1scap-security-guide(8)      System Manager's Manual     scap-security-guide(8)
2
3
4

NAME

6       SCAP-Security-Guide  - Delivers security guidance, baselines, and asso‐
7       ciated validation mechanisms utilizing the Security Content  Automation
8       Protocol (SCAP).
9
10
11

DESCRIPTION

13       The project provides practical security hardening advice and also links
14       it to compliance requirements in order to ease  deployment  activities,
15       such  as certification and accreditation. These include requirements in
16       the U.S. government (Federal, Defense, and Intelligence  Community)  as
17       well as of the financial services and health care industries. For exam‐
18       ple, high-level and widely-accepted policies such as NIST  800-53  pro‐
19       vides  prose  stating that System Administrators must audit "privileged
20       user actions," but do not define what "privileged actions" are. The SSG
21       bridges  the  gap  between generalized policy requirements and specific
22       implementation guidance, in SCAP formats to support automation whenever
23       possible.
24
25       The  projects  homepage  is located at: https://www.open-scap.org/secu
26       rity-policies/scap-security-guide
27
28
29

Profiles in Guide to the Secure Configuration of Alibaba Cloud Linux 2

31       Source Datastream:  ssg-alinux2-ds.xml
32
33       The Guide to the Secure Configuration of Alibaba Cloud Linux 2 is  bro‐
34       ken into 'profiles', groupings of security settings that correlate to a
35       known policy. Available profiles are:
36
37
38
39       CIS Aliyun Linux 2 Benchmark for Level 2
40
41              Profile ID:  xccdf_org.ssgproject.content_profile_cis
42
43              This profile defines a baseline that aligns  to  the  "Level  2"
44              configuration  from  the  Center  for  Internet Security® Aliyun
45              Linux 2 Benchmark™, v1.0.0, released 08-16-2019.
46
47              This profile includes Center for Internet Security® Aliyun Linux
48              2 CIS Benchmarks™ content.
49
50
51       CIS Aliyun Linux 2 Benchmark for Level 1
52
53              Profile ID:  xccdf_org.ssgproject.content_profile_cis_l1
54
55              This  profile  defines  a  baseline that aligns to the "Level 1"
56              configuration from the  Center  for  Internet  Security®  Aliyun
57              Linux 2 Benchmark™, v1.0.0, released 08-16-2019.
58
59              This profile includes Center for Internet Security® Aliyun Linux
60              2 CIS Benchmarks™ content.
61
62
63       Standard System Security Profile for Alibaba Cloud Linux 2
64
65              Profile ID:  xccdf_org.ssgproject.content_profile_standard
66
67              This profile contains rules to ensure standard security baseline
68              of  a  Alibaba Cloud Linux 2 system. Regardless of your system's
69              workload all of these checks should pass.
70
71
72
73
74

Profiles in Guide to the Secure Configuration of Alibaba Cloud Linux 3

76       Source Datastream:  ssg-alinux3-ds.xml
77
78       The Guide to the Secure Configuration of Alibaba Cloud Linux 3 is  bro‐
79       ken into 'profiles', groupings of security settings that correlate to a
80       known policy. Available profiles are:
81
82
83
84       CIS Benchmark for Alibaba Cloud Linux 3 for Level 2
85
86              Profile ID:  xccdf_org.ssgproject.content_profile_cis
87
88              This profile defines a baseline that aligns  to  the  "Level  2"
89              configuration  from  the  Center  for Internet Security® Alibaba
90              Cloud Linux 3 Benchmark™, v1.0.0, released 08-16-2019.
91
92              This profile includes  Center  for  Internet  Security®  Alibaba
93              Cloud Linux 3 Benchmark™ content.
94
95
96       CIS Benchmark for Alibaba Cloud Linux 3 for Level 1
97
98              Profile ID:  xccdf_org.ssgproject.content_profile_cis_l1
99
100              This  profile  defines  a  baseline that aligns to the "Level 1"
101              configuration from the Center  for  Internet  Security®  Alibaba
102              Cloud Linux 3 Benchmark™, v1.0.0, released 08-16-2019.
103
104              This  profile  includes  Center  for  Internet Security® Alibaba
105              Cloud Linux 3 Benchmark™ content.
106
107
108       Standard System Security Profile for Alibaba Cloud Linux 3
109
110              Profile ID:  xccdf_org.ssgproject.content_profile_standard
111
112              This profile contains rules to ensure standard security baseline
113              of  a  Alibaba Cloud Linux 3 system. Regardless of your system's
114              workload all of these checks should pass.
115
116
117
118
119

Profiles in Guide to the Secure Configuration of Anolis OS 8

121       Source Datastream:  ssg-anolis8-ds.xml
122
123       The Guide to the Secure Configuration of Anolis OS  8  is  broken  into
124       'profiles',  groupings  of  security settings that correlate to a known
125       policy. Available profiles are:
126
127
128
129       Standard System Security Profile for Anolis OS 8
130
131              Profile ID:  xccdf_org.ssgproject.content_profile_standard
132
133              This profile contains rules to ensure standard security baseline
134              of a Anolis OS 8 system.
135
136
137
138
139

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 7

141       Source Datastream:  ssg-centos7-ds.xml
142
143       The  Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
144       broken into 'profiles', groupings of security settings  that  correlate
145       to a known policy. Available profiles are:
146
147
148
149       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
150
151              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
152
153              Ensures  PCI-DSS  v3.2.1 security configuration settings are ap‐
154              plied.
155
156
157       Standard System Security Profile for Red Hat Enterprise Linux 7
158
159              Profile ID:  xccdf_org.ssgproject.content_profile_standard
160
161              This profile contains rules to ensure standard security baseline
162              of  a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
163              tem's workload all of these checks should pass.
164
165
166
167
168

