload all of these checks should pass.
2010
2011
2012       DISA STIG for SUSE Linux Enterprise 12
2013
2014              Profile ID:  xccdf_org.ssgproject.content_profile_stig
2015
2016              This  profile  contains  configuration  checks that align to the
2017              DISA STIG for SUSE Linux Enterprise 12 V2R3.
2018
2019
2020
2021
2022

Profiles in Guide to the Secure Configuration of SUSE Linux Enterprise 15

2024       Source Datastream:  ssg-sle15-ds.xml
2025
2026       The Guide to the Secure Configuration of SUSE Linux  Enterprise  15  is
2027       broken  into  'profiles', groupings of security settings that correlate
2028       to a known policy. Available profiles are:
2029
2030
2031
2032       CIS SUSE Linux Enterprise 15 Benchmark
2033
2034              Profile ID:  xccdf_org.ssgproject.content_profile_cis
2035
2036              This baseline aligns to the Center for  Internet  Security  SUSE
2037              Linux Enterprise 15 Benchmark, v1.0.0, currently in draft.
2038
2039
2040       Standard System Security Profile for SUSE Linux Enterprise 15
2041
2042              Profile ID:  xccdf_org.ssgproject.content_profile_standard
2043
2044              This profile contains rules to ensure standard security baseline
2045              of a SUSE Linux Enterprise 15 system based off of the SUSE Hard‐
2046              ening  Guide.  Regardless of your system's workload all of these
2047              checks should pass.
2048
2049
2050       DISA STIG for SUSE Linux Enterprise 15
2051
2052              Profile ID:  xccdf_org.ssgproject.content_profile_stig
2053
2054              This profile contains configuration checks  that  align  to  the
2055              DISA STIG for SUSE Linux Enterprise 15 V1R2.
2056
2057
2058
2059
2060

Profiles in Guide to the Secure Configuration of Ubuntu 16.04

2062       Source Datastream:  ssg-ubuntu1604-ds.xml
2063
2064       The  Guide  to  the Secure Configuration of Ubuntu 16.04 is broken into
2065       'profiles', groupings of security settings that correlate  to  a  known
2066       policy. Available profiles are:
2067
2068
2069
2070       Profile for ANSSI DAT-NT28 Average (Intermediate) Level
2071
2072              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2073              file_anssi_np_nt28_average
2074
2075              This profile contains items for GNU/Linux installations  already
2076              protected by multiple higher level security stacks.
2077
2078
2079       Profile for ANSSI DAT-NT28 High (Enforced) Level
2080
2081              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2082              file_anssi_np_nt28_high
2083
2084              This profile contains items for GNU/Linux installations  storing
2085              sensitive  informations  that can be accessible from unauthenti‐
2086              cated or uncontroled networks.
2087
2088
2089       Profile for ANSSI DAT-NT28 Minimal Level
2090
2091              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2092              file_anssi_np_nt28_minimal
2093
2094              This profile contains items to be applied systematically.
2095
2096
2097       Profile for ANSSI DAT-NT28 Restrictive Level
2098
2099              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2100              file_anssi_np_nt28_restrictive
2101
2102              This profile contains items for GNU/Linux installations  exposed
2103              to unauthenticated flows or multiple sources.
2104
2105
2106       Standard System Security Profile for Ubuntu 16.04
2107
2108              Profile ID:  xccdf_org.ssgproject.content_profile_standard
2109
2110              This profile contains rules to ensure standard security baseline
2111              of an Ubuntu 16.04 system. Regardless of your system's  workload
2112              all of these checks should pass.
2113
2114
2115
2116
2117

Profiles in Guide to the Secure Configuration of Ubuntu 18.04

2119       Source Datastream:  ssg-ubuntu1804-ds.xml
2120
2121       The  Guide  to  the Secure Configuration of Ubuntu 18.04 is broken into
2122       'profiles', groupings of security settings that correlate  to  a  known
2123       policy. Available profiles are:
2124
2125
2126
2127       Profile for ANSSI DAT-NT28 Average (Intermediate) Level
2128
2129              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2130              file_anssi_np_nt28_average
2131
2132              This profile contains items for GNU/Linux installations  already
2133              protected by multiple higher level security stacks.
2134
2135
2136       Profile for ANSSI DAT-NT28 High (Enforced) Level
2137
2138              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2139              file_anssi_np_nt28_high
2140
2141              This profile contains items for GNU/Linux installations  storing
2142              sensitive  informations  that can be accessible from unauthenti‐
2143              cated or uncontroled networks.
2144
2145
2146       Profile for ANSSI DAT-NT28 Minimal Level
2147
2148              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2149              file_anssi_np_nt28_minimal
2150
2151              This profile contains items to be applied systematically.
2152
2153
2154       Profile for ANSSI DAT-NT28 Restrictive Level
2155
2156              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2157              file_anssi_np_nt28_restrictive
2158
2159              This profile contains items for GNU/Linux installations  exposed
2160              to unauthenticated flows or multiple sources.
2161
2162
2163       CIS Ubuntu 18.04 LTS Benchmark
2164
2165              Profile ID:  xccdf_org.ssgproject.content_profile_cis
2166
2167              This  baseline aligns to the Center for Internet Security Ubuntu
2168              18.04 LTS Benchmark, v1.0.0, released 08-13-2018.
2169
2170
2171       Standard System Security Profile for Ubuntu 18.04
2172
2173              Profile ID:  xccdf_org.ssgproject.content_profile_standard
2174
2175              This profile contains rules to ensure standard security baseline
2176              of  an Ubuntu 18.04 system. Regardless of your system's workload
2177              all of these checks should pass.
2178
2179
2180
2181
2182