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 8

170       Source Datastream:  ssg-centos8-ds.xml
171
172       The Guide to the Secure Configuration of Red Hat Enterprise Linux 8  is
173       broken  into  'profiles', groupings of security settings that correlate
174       to a known policy. Available profiles are:
175
176
177
178       ANSSI-BP-028 (enhanced)
179
180              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
181              hanced
182
183              This  profile contains configurations that align to ANSSI-BP-028
184              v1.2 at the enhanced hardening level.
185
186              ANSSI is the French National Information  Security  Agency,  and
187              stands for Agence nationale de la sécurité des systèmes d'infor‐
188              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
189              GNU/Linux systems.
190
191              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
192              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
193              securite-relatives-a-un-systeme-gnulinux/
194
195
196       ANSSI-BP-028 (high)
197
198              Profile          ID:           xccdf_org.ssgproject.content_pro‐
199              file_anssi_bp28_high
200
201              This profile contains configurations that align to  ANSSI-BP-028
202              v1.2 at the high hardening level.
203
204              ANSSI  is  the  French National Information Security Agency, and
205              stands for Agence nationale de la sécurité des systèmes d'infor‐
206              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
207              GNU/Linux systems.
208
209              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
210              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
211              securite-relatives-a-un-systeme-gnulinux/
212
213
214       ANSSI-BP-028 (intermediary)
215
216              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
217              termediary
218
219              This  profile contains configurations that align to ANSSI-BP-028
220              v1.2 at the intermediary hardening level.
221
222              ANSSI is the French National Information  Security  Agency,  and
223              stands for Agence nationale de la sécurité des systèmes d'infor‐
224              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
225              GNU/Linux systems.
226
227              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
228              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
229              securite-relatives-a-un-systeme-gnulinux/
230
231
232       ANSSI-BP-028 (minimal)
233
234              Profile          ID:           xccdf_org.ssgproject.content_pro‐
235              file_anssi_bp28_minimal
236
237              This profile contains configurations that align to  ANSSI-BP-028
238              v1.2 at the minimal hardening level.
239
240              ANSSI  is  the  French National Information Security Agency, and
241              stands for Agence nationale de la sécurité des systèmes d'infor‐
242              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
243              GNU/Linux systems.
244
245              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
246              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
247              securite-relatives-a-un-systeme-gnulinux/
248
249
250       CIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Server
251
252              Profile ID:  xccdf_org.ssgproject.content_profile_cis
253
254              This profile defines a baseline that aligns to the  "Level  2  -
255              Server" configuration from the Center for Internet Security® Red
256              Hat Enterprise Linux 8 Benchmark™, v2.0.0, released 2022-02-23.
257
258              This profile includes Center for Internet Security® Red Hat  En‐
259              terprise Linux 8 CIS Benchmarks™ content.
260
261
262       CIS Red Hat Enterprise Linux 8 Benchmark for Level 1 - Server
263
264              Profile ID:  xccdf_org.ssgproject.content_profile_cis_server_l1
265
266              This  profile  defines  a baseline that aligns to the "Level 1 -
267              Server" configuration from the Center for Internet Security® Red
268              Hat Enterprise Linux 8 Benchmark™, v2.0.0, released 2022-02-23.
269
270              This  profile includes Center for Internet Security® Red Hat En‐
271              terprise Linux 8 CIS Benchmarks™ content.
272
273
274       CIS Red Hat Enterprise Linux 8 Benchmark for Level 1 - Workstation
275
276              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
277              tion_l1
278
279              This  profile  defines  a baseline that aligns to the "Level 1 -
280              Workstation" configuration from the Center  for  Internet  Secu‐
281              rity®  Red  Hat  Enterprise Linux 8 Benchmark™, v2.0.0, released
282              2022-02-23.
283
284              This profile includes Center for Internet Security® Red Hat  En‐
285              terprise Linux 8 CIS Benchmarks™ content.
286
287
288       CIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Workstation
289
290              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
291              tion_l2
292
293              This profile defines a baseline that aligns to the  "Level  2  -
294              Workstation"  configuration  from  the Center for Internet Secu‐
295              rity® Red Hat Enterprise Linux 8  Benchmark™,  v2.0.0,  released
296              2022-02-23.
297
298              This  profile includes Center for Internet Security® Red Hat En‐
299              terprise Linux 8 CIS Benchmarks™ content.
300
301
302       Criminal Justice Information Services (CJIS) Security Policy
303
304              Profile ID:  xccdf_org.ssgproject.content_profile_cjis
305
306              This profile is derived from FBI's CJIS v5.4 Security Policy.  A
307              copy of this policy can be found at the CJIS Security Policy Re‐
308              source Center:
309
310              https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
311              center
312
313
314       Unclassified Information in Non-federal Information Systems and Organi‐
315       zations (NIST 800-171)
316
317              Profile ID:  xccdf_org.ssgproject.content_profile_cui
318
319              From NIST 800-171, Section 2.2: Security requirements  for  pro‐
320              tecting  the  confidentiality  of  CUI in nonfederal information
321              systems and organizations have  a  well-defined  structure  that
322              consists of:
323
324              (i)  a basic security requirements section; (ii) a derived secu‐
325              rity requirements section.
326
327              The basic security requirements are obtained from FIPS  Publica‐
328              tion 200, which provides the high-level and fundamental security
329              requirements for federal information  and  information  systems.
330              The  derived  security  requirements, which supplement the basic
331              security requirements, are taken from the security  controls  in
332              NIST Special Publication 800-53.
333
334              This  profile  configures Red Hat Enterprise Linux 8 to the NIST
335              Special Publication 800-53 controls identified for securing Con‐
336              trolled Unclassified Information (CUI)."
337
338
339       Australian Cyber Security Centre (ACSC) Essential Eight
340
341              Profile ID:  xccdf_org.ssgproject.content_profile_e8
342
343              This  profile  contains  configuration checks for Red Hat Enter‐
344              prise Linux 8 that align to the Australian Cyber Security Centre
345              (ACSC) Essential Eight.
346
347              A copy of the Essential Eight in Linux Environments guide can be
348              found at the ACSC website:
349
350              https://www.cyber.gov.au/acsc/view-all-content/publica
351              tions/hardening-linux-workstations-and-servers
352
353
354       Health Insurance Portability and Accountability Act (HIPAA)
355
356              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
357
358              The  HIPAA  Security Rule establishes U.S. national standards to
359              protect individuals’ electronic personal health information that
360              is  created,  received, used, or maintained by a covered entity.
361              The Security Rule requires appropriate administrative,  physical
362              and  technical  safeguards to ensure the confidentiality, integ‐
363              rity, and security of electronic protected health information.
364
365              This profile configures Red Hat Enterprise Linux 8 to the  HIPAA
366              Security  Rule  identified  for securing of electronic protected
367              health information.  Use of this profile in no way guarantees or
368              makes claims against legal compliance against the HIPAA Security
369              Rule(s).
370
371
372       Australian Cyber Security Centre (ACSC) ISM Official
373
374              Profile ID:  xccdf_org.ssgproject.content_profile_ism_o
375
376              This profile contains configuration checks for  Red  Hat  Enter‐
377              prise Linux 8 that align to the Australian Cyber Security Centre
378              (ACSC) Information Security Manual (ISM) with the  applicability
379              marking of OFFICIAL.
380
381              The  ISM uses a risk-based approach to cyber security. This pro‐
382              file provides a guide to aligning Red Hat Enterprise Linux secu‐
383              rity controls with the ISM, which can be used to select controls
384              specific to an organisation's security posture and risk profile.
385
386              A copy of the ISM can be found at the ACSC website:
387
388              https://www.cyber.gov.au/ism
389
390
391       Protection Profile for General Purpose Operating Systems
392
393              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
394
395              This profile reflects mandatory configuration  controls  identi‐
396              fied  in  the NIAP Configuration Annex to the Protection Profile
397              for General Purpose Operating Systems (Protection  Profile  Ver‐
398              sion 4.2.1).
399
400              This  configuration profile is consistent with CNSSI-1253, which
401              requires U.S. National Security Systems  to  adhere  to  certain
402              configuration  parameters.  Accordingly, this configuration pro‐
403              file is suitable for use in U.S. National Security Systems.
404
405
406       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
407
408              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
409
410              Ensures PCI-DSS v3.2.1 security configuration settings  are  ap‐
411              plied.
412
413
414       Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
415
416              Profile ID:  xccdf_org.ssgproject.content_profile_rht-ccp
417
418              This  profile  contains the minimum security relevant configura‐
419              tion settings recommended by Red Hat, Inc for Red Hat Enterprise
420              Linux 8 instances deployed by Red Hat Certified Cloud Providers.
421
422
423       Standard System Security Profile for Red Hat Enterprise Linux 8
424
425              Profile ID:  xccdf_org.ssgproject.content_profile_standard
426
427              This profile contains rules to ensure standard security baseline
428              of a Red Hat Enterprise Linux 8 system. Regardless of your  sys‐
429              tem's workload all of these checks should pass.
430
431
432       DISA STIG for Red Hat Enterprise Linux 8
433
434              Profile ID:  xccdf_org.ssgproject.content_profile_stig
435
436              This  profile  contains  configuration  checks that align to the
437              DISA STIG for Red Hat Enterprise Linux 8 V1R8.
438
439              In addition to being applicable to Red Hat Enterprise  Linux  8,
440              DISA recognizes this configuration baseline as applicable to the
441              operating system tier of Red Hat technologies that are based  on
442              Red Hat Enterprise Linux 8, such as:
443
444              -  Red  Hat  Enterprise  Linux Server - Red Hat Enterprise Linux
445              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
446              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
447              8 image
448
449
450       DISA STIG with GUI for Red Hat Enterprise Linux 8
451
452              Profile ID:  xccdf_org.ssgproject.content_profile_stig_gui
453
454              This profile contains configuration checks  that  align  to  the
455              DISA STIG with GUI for Red Hat Enterprise Linux 8 V1R8.
456
457              In  addition  to being applicable to Red Hat Enterprise Linux 8,
458              DISA recognizes this configuration baseline as applicable to the
459              operating  system tier of Red Hat technologies that are based on
460              Red Hat Enterprise Linux 8, such as:
461
462              - Red Hat Enterprise Linux Server -  Red  Hat  Enterprise  Linux
463              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
464              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
465              8 image
466
467              Warning:  The installation and use of a Graphical User Interface
468              (GUI) increases your attack vector and  decreases  your  overall
469              security  posture.  If your Information Systems Security Officer
470              (ISSO) lacks a documented operational requirement for a  graphi‐
471              cal user interface, please consider using the standard DISA STIG
472              for Red Hat Enterprise Linux 8 profile.
473
474
475
476
477

Profiles in Guide to the Secure Configuration of Chromium

479       Source Datastream:  ssg-chromium-ds.xml
480
481       The Guide to the Secure Configuration of Chromium is broken into  'pro‐
482       files',  groupings  of security settings that correlate to a known pol‐
483       icy. Available profiles are:
484
485
486
487       Upstream STIG for Google Chromium
488
489              Profile ID:  xccdf_org.ssgproject.content_profile_stig
490
491              This profile is developed under the DoD consensus model and DISA
492              FSO Vendor STIG process, serving as the upstream development en‐
493              vironment for the Google Chromium STIG.
494
495              As a result of the upstream/downstream relationship between  the
496              SCAP Security Guide project and the official DISA FSO STIG base‐
497              line, users should expect variance between SSG and DISA FSO con‐
498              tent.  For official DISA FSO STIG content, refer to https://pub
499              lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
500              rity%2Cbrowser-guidance.
501
502              While  this  profile  is packaged by Red Hat as part of the SCAP
503              Security Guide package, please note that commercial  support  of
504              this  SCAP content is NOT available. This profile is provided as
505              example SCAP content with no endorsement for suitability or pro‐
506              duction  readiness.  Support for this profile is provided by the
507              upstream SCAP Security Guide community on a  best-effort  basis.
508              The upstream project homepage is https://www.open-scap.org/secu
509              rity-policies/scap-security-guide/.
510
511
512
513
514

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 9

516       Source Datastream:  ssg-cs9-ds.xml
517
518       The Guide to the Secure Configuration of Red Hat Enterprise Linux 9  is
519       broken  into  'profiles', groupings of security settings that correlate
520       to a known policy. Available profiles are:
521
522
523
524       ANSSI-BP-028 (enhanced)
525
526              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
527              hanced
528
529              This  profile contains configurations that align to ANSSI-BP-028
530              at the enhanced hardening level.
531
532              ANSSI is the French National Information  Security  Agency,  and
533              stands for Agence nationale de la sécurité des systèmes d'infor‐
534              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
535              GNU/Linux systems.
536
537              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
538              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
539              securite-relatives-a-un-systeme-gnulinux/
540
541
542       ANSSI-BP-028 (high)
543
544              Profile          ID:           xccdf_org.ssgproject.content_pro‐
545              file_anssi_bp28_high
546
547              This profile contains configurations that align to  ANSSI-BP-028
548              at the high hardening level.
549
550              ANSSI  is  the  French National Information Security Agency, and
551              stands for Agence nationale de la sécurité des systèmes d'infor‐
552              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
553              GNU/Linux systems.
554
555              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
556              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
557              securite-relatives-a-un-systeme-gnulinux/
558
559
560       ANSSI-BP-028 (intermediary)
561
562              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
563              termediary
564
565              This  profile contains configurations that align to ANSSI-BP-028
566              at the intermediary hardening level.
567
568              ANSSI is the French National Information  Security  Agency,  and
569              stands for Agence nationale de la sécurité des systèmes d'infor‐
570              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
571              GNU/Linux systems.
572
573              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
574              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
575              securite-relatives-a-un-systeme-gnulinux/
576
577
578       ANSSI-BP-028 (minimal)
579
580              Profile          ID:           xccdf_org.ssgproject.content_pro‐
581              file_anssi_bp28_minimal
582
583              This profile contains configurations that align to  ANSSI-BP-028
584              at the minimal hardening level.
585
586              ANSSI  is  the  French National Information Security Agency, and
587              stands for Agence nationale de la sécurité des systèmes d'infor‐
588              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
589              GNU/Linux systems.
590
591              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
592              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
593              securite-relatives-a-un-systeme-gnulinux/
594
595
596       [DRAFT] CIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Server
597
598              Profile ID:  xccdf_org.ssgproject.content_profile_cis
599
600              This is a draft profile based on its RHEL8 version  for  experi‐
601              mental  purposes.   It  is  not  based  on the CIS benchmark for
602              RHEL9, because this one was not available at  time  of  the  re‐
603              lease.
604
605
606       [DRAFT] CIS Red Hat Enterprise Linux 9 Benchmark for Level 1 - Server
607
608              Profile ID:  xccdf_org.ssgproject.content_profile_cis_server_l1
609
610              This  is  a draft profile based on its RHEL8 version for experi‐
611              mental purposes.  It is not  based  on  the  CIS  benchmark  for
612              RHEL9,  because  this  one  was not available at time of the re‐
613              lease.
614
615
616       [DRAFT] CIS Red Hat Enterprise Linux 9 Benchmark for Level 1 - Worksta‐
617       tion
618
619              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
620              tion_l1
621
622              This is a draft profile based on its RHEL8 version  for  experi‐
623              mental  purposes.   It  is  not  based  on the CIS benchmark for
624              RHEL9, because this one was not available at  time  of  the  re‐
625              lease.
626
627
628       [DRAFT] CIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Worksta‐
629       tion
630
631              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
632              tion_l2
633
634              This  is  a draft profile based on its RHEL8 version for experi‐
635              mental purposes.  It is not  based  on  the  CIS  benchmark  for
636              RHEL9,  because  this  one  was not available at time of the re‐
637              lease.
638
639
640       [DRAFT] Unclassified Information in Non-federal Information Systems and
641       Organizations (NIST 800-171)
642
643              Profile ID:  xccdf_org.ssgproject.content_profile_cui
644
645              From  NIST  800-171, Section 2.2: Security requirements for pro‐
646              tecting the confidentiality of  CUI  in  nonfederal  information
647              systems  and  organizations  have  a well-defined structure that
648              consists of:
649
650              (i) a basic security requirements section; (ii) a derived  secu‐
651              rity requirements section.
652
653              The  basic security requirements are obtained from FIPS Publica‐
654              tion 200, which provides the high-level and fundamental security
655              requirements  for  federal  information and information systems.
656              The derived security requirements, which  supplement  the  basic
657              security  requirements,  are taken from the security controls in
658              NIST Special Publication 800-53.
659
660              This profile configures Red Hat Enterprise Linux 9 to  the  NIST
661              Special Publication 800-53 controls identified for securing Con‐
662              trolled Unclassified Information (CUI)."
663
664
665       Australian Cyber Security Centre (ACSC) Essential Eight
666
667              Profile ID:  xccdf_org.ssgproject.content_profile_e8
668
669              This profile contains configuration checks for  Red  Hat  Enter‐
670              prise Linux 9 that align to the Australian Cyber Security Centre
671              (ACSC) Essential Eight.
672
673              A copy of the Essential Eight in Linux Environments guide can be
674              found at the ACSC website:
675
676              https://www.cyber.gov.au/acsc/view-all-content/publica
677              tions/hardening-linux-workstations-and-servers
678
679
680       Health Insurance Portability and Accountability Act (HIPAA)
681
682              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
683
684              The HIPAA Security Rule establishes U.S. national  standards  to
685              protect individuals’ electronic personal health information that
686              is created, received, used, or maintained by a  covered  entity.
687              The  Security Rule requires appropriate administrative, physical
688              and technical safeguards to ensure the  confidentiality,  integ‐
689              rity, and security of electronic protected health information.
690
691              This  profile configures Red Hat Enterprise Linux 9 to the HIPAA
692              Security Rule identified for securing  of  electronic  protected
693              health information.  Use of this profile in no way guarantees or
694              makes claims against legal compliance against the HIPAA Security
695              Rule(s).
696
697
698       Australian Cyber Security Centre (ACSC) ISM Official
699
700              Profile ID:  xccdf_org.ssgproject.content_profile_ism_o
701
702              This  profile  contains  configuration checks for Red Hat Enter‐
703              prise Linux 9 that align to the Australian Cyber Security Centre
704              (ACSC)  Information Security Manual (ISM) with the applicability
705              marking of OFFICIAL.
706
707              The ISM uses a risk-based approach to cyber security. This  pro‐
708              file provides a guide to aligning Red Hat Enterprise Linux secu‐
709              rity controls with the ISM, which can be used to select controls
710              specific to an organisation's security posture and risk profile.
711
712              A copy of the ISM can be found at the ACSC website:
713
714              https://www.cyber.gov.au/ism
715
716
717       Protection Profile for General Purpose Operating Systems
718
719              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
720
721              This profile is part of Red Hat Enterprise Linux 9 Common Crite‐
722              ria Guidance documentation for Target  of  Evaluation  based  on
723              Protection  Profile for General Purpose Operating Systems (OSPP)
724              version 4.2.1 and Functional Package for SSH version 1.0.
725
726              Where appropriate, CNSSI 1253 or DoD-specific  values  are  used
727              for configuration, based on Configuration Annex to the OSPP.
728
729
730       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 9
731
732              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
733
734              Ensures  PCI-DSS  v3.2.1 security configuration settings are ap‐
735              plied.
736
737
738       [DRAFT] DISA STIG for Red Hat Enterprise Linux 9
739
740              Profile ID:  xccdf_org.ssgproject.content_profile_stig
741
742              This is a draft profile based on its RHEL8 version  for  experi‐
743              mental  purposes.   It  is not based on the DISA STIG for RHEL9,
744              because this one was not available at time of the release.
745
746              In addition to being applicable to Red Hat Enterprise  Linux  9,
747              DISA recognizes this configuration baseline as applicable to the
748              operating system tier of Red Hat technologies that are based  on
749              Red Hat Enterprise Linux 9, such as:
750
751              -  Red  Hat  Enterprise  Linux Server - Red Hat Enterprise Linux
752              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
753              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
754              9 image
755
756
757       [DRAFT] DISA STIG with GUI for Red Hat Enterprise Linux 9
758
759              Profile ID:  xccdf_org.ssgproject.content_profile_stig_gui
760
761              This is a draft profile based on its RHEL8 version  for  experi‐
762              mental  purposes.   It  is not based on the DISA STIG for RHEL9,
763              because this one was not available at time of the release.
764
765              In addition to being applicable to Red Hat Enterprise  Linux  9,
766              DISA recognizes this configuration baseline as applicable to the
767              operating system tier of Red Hat technologies that are based  on
768              Red Hat Enterprise Linux 9, such as:
769
770              -  Red  Hat  Enterprise  Linux Server - Red Hat Enterprise Linux
771              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
772              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
773              9 image
774
775              Warning: The installation and use of a Graphical User  Interface
776              (GUI)  increases  your  attack vector and decreases your overall
777              security posture. If your Information Systems  Security  Officer
778              (ISSO)  lacks a documented operational requirement for a graphi‐
779              cal user interface, please consider using the standard DISA STIG
780              for Red Hat Enterprise Linux 9 profile.
781
782
783
784
785