Profiles in Guide to the Secure Configuration of Ubuntu 20.04

2184       Source Datastream:  ssg-ubuntu2004-ds.xml
2185
2186       The Guide to the Secure Configuration of Ubuntu 20.04  is  broken  into
2187       'profiles',  groupings  of  security settings that correlate to a known
2188       policy. Available profiles are:
2189
2190
2191
2192       Standard System Security Profile for Ubuntu 20.04
2193
2194              Profile ID:  xccdf_org.ssgproject.content_profile_standard
2195
2196              This profile contains rules to ensure standard security baseline
2197              of  an Ubuntu 20.04 system. Regardless of your system's workload
2198              all of these checks should pass.
2199
2200
2201
2202
2203

Profiles in Guide to the Secure Configuration of McAfee VirusScan Enterprise

2205       for Linux
2206       Source Datastream:  ssg-vsel-ds.xml
2207
2208       The  Guide  to  the Secure Configuration of McAfee VirusScan Enterprise
2209       for Linux is broken into 'profiles',  groupings  of  security  settings
2210       that correlate to a known policy. Available profiles are:
2211
2212
2213
2214       McAfee VirusScan Enterprise for Linux (VSEL) STIG
2215
2216              Profile ID:  xccdf_org.ssgproject.content_profile_stig
2217
2218              The  McAfee  VirusScan  Enterprise for Linux software provides a
2219              realtime virus scanner for Linux systems.
2220
2221
2222
2223
2224

Profiles in Guide to the Secure Configuration of WRLinux 1019

2226       Source Datastream:  ssg-wrlinux1019-ds.xml
2227
2228       The Guide to the Secure Configuration of WRLinux 1019  is  broken  into
2229       'profiles',  groupings  of  security settings that correlate to a known
2230       policy. Available profiles are:
2231
2232
2233
2234       Basic Profile for Embedded Systems
2235
2236              Profile ID:  xccdf_org.ssgproject.content_profile_basic-embedded
2237
2238              This profile contains items common to many  embedded  Linux  in‐
2239              stallations.   Regardless of your system's deployment objective,
2240              all of these checks should pass.
2241
2242
2243       DRAFT DISA STIG for Wind River Linux
2244
2245              Profile ID:  xccdf_org.ssgproject.content_profile_draft_stig_wr‐
2246              linux_disa
2247
2248              This  profile  contains  configuration  checks that align to the
2249              DISA STIG for Wind River Linux.  This profile is being developed
2250              under  the  DoD consensus model to become a STIG in coordination
2251              with DISA FSO.  What is the status of the Wind River Linux STIG?
2252              The  Wind  River Linux STIG is in development under the DoD con‐
2253              sensus model and Wind River has started the process to  get  ap‐
2254              proval  from DISA. However, in the absence of an approved SRG or
2255              STIG, vendor recommendations may be used  instead.  The  current
2256              contents  constitute  the  vendor recommendations at the time of
2257              the  product  release  containing  these  contents.   Note  that
2258              changes  are  expected  before  approval  is  granted, and those
2259              changes will be made available in future Wind River Linux  Secu‐
2260              rity  Profile  1019  RCPL releases.  More information, including
2261              the following, is available from the DISA FAQs  at  https://pub
2262              lic.cyber.mil/stigs/faqs/
2263
2264
2265
2266
2267

Profiles in Guide to the Secure Configuration of WRLinux 8

2269       Source Datastream:  ssg-wrlinux8-ds.xml
2270
2271       The Guide to the Secure Configuration of WRLinux 8 is broken into 'pro‐
2272       files', groupings of security settings that correlate to a  known  pol‐
2273       icy. Available profiles are:
2274
2275
2276
2277       Basic Profile for Embedded Systems
2278
2279              Profile ID:  xccdf_org.ssgproject.content_profile_basic-embedded
2280
2281              This  profile  contains  items common to many embedded Linux in‐
2282              stallations.  Regardless of your system's deployment  objective,
2283              all of these checks should pass.
2284
2285
2286
2287
2288
2289

EXAMPLES

2291       To  scan  your  system  utilizing the OpenSCAP utility against the ospp
2292       profile:
2293
2294       oscap  xccdf  eval  --profile  ospp  --results  /tmp/`hostname`-ssg-re‐
2295       sults.xml   --report   /tmp/`hostname`-ssg-results.html  --oval-results
2296       /usr/share/xml/scap/ssg/content/ssg-{product}-xccdf.xml
2297
2298       Additional  details  can  be  found  on   the   projects   wiki   page:
2299       https://www.github.com/OpenSCAP/scap-security-guide/wiki
2300
2301
2302

FILES

2304       /usr/share/xml/scap/ssg/content
2305              Houses SCAP content utilizing the following naming conventions:
2306
2307              SCAP Source Datastreams: ssg-{product}-ds.xml
2308
2309              CPE Dictionaries: ssg-{product}-cpe-dictionary.xml
2310
2311              CPE OVAL Content: ssg-{product}-cpe-oval.xml
2312
2313              OVAL Content: ssg-{product}-oval.xml
2314
2315              XCCDF Content: ssg-{product}-xccdf.xml
2316
2317       /usr/share/doc/scap-security-guide/guides/
2318              HTML versions of SSG profiles.
2319
2320       /usr/share/scap-security-guide/ansible/
2321              Contains Ansible Playbooks for SSG profiles.
2322
2323       /usr/share/scap-security-guide/bash/
2324              Contains Bash remediation scripts for SSG profiles.
2325
2326
2327

DEPLOYMENT TO U.S. CIVILIAN GOVERNMENT SYSTEMS

2329       SCAP  Security  Guide  content  is considered vendor (Red Hat) provided
2330       content.  Per guidance from the U.S. National  Institute  of  Standards
2331       and Technology (NIST), U.S. Government programs are allowed to use Ven‐
2332       dor produced SCAP content in absence of "Governmental Authority" check‐
2333       lists.           The           specific          NIST          verbage:
2334       http://web.nvd.nist.gov/view/ncp/repository/glossary?cid=1#Authority
2335
2336
2337

DEPLOYMENT TO U.S. MILITARY SYSTEMS

2339       DoD Directive (DoDD) 8500.1 requires that "all  IA  and  IA-enabled  IT
2340       products  incorporated into DoD information systems shall be configured
2341       in accordance with DoD-approved security configuration guidelines"  and
2342       tasks Defense Information Systems Agency (DISA) to "develop and provide
2343       security configuration guidance for IA and IA-enabled  IT  products  in
2344       coordination  with Director, NSA."  The output of this authority is the
2345       DISA Security Technical Implementation Guides, or STIGs. DISA FSO is in
2346       the  process  of  moving the STIGs towards the use of the NIST Security
2347       Content Automation Protocol (SCAP) in order  to  "automate"  compliance
2348       reporting of the STIGs.
2349
2350       Through  a common, shared vision, the SCAP Security Guide community en‐
2351       joys close collaboration directly with NSA,  NIST,  and  DISA  FSO.  As
2352       stated  in Section 1.1 of the Red Hat Enterprise Linux 6 STIG Overview,
2353       Version 1, Release 2, issued on 03-JUNE-2013:
2354
2355       "The consensus content  was  developed  using  an  open-source  project
2356       called  SCAP Security Guide. The project's website is https://www.open-
2357       scap.org/security-policies/scap-security-guide.  Except for differences
2358       in  formatting to accomodate the DISA STIG publishing process, the con‐
2359       tent of the Red Hat Enterprise Linux 6 STIG should mirror the SCAP  Se‐
2360       curity  Guide content with only minor divergence as updates from multi‐
2361       ple sources work through the consensus process."
2362
2363       The DoD STIG for Red Hat Enterprise Linux 7,  revision  V2R4,  was  re‐
2364       leased  in July 2019 Currently, the DoD Red Hat Enterprise Linux 7 STIG
2365       contains only XCCDF content and is available online: https://public.cy
2366       ber.mil/stigs/downloads/?_dl_facet_stigs=operating-systems%2Cunix-linux
2367
2368       Content published against the public.cyber.mil website is authoritative
2369       STIG content. The SCAP Security Guide project, as  noted  in  the  STIG
2370       overview, is considered upstream content. Unlike DISA FSO, the SCAP Se‐
2371       curity Guide project does publish OVAL automation  content.  Individual
2372       programs  and  C&A  evaluators make program-level determinations on the
2373       direct usage of the SCAP Security Guide.  Currently there is no blanket
2374       approval.
2375
2376
2377

SEE ALSO

2379       oscap(8)
2380
2381
2382

AUTHOR

2384       Please  direct all questions to the SSG mailing list: https://lists.fe
2385       dorahosted.org/mailman/listinfo/scap-security-guide
2386
2387
2388
2389version 1                         26 Jan 2013           scap-security-guide(8)
Impressum