Profiles in Guide to the Secure Configuration of Debian 10

787       Source Datastream:  ssg-debian10-ds.xml
788
789       The Guide to the Secure Configuration of Debian 10 is broken into 'pro‐
790       files', groupings of security settings that correlate to a  known  pol‐
791       icy. Available profiles are:
792
793
794
795       Profile for ANSSI DAT-NT28 Average (Intermediate) Level
796
797              Profile          ID:           xccdf_org.ssgproject.content_pro‐
798              file_anssi_np_nt28_average
799
800              This profile contains items for GNU/Linux installations  already
801              protected by multiple higher level security stacks.
802
803
804       Profile for ANSSI DAT-NT28 High (Enforced) Level
805
806              Profile          ID:           xccdf_org.ssgproject.content_pro‐
807              file_anssi_np_nt28_high
808
809              This profile contains items for GNU/Linux installations  storing
810              sensitive  information  that  can be accessible from unauthenti‐
811              cated or uncontroled networks.
812
813
814       Profile for ANSSI DAT-NT28 Minimal Level
815
816              Profile          ID:           xccdf_org.ssgproject.content_pro‐
817              file_anssi_np_nt28_minimal
818
819              This profile contains items to be applied systematically.
820
821
822       Profile for ANSSI DAT-NT28 Restrictive Level
823
824              Profile          ID:           xccdf_org.ssgproject.content_pro‐
825              file_anssi_np_nt28_restrictive
826
827              This profile contains items for GNU/Linux installations  exposed
828              to unauthenticated flows or multiple sources.
829
830
831       Standard System Security Profile for Debian 10
832
833              Profile ID:  xccdf_org.ssgproject.content_profile_standard
834
835              This profile contains rules to ensure standard security baseline
836              of a Debian 10 system. Regardless of your system's workload  all
837              of these checks should pass.
838
839
840
841
842

Profiles in Guide to the Secure Configuration of Debian 11

844       Source Datastream:  ssg-debian11-ds.xml
845
846       The Guide to the Secure Configuration of Debian 11 is broken into 'pro‐
847       files', groupings of security settings that correlate to a  known  pol‐
848       icy. Available profiles are:
849
850
851
852       Profile for ANSSI DAT-NT28 Average (Intermediate) Level
853
854              Profile          ID:           xccdf_org.ssgproject.content_pro‐
855              file_anssi_np_nt28_average
856
857              This profile contains items for GNU/Linux installations  already
858              protected by multiple higher level security stacks.
859
860
861       Profile for ANSSI DAT-NT28 High (Enforced) Level
862
863              Profile          ID:           xccdf_org.ssgproject.content_pro‐
864              file_anssi_np_nt28_high
865
866              This profile contains items for GNU/Linux installations  storing
867              sensitive  information  that  can be accessible from unauthenti‐
868              cated or uncontroled networks.
869
870
871       Profile for ANSSI DAT-NT28 Minimal Level
872
873              Profile          ID:           xccdf_org.ssgproject.content_pro‐
874              file_anssi_np_nt28_minimal
875
876              This profile contains items to be applied systematically.
877
878
879       Profile for ANSSI DAT-NT28 Restrictive Level
880
881              Profile          ID:           xccdf_org.ssgproject.content_pro‐
882              file_anssi_np_nt28_restrictive
883
884              This profile contains items for GNU/Linux installations  exposed
885              to unauthenticated flows or multiple sources.
886
887
888       Standard System Security Profile for Debian 11
889
890              Profile ID:  xccdf_org.ssgproject.content_profile_standard
891
892              This profile contains rules to ensure standard security baseline
893              of a Debian 11 system. Regardless of your system's workload  all
894              of these checks should pass.
895
896
897
898
899

Profiles in Guide to the Secure Configuration of Amazon Elastic Kubernetes

901       Service
902       Source Datastream:  ssg-eks-ds.xml
903
904       The Guide to the Secure Configuration of Amazon Elastic Kubernetes Ser‐
905       vice  is  broken  into  'profiles', groupings of security settings that
906       correlate to a known policy. Available profiles are:
907
908
909
910       CIS Amazon Elastic Kubernetes Service (EKS) Benchmark - Node
911
912              Profile ID:  xccdf_org.ssgproject.content_profile_cis-node
913
914              This profile defines a baseline that aligns to  the  Center  for
915              Internet  Security®  Amazon  Elastic  Kubernetes  Service  (EKS)
916              Benchmark™, V1.0.1.
917
918              This profile includes Center for Internet Security® Amazon Elas‐
919              tic Kubernetes Service (EKS)™ content.
920
921              This profile is applicable to EKS 1.21 and greater.
922
923
924       CIS Amazon Elastic Kubernetes Service Benchmark - Platform
925
926              Profile ID:  xccdf_org.ssgproject.content_profile_cis
927
928              This  profile  defines  a baseline that aligns to the Center for
929              Internet  Security®  Amazon  Elastic  Kubernetes  Service  (EKS)
930              Benchmark™, V1.0.1.
931
932              This profile includes Center for Internet Security® Amazon Elas‐
933              tic Kubernetes Service (EKS)™ content.
934
935              This profile is applicable to EKS 1.21 and greater.
936
937
938
939
940

Profiles in Guide to the Secure Configuration of Fedora

942       Source Datastream:  ssg-fedora-ds.xml
943
944       The Guide to the Secure Configuration of Fedora is  broken  into  'pro‐
945       files',  groupings  of security settings that correlate to a known pol‐
946       icy. Available profiles are:
947
948
949
950       OSPP - Protection Profile for General Purpose Operating Systems
951
952              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
953
954              This profile reflects mandatory configuration  controls  identi‐
955              fied  in  the NIAP Configuration Annex to the Protection Profile
956              for General Purpose Operating Systems (Protection  Profile  Ver‐
957              sion 4.2).
958
959              As  Fedora  OS is moving target, this profile does not guarantee
960              to provide security levels required from  US  National  Security
961              Systems.  Main goal of the profile is to provide Fedora develop‐
962              ers with hardened environment similar to the one mandated by  US
963              National Security Systems.
964
965
966       PCI-DSS v3.2.1 Control Baseline for Fedora
967
968              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
969
970              Ensures  PCI-DSS  v3.2.1 related security configuration settings
971              are applied.
972
973
974       Standard System Security Profile for Fedora
975
976              Profile ID:  xccdf_org.ssgproject.content_profile_standard
977
978              This profile contains rules to ensure standard security baseline
979              of a Fedora system.  Regardless of your system's workload all of
980              these checks should pass.
981
982
983
984
985

Profiles in Guide to the Secure Configuration of Firefox

987       Source Datastream:  ssg-firefox-ds.xml
988
989       The Guide to the Secure Configuration of Firefox is broken  into  'pro‐
990       files',  groupings  of security settings that correlate to a known pol‐
991       icy. Available profiles are:
992
993
994
995       Mozilla Firefox STIG
996
997              Profile ID:  xccdf_org.ssgproject.content_profile_stig
998
999              This profile is developed under the DoD consensus model and DISA
1000              FSO Vendor STIG process, serving as the upstream development en‐
1001              vironment for the Firefox STIG.
1002
1003              As a result of the upstream/downstream relationship between  the
1004              SCAP Security Guide project and the official DISA FSO STIG base‐
1005              line, users should expect variance between SSG and DISA FSO con‐
1006              tent.  For official DISA FSO STIG content, refer to https://pub
1007              lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
1008              rity%2Cbrowser-guidance.
1009
1010              While  this  profile  is packaged by Red Hat as part of the SCAP
1011              Security Guide package, please note that commercial  support  of
1012              this  SCAP content is NOT available. This profile is provided as
1013              example SCAP content with no endorsement for suitability or pro‐
1014              duction  readiness.  Support for this profile is provided by the
1015              upstream SCAP Security Guide community on a  best-effort  basis.
1016              The upstream project homepage is https://www.open-scap.org/secu
1017              rity-policies/scap-security-guide/.
1018
1019
1020
1021
1022

Profiles in Guide to the Secure Configuration of Apple macOS 10.15

1024       Source Datastream:  ssg-macos1015-ds.xml
1025
1026       The Guide to the Secure Configuration of Apple macOS  10.15  is  broken
1027       into  'profiles',  groupings  of  security settings that correlate to a
1028       known policy. Available profiles are:
1029
1030
1031
1032       NIST 800-53 Moderate-Impact Baseline for Apple macOS 10.15 Catalina
1033
1034              Profile ID:  xccdf_org.ssgproject.content_profile_moderate
1035
1036              This compliance profile reflects the core set of Moderate-Impact
1037              Baseline  configuration  settings  for deployment of Apple macOS
1038              10.15 Catalina into U.S.  Defense,  Intelligence,  and  Civilian
1039              agencies.   Development  partners  and sponsors include the U.S.
1040              National Institute of Standards and Technology (NIST), U.S.  De‐
1041              partment of Defense, and the the National Security Agency.
1042
1043              This  baseline  implements  configuration  requirements from the
1044              following sources:
1045
1046              - NIST 800-53 control  selections  for  Moderate-Impact  systems
1047              (NIST 800-53)
1048
1049              For  any  differing  configuration  requirements,  e.g. password
1050              lengths, the stricter security setting was chosen. Security  Re‐
1051              quirement  Traceability Guides (RTMs) and sample System Security
1052              Configuration Guides are provided via  the  scap-security-guide-
1053              docs package.
1054
1055              This  profile  reflects U.S. Government consensus content and is
1056              developed through the ComplianceAsCode initiative, championed by
1057              the  National Security Agency. Except for differences in format‐
1058              ting to accommodate publishing processes, this  profile  mirrors
1059              ComplianceAsCode content as minor divergences, such as bugfixes,
1060              work through the consensus and release processes.
1061
1062
1063
1064
1065

Profiles in Guide to the Secure Configuration of Red Hat OpenShift Container

1067       Platform 4
1068       Source Datastream:  ssg-ocp4-ds.xml
1069
1070       The  Guide  to  the Secure Configuration of Red Hat OpenShift Container
1071       Platform 4 is broken into 'profiles', groupings  of  security  settings
1072       that correlate to a known policy. Available profiles are:
1073
1074
1075
1076       CIS Red Hat OpenShift Container Platform 4 Benchmark
1077
1078              Profile ID:  xccdf_org.ssgproject.content_profile_cis-node
1079
1080              This  profile  defines  a baseline that aligns to the Center for
1081              Internet Security® Red Hat OpenShift Container Platform 4 Bench‐
1082              mark™, V1.1.
1083
1084              This  profile  includes  Center  for  Internet Security® Red Hat
1085              OpenShift Container Platform 4 CIS Benchmarks™ content.
1086
1087              Note that this part of the profile is meant to run on the  Oper‐
1088              ating System that Red Hat OpenShift Container Platform 4 runs on
1089              top of.
1090
1091              This  profile  is  applicable  to  OpenShift  versions  4.6  and
1092              greater.
1093
1094
1095       CIS Red Hat OpenShift Container Platform 4 Benchmark
1096
1097              Profile ID:  xccdf_org.ssgproject.content_profile_cis
1098
1099              This  profile  defines  a baseline that aligns to the Center for
1100              Internet Security® Red Hat OpenShift Container Platform 4 Bench‐
1101              mark™, V1.1.
1102
1103              This  profile  includes  Center  for  Internet Security® Red Hat
1104              OpenShift Container Platform 4 CIS Benchmarks™ content.
1105
1106              Note that this part of the profile is meant to run on the  Plat‐
1107              form that Red Hat OpenShift Container Platform 4 runs on top of.
1108
1109              This  profile  is  applicable  to  OpenShift  versions  4.6  and
1110              greater.
1111
1112
1113       Australian Cyber Security Centre (ACSC) Essential Eight
1114
1115              Profile ID:  xccdf_org.ssgproject.content_profile_e8
1116
1117              This profile contains configuration checks for Red Hat OpenShift
1118              Container  Platform  that align to the Australian Cyber Security
1119              Centre (ACSC) Essential Eight.
1120
1121              A copy of the Essential Eight in Linux Environments guide can be
1122              found at the ACSC website:
1123
1124              https://www.cyber.gov.au/acsc/view-all-content/publica
1125              tions/hardening-linux-workstations-and-servers
1126
1127
1128       NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Node level
1129
1130              Profile ID:  xccdf_org.ssgproject.content_profile_high-node
1131
1132              This compliance profile reflects the  core  set  of  High-Impact
1133              Baseline  configuration settings for deployment of Red Hat Open‐
1134              Shift Container Platform into U.S.  Defense,  Intelligence,  and
1135              Civilian  agencies.   Development  partners and sponsors include
1136              the U.S. National Institute of Standards and Technology  (NIST),
1137              U.S.  Department  of  Defense, the National Security Agency, and
1138              Red Hat.
1139
1140              This baseline implements  configuration  requirements  from  the
1141              following sources:
1142
1143              -  NIST  800-53 control selections for High-Impact systems (NIST
1144              800-53)
1145
1146              For any  differing  configuration  requirements,  e.g.  password
1147              lengths,  the stricter security setting was chosen. Security Re‐
1148              quirement Traceability Guides (RTMs) and sample System  Security
1149              Configuration  Guides  are provided via the scap-security-guide-
1150              docs package.
1151
1152              This profile reflects U.S. Government consensus content  and  is
1153              developed through the ComplianceAsCode initiative, championed by
1154              the National Security Agency. Except for differences in  format‐
1155              ting  to  accommodate publishing processes, this profile mirrors
1156              ComplianceAsCode content as minor divergences, such as bugfixes,
1157              work through the consensus and release processes.
1158
1159
1160       NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Platform level
1161
1162              Profile ID:  xccdf_org.ssgproject.content_profile_high
1163
1164              This  compliance  profile  reflects  the core set of High-Impact
1165              Baseline configuration settings for deployment of Red Hat  Open‐
1166              Shift  Container  Platform  into U.S. Defense, Intelligence, and
1167              Civilian agencies.  Development partners  and  sponsors  include
1168              the  U.S. National Institute of Standards and Technology (NIST),
1169              U.S. Department of Defense, the National  Security  Agency,  and
1170              Red Hat.
1171
1172              This  baseline  implements  configuration  requirements from the
1173              following sources:
1174
1175              - NIST 800-53 control selections for High-Impact  systems  (NIST
1176              800-53)
1177
1178              For  any  differing  configuration  requirements,  e.g. password
1179              lengths, the stricter security setting was chosen. Security  Re‐
1180              quirement  Traceability Guides (RTMs) and sample System Security
1181              Configuration Guides are provided via  the  scap-security-guide-
1182              docs package.
1183
1184              This  profile  reflects U.S. Government consensus content and is
1185              developed through the ComplianceAsCode initiative, championed by
1186              the  National Security Agency. Except for differences in format‐
1187              ting to accommodate publishing processes, this  profile  mirrors
1188              ComplianceAsCode content as minor divergences, such as bugfixes,
1189              work through the consensus and release processes.
1190
1191
1192       NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level
1193
1194              Profile ID:  xccdf_org.ssgproject.content_profile_moderate-node
1195
1196              This compliance profile reflects the core set of Moderate-Impact
1197              Baseline  configuration settings for deployment of Red Hat Open‐
1198              Shift Container Platform into U.S.  Defense,  Intelligence,  and
1199              Civilian  agencies.   Development  partners and sponsors include
1200              the U.S. National Institute of Standards and Technology  (NIST),
1201              U.S.  Department  of  Defense, the National Security Agency, and
1202              Red Hat.
1203
1204              This baseline implements  configuration  requirements  from  the
1205              following sources:
1206
1207              -  NIST  800-53  control  selections for Moderate-Impact systems
1208              (NIST 800-53)
1209
1210              For any  differing  configuration  requirements,  e.g.  password
1211              lengths,  the stricter security setting was chosen. Security Re‐
1212              quirement Traceability Guides (RTMs) and sample System  Security
1213              Configuration  Guides  are provided via the scap-security-guide-
1214              docs package.
1215
1216              This profile reflects U.S. Government consensus content  and  is
1217              developed through the ComplianceAsCode initiative, championed by
1218              the National Security Agency. Except for differences in  format‐
1219              ting  to  accommodate publishing processes, this profile mirrors
1220              ComplianceAsCode content as minor divergences, such as bugfixes,
1221              work through the consensus and release processes.
1222
1223
1224       NIST  800-53  Moderate-Impact Baseline for Red Hat OpenShift - Platform
1225       level
1226
1227              Profile ID:  xccdf_org.ssgproject.content_profile_moderate
1228
1229              This compliance profile reflects the core set of Moderate-Impact
1230              Baseline  configuration settings for deployment of Red Hat Open‐
1231              Shift Container Platform into U.S.  Defense,  Intelligence,  and
1232              Civilian  agencies.   Development  partners and sponsors include
1233              the U.S. National Institute of Standards and Technology  (NIST),
1234              U.S.  Department  of  Defense, the National Security Agency, and
1235              Red Hat.
1236
1237              This baseline implements  configuration  requirements  from  the
1238              following sources:
1239
1240              -  NIST  800-53  control  selections for Moderate-Impact systems
1241              (NIST 800-53)
1242
1243              For any  differing  configuration  requirements,  e.g.  password
1244              lengths,  the stricter security setting was chosen. Security Re‐
1245              quirement Traceability Guides (RTMs) and sample System  Security
1246              Configuration  Guides  are provided via the scap-security-guide-
1247              docs package.
1248
1249              This profile reflects U.S. Government consensus content  and  is
1250              developed through the ComplianceAsCode initiative, championed by
1251              the National Security Agency. Except for differences in  format‐
1252              ting  to  accommodate publishing processes, this profile mirrors
1253              ComplianceAsCode content as minor divergences, such as bugfixes,
1254              work through the consensus and release processes.
1255
1256
1257       North  American Electric Reliability Corporation (NERC) Critical Infra‐
1258       structure Protection (CIP) cybersecurity standards profile for the  Red
1259       Hat OpenShift Container Platform - Node level
1260
1261              Profile ID:  xccdf_org.ssgproject.content_profile_nerc-cip-node
1262
1263              This  compliance  profile reflects a set of security recommenda‐
1264              tions for the usage of Red Hat OpenShift Container  Platform  in
1265              critical  infrastructure  in the energy sector. This follows the
1266              recommendations coming from the following CIP standards:
1267
1268              - CIP-002-5 - CIP-003-8 - CIP-004-6 - CIP-005-6  -  CIP-007-3  -
1269              CIP-007-6 - CIP-009-6
1270
1271
1272       North  American Electric Reliability Corporation (NERC) Critical Infra‐
1273       structure Protection (CIP) cybersecurity standards profile for the  Red
1274       Hat OpenShift Container Platform - Platform level
1275
1276              Profile ID:  xccdf_org.ssgproject.content_profile_nerc-cip
1277
1278              This  compliance  profile reflects a set of security recommenda‐
1279              tions for the usage of Red Hat OpenShift Container  Platform  in
1280              critical  infrastructure  in the energy sector. This follows the
1281              recommendations coming from the following CIP standards:
1282
1283              - CIP-002-5 - CIP-003-8 - CIP-004-6 - CIP-005-6  -  CIP-007-3  -
1284              CIP-007-6 - CIP-009-6
1285
1286
1287       PCI-DSS  v3.2.1  Control Baseline for Red Hat OpenShift Container Plat‐
1288       form 4
1289
1290              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss-node
1291
1292              Ensures PCI-DSS v3.2.1 security configuration settings  are  ap‐
1293              plied.
1294
1295
1296       PCI-DSS  v3.2.1  Control Baseline for Red Hat OpenShift Container Plat‐
1297       form 4
1298
1299              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
1300
1301              Ensures PCI-DSS v3.2.1 security configuration settings  are  ap‐
1302              plied.
1303
1304
1305
1306
1307

Profiles in Guide to the Secure Configuration of Oracle Linux 7

1309       Source Datastream:  ssg-ol7-ds.xml
1310
1311       The  Guide to the Secure Configuration of Oracle Linux 7 is broken into
1312       'profiles', groupings of security settings that correlate  to  a  known
1313       policy. Available profiles are:
1314
1315
1316
1317       ANSSI-BP-028 (enhanced)
1318
1319              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_nt28_en‐
1320              hanced
1321
1322              This profile contains configurations that align to  ANSSI-BP-028
1323              at the enhanced hardening level.
1324
1325              ANSSI  is  the  French National Information Security Agency, and
1326              stands for Agence nationale de la sécurité des systèmes d'infor‐
1327              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
1328              GNU/Linux systems.
1329
1330              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1331              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1332              securite-relatives-a-un-systeme-gnulinux/
1333
1334
1335       DRAFT - ANSSI-BP-028 (high)
1336
1337              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1338              file_anssi_nt28_high
1339
1340              This  profile contains configurations that align to ANSSI-BP-028
1341              at the high hardening level.
1342
1343              ANSSI is the French National Information  Security  Agency,  and
1344              stands for Agence nationale de la sécurité des systèmes d'infor‐
1345              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
1346              GNU/Linux systems.
1347
1348              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
1349              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1350              securite-relatives-a-un-systeme-gnulinux/
1351
1352
1353       ANSSI-BP-028 (intermediary)
1354
1355              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_nt28_in‐
1356              termediary
1357
1358              This profile contains configurations that align to  ANSSI-BP-028
1359              at the intermediary hardening level.
1360
1361              ANSSI  is  the  French National Information Security Agency, and
1362              stands for Agence nationale de la sécurité des systèmes d'infor‐
1363              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
1364              GNU/Linux systems.
1365
1366              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1367              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1368              securite-relatives-a-un-systeme-gnulinux/
1369
1370
1371       ANSSI-BP-028 (minimal)
1372
1373              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1374              file_anssi_nt28_minimal
1375
1376              This  profile contains configurations that align to ANSSI-BP-028
1377              at the minimal hardening level.
1378
1379              ANSSI is the French National Information  Security  Agency,  and
1380              stands for Agence nationale de la sécurité des systèmes d'infor‐
1381              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
1382              GNU/Linux systems.
1383
1384              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
1385              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1386              securite-relatives-a-un-systeme-gnulinux/
1387
1388
1389       Criminal Justice Information Services (CJIS) Security Policy
1390
1391              Profile ID:  xccdf_org.ssgproject.content_profile_cjis
1392
1393              This  profile is derived from FBI's CJIS v5.4 Security Policy. A
1394              copy of this policy can be found at the CJIS Security Policy Re‐
1395              source Center:
1396
1397              https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
1398              center
1399
1400
1401       Unclassified Information in Non-federal Information Systems and Organi‐
1402       zations (NIST 800-171)
1403
1404              Profile ID:  xccdf_org.ssgproject.content_profile_cui
1405
1406              From  NIST  800-171, Section 2.2: Security requirements for pro‐
1407              tecting the confidentiality of CUI  in  non-federal  information
1408              systems  and  organizations  have  a well-defined structure that
1409              consists of:
1410
1411              (i) a basic security requirements section; (ii) a derived  secu‐
1412              rity requirements section.
1413
1414              The  basic security requirements are obtained from FIPS Publica‐
1415              tion 200, which provides the high-level and fundamental security
1416              requirements  for  federal  information and information systems.
1417              The derived security requirements, which  supplement  the  basic
1418              security  requirements,  are taken from the security controls in
1419              NIST Special Publication 800-53.
1420
1421              This profile configures Oracle Linux 7 to the NIST Special  Pub‐
1422              lication  800-53 controls identified for securing Controlled Un‐
1423              classified Information (CUI).
1424
1425
1426       [DRAFT] Australian Cyber Security Centre (ACSC) Essential Eight
1427
1428              Profile ID:  xccdf_org.ssgproject.content_profile_e8
1429
1430              This profile contains configuration checks for  Oracle  Linux  7
1431              that align to the Australian Cyber Security Centre (ACSC) Essen‐
1432              tial Eight.
1433
1434              A copy of the Essential Eight in Linux Environments guide can be
1435              found at the ACSC website:
1436
1437              https://www.cyber.gov.au/acsc/view-all-content/publica
1438              tions/hardening-linux-workstations-and-servers
1439
1440
1441       Health Insurance Portability and Accountability Act (HIPAA)
1442
1443              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
1444
1445              The HIPAA Security Rule establishes U.S. national  standards  to
1446              protect individuals’ electronic personal health information that
1447              is created, received, used, or maintained by a  covered  entity.
1448              The  Security Rule requires appropriate administrative, physical
1449              and technical safeguards to ensure the  confidentiality,  integ‐
1450              rity, and security of electronic protected health information.
1451
1452              This  profile  configures  Oracle  Linux 7 to the HIPAA Security
1453              Rule identified for securing of electronic protected health  in‐
1454              formation.   Use  of  this profile in no way guarantees or makes
1455              claims against  legal  compliance  against  the  HIPAA  Security
1456              Rule(s).
1457
1458
1459       NIST National Checklist Program Security Guide
1460
1461              Profile ID:  xccdf_org.ssgproject.content_profile_ncp
1462
1463              This  compliance  profile  reflects the core set of security re‐
1464              lated configuration settings for deployment of  Oracle  Linux  7
1465              into  U.S.  Defense, Intelligence, and Civilian agencies. Devel‐
1466              opment partners and sponsors include the U.S. National Institute
1467              of  Standards and Technology (NIST), U.S. Department of Defense,
1468              the National Security Agency, and Red Hat.
1469
1470              This baseline implements  configuration  requirements  from  the
1471              following sources:
1472
1473              -  Committee  on  National Security Systems Instruction No. 1253
1474              (CNSSI 1253) - NIST Controlled  Unclassified  Information  (NIST
1475              800-171)  -  NIST  800-53 control selections for MODERATE impact
1476              systems (NIST 800-53) - U.S. Government  Configuration  Baseline
1477              (USGCB)  - NIAP Protection Profile for General Purpose Operating
1478              Systems v4.2.1 (OSPP v4.2.1) - DISA  Operating  System  Security
1479              Requirements Guide (OS SRG)
1480
1481              For  any  differing  configuration  requirements,  e.g. password
1482              lengths, the stricter security setting was chosen. Security  Re‐
1483              quirement  Traceability Guides (RTMs) and sample System Security
1484              Configuration Guides are provided via  the  scap-security-guide-
1485              docs package.
1486
1487              This  profile  reflects U.S. Government consensus content and is
1488              developed through the OpenSCAP/SCAP Security  Guide  initiative,
1489              championed  by  the National Security Agency. Except for differ‐
1490              ences in formatting to accommodate  publishing  processes,  this
1491              profile  mirrors  OpenSCAP/SCAP  Security Guide content as minor
1492              divergences, such as bugfixes, work through  the  consensus  and
1493              release processes.
1494
1495
1496       [DRAFT] Protection Profile for General Purpose Operating Systems
1497
1498              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
1499
1500              This  profile  reflects mandatory configuration controls identi‐
1501              fied in the NIAP Configuration Annex to the  Protection  Profile
1502              for  General  Purpose Operating Systems (Protection Profile Ver‐
1503              sion 4.2.1).
1504
1505              This configuration profile is consistent with CNSSI-1253,  which
1506              requires  U.S.  National  Security  Systems to adhere to certain
1507              configuration parameters. Accordingly, this  configuration  pro‐
1508              file is suitable for use in U.S. National Security Systems.
1509
1510
1511       PCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 7
1512
1513              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
1514
1515              Ensures  PCI-DSS  v3.2.1 related security configuration settings
1516              are applied.
1517
1518
1519       Security Profile of Oracle Linux 7 for SAP
1520
1521              Profile ID:  xccdf_org.ssgproject.content_profile_sap
1522
1523              This profile contains rules for Oracle Linux 7 Operating  System
1524              in  compliance  with  SAP note 2069760 and SAP Security Baseline
1525              Template version 1.9 Item I-8 and section  4.1.2.2.   Regardless
1526              of your system's workload all of these checks should pass.
1527
1528
1529       Standard System Security Profile for Oracle Linux 7
1530
1531              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1532
1533              This profile contains rules to ensure standard security baseline
1534              of Oracle Linux 7 system. Regardless of your  system's  workload
1535              all of these checks should pass.
1536
1537
1538       DISA STIG for Oracle Linux 7
1539
1540              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1541
1542              This  profile  contains  configuration  checks that align to the
1543              DISA STIG for Oracle Linux V2R8.
1544
1545
1546       DISA STIG with GUI for Oracle Linux 7
1547
1548              Profile ID:  xccdf_org.ssgproject.content_profile_stig_gui
1549
1550              This profile contains configuration checks  that  align  to  the
1551              DISA STIG with GUI for Oracle Linux V2R8.
1552
1553              Warning:  The installation and use of a Graphical User Interface
1554              (GUI) increases your attack vector and  decreases  your  overall
1555              security  posture.  If your Information Systems Security Officer
1556              (ISSO) lacks a documented operational requirement for a  graphi‐
1557              cal user interface, please consider using the standard DISA STIG
1558              for Oracle Linux 7 profile.
1559
1560
1561
1562
1563

Profiles in Guide to the Secure Configuration of Oracle Linux 8

1565       Source Datastream:  ssg-ol8-ds.xml
1566
1567       The Guide to the Secure Configuration of Oracle Linux 8 is broken  into
1568       'profiles',  groupings  of  security settings that correlate to a known
1569       policy. Available profiles are:
1570
1571
1572
1573       ANSSI-BP-028 (enhanced)
1574
1575              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
1576              hanced
1577
1578              This  profile contains configurations that align to ANSSI-BP-028
1579              v1.2 at the enhanced hardening level.
1580
1581              ANSSI is the French National Information  Security  Agency,  and
1582              stands for Agence nationale de la sécurité des systèmes d'infor‐
1583              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
1584              GNU/Linux systems.
1585
1586              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
1587              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1588              securite-relatives-a-un-systeme-gnulinux/
1589
1590
1591       ANSSI-BP-028 (high)
1592
1593              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1594              file_anssi_bp28_high
1595
1596              This profile contains configurations that align to  ANSSI-BP-028
1597              v1.2 at the high hardening level.
1598
1599              ANSSI  is  the  French National Information Security Agency, and
1600              stands for Agence nationale de la sécurité des systèmes d'infor‐
1601              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
1602              GNU/Linux systems.
1603
1604              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1605              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1606              securite-relatives-a-un-systeme-gnulinux/
1607
1608
1609       ANSSI-BP-028 (intermediary)
1610
1611              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
1612              termediary
1613
1614              This  profile contains configurations that align to ANSSI-BP-028
1615              v1.2 at the intermediary hardening level.
1616
1617              ANSSI is the French National Information  Security  Agency,  and
1618              stands for Agence nationale de la sécurité des systèmes d'infor‐
1619              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
1620              GNU/Linux systems.
1621
1622              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
1623              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1624              securite-relatives-a-un-systeme-gnulinux/
1625
1626
1627       ANSSI-BP-028 (minimal)
1628
1629              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1630              file_anssi_bp28_minimal
1631
1632              This profile contains configurations that align to  ANSSI-BP-028
1633              v1.2 at the minimal hardening level.
1634
1635              ANSSI  is  the  French National Information Security Agency, and
1636              stands for Agence nationale de la sécurité des systèmes d'infor‐
1637              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
1638              GNU/Linux systems.
1639
1640              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1641              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1642              securite-relatives-a-un-systeme-gnulinux/
1643
1644
1645       Criminal Justice Information Services (CJIS) Security Policy
1646
1647              Profile ID:  xccdf_org.ssgproject.content_profile_cjis
1648
1649              This profile is derived from FBI's CJIS v5.4 Security Policy.  A
1650              copy of this policy can be found at the CJIS Security Policy Re‐
1651              source Center:
1652
1653              https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
1654              center
1655
1656
1657       Unclassified Information in Non-federal Information Systems and Organi‐
1658       zations (NIST 800-171)
1659
1660              Profile ID:  xccdf_org.ssgproject.content_profile_cui
1661
1662              From NIST 800-171, Section 2.2: Security requirements  for  pro‐
1663              tecting  the  confidentiality  of CUI in non-federal information
1664              systems and organizations have  a  well-defined  structure  that
1665              consists of:
1666
1667              (i)  a basic security requirements section; (ii) a derived secu‐
1668              rity requirements section.
1669
1670              The basic security requirements are obtained from FIPS  Publica‐
1671              tion 200, which provides the high-level and fundamental security
1672              requirements for federal information  and  information  systems.
1673              The  derived  security  requirements, which supplement the basic
1674              security requirements, are taken from the security  controls  in
1675              NIST Special Publication 800-53.
1676
1677              This  profile configures Oracle Linux 8 to the NIST Special Pub‐
1678              lication 800-53 controls identified for securing Controlled  Un‐
1679              classified Information (CUI).
1680
1681
1682       [DRAFT] Australian Cyber Security Centre (ACSC) Essential Eight
1683
1684              Profile ID:  xccdf_org.ssgproject.content_profile_e8
1685
1686              This  profile  contains  configuration checks for Oracle Linux 8
1687              that align to the Australian Cyber Security Centre (ACSC) Essen‐
1688              tial Eight.
1689
1690              A copy of the Essential Eight in Linux Environments guide can be
1691              found at the ACSC website:
1692
1693              https://www.cyber.gov.au/acsc/view-all-content/publica
1694              tions/hardening-linux-workstations-and-servers
1695
1696
1697       Health Insurance Portability and Accountability Act (HIPAA)
1698
1699              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
1700
1701              The  HIPAA  Security Rule establishes U.S. national standards to
1702              protect individuals’ electronic personal health information that
1703              is  created,  received, used, or maintained by a covered entity.
1704              The Security Rule requires appropriate administrative,  physical
1705              and  technical  safeguards to ensure the confidentiality, integ‐
1706              rity, and security of electronic protected health information.
1707
1708              This profile configures Oracle Linux 8  to  the  HIPAA  Security
1709              Rule  identified for securing of electronic protected health in‐
1710              formation.  Use of this profile in no way  guarantees  or  makes
1711              claims  against  legal  compliance  against  the  HIPAA Security
1712              Rule(s).
1713
1714
1715       [DRAFT] Protection Profile for General Purpose Operating Systems
1716
1717              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
1718
1719              This profile reflects mandatory configuration  controls  identi‐
1720              fied  in  the NIAP Configuration Annex to the Protection Profile
1721              for General Purpose Operating Systems (Protection  Profile  Ver‐
1722              sion 4.2.1).
1723
1724              This  configuration profile is consistent with CNSSI-1253, which
1725              requires U.S. National Security Systems  to  adhere  to  certain
1726              configuration  parameters.  Accordingly, this configuration pro‐
1727              file is suitable for use in U.S. National Security Systems.
1728
1729
1730       PCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 8
1731
1732              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
1733
1734              Ensures PCI-DSS v3.2.1 related security  configuration  settings
1735              are applied.
1736
1737
1738       Standard System Security Profile for Oracle Linux 8
1739
1740              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1741
1742              This profile contains rules to ensure standard security baseline
1743              of Oracle Linux 8 system. Regardless of your  system's  workload
1744              all of these checks should pass.
1745
1746
1747       DISA STIG for Oracle Linux 8
1748
1749              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1750
1751              This  profile  contains  configuration  checks that align to the
1752              DISA STIG for Oracle Linux 8 V1R3.
1753
1754
1755       DISA STIG with GUI for Oracle Linux 8
1756
1757              Profile ID:  xccdf_org.ssgproject.content_profile_stig_gui
1758
1759              This profile contains configuration checks  that  align  to  the
1760              DISA STIG with GUI for Oracle Linux V1R3.
1761
1762              Warning:  The installation and use of a Graphical User Interface
1763              (GUI) increases your attack vector and  decreases  your  overall
1764              security  posture.  If your Information Systems Security Officer
1765              (ISSO) lacks a documented operational requirement for a  graphi‐
1766              cal user interface, please consider using the standard DISA STIG
1767              for Oracle Linux 8 profile.
1768
1769
1770
1771
1772

Profiles in Guide to the Secure Configuration of Oracle Linux 9

1774       Source Datastream:  ssg-ol9-ds.xml
1775
1776       The Guide to the Secure Configuration of Oracle Linux 9 is broken  into
1777       'profiles',  groupings  of  security settings that correlate to a known
1778       policy. Available profiles are:
1779
1780
1781
1782       ANSSI-BP-028 (enhanced)
1783
1784              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
1785              hanced
1786
1787              This  profile contains configurations that align to ANSSI-BP-028
1788              at the enhanced hardening level. ANSSI is  the  French  National
1789              Information  Security Agency, and stands for Agence nationale de
1790              la sécurité des systèmes d'information. ANSSI-BP-028 is  a  con‐
1791              figuration recommendation for GNU/Linux systems.
1792
1793              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
1794              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1795              securite-relatives-a-un-systeme-gnulinux/
1796
1797
1798       ANSSI-BP-028 (high)
1799
1800              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1801              file_anssi_bp28_high
1802
1803              This profile contains configurations that align to  ANSSI-BP-028
1804              at the high hardening level. ANSSI is the French National Infor‐
1805              mation Security Agency, and stands for Agence  nationale  de  la
1806              sécurité  des systèmes d'information. ANSSI-BP-028 is a configu‐
1807              ration recommendation for GNU/Linux systems.
1808
1809              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1810              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1811              securite-relatives-a-un-systeme-gnulinux/
1812
1813
1814       ANSSI-BP-028 (intermediary)
1815
1816              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
1817              termediary
1818
1819              This  profile contains configurations that align to ANSSI-BP-028
1820              at the intermediary hardening level. ANSSI  is  the  French  Na‐
1821              tional  Information  Security  Agency, and stands for Agence na‐
1822              tionale de la sécurité des systèmes d'information.  ANSSI-BP-028
1823              is a configuration recommendation for GNU/Linux systems.
1824
1825              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
1826              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1827              securite-relatives-a-un-systeme-gnulinux/
1828
1829
1830       ANSSI-BP-028 (minimal)
1831
1832              Profile          ID:           xccdf_org.ssgproject.content_pro‐
1833              file_anssi_bp28_minimal
1834
1835              This profile contains configurations that align to  ANSSI-BP-028
1836              at the minimal hardening level. ANSSI is the French National In‐
1837              formation Security Agency, and stands for Agence nationale de la
1838              sécurité  des systèmes d'information. ANSSI-BP-028 is a configu‐
1839              ration recommendation for GNU/Linux systems.
1840
1841              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
1842              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1843              securite-relatives-a-un-systeme-gnulinux/
1844
1845
1846       [DRAFT] Unclassified Information in Non-federal Information Systems and
1847       Organizations (NIST 800-171)
1848
1849              Profile ID:  xccdf_org.ssgproject.content_profile_cui
1850
1851              From  NIST  800-171, Section 2.2: Security requirements for pro‐
1852              tecting the confidentiality of  CUI  in  nonfederal  information
1853              systems  and  organizations  have  a well-defined structure that
1854              consists of:
1855
1856              (i) a basic security requirements section; (ii) a derived  secu‐
1857              rity requirements section.
1858
1859              The  basic security requirements are obtained from FIPS Publica‐
1860              tion 200, which provides the high-level and fundamental security
1861              requirements  for  federal  information and information systems.
1862              The derived security requirements, which  supplement  the  basic
1863              security  requirements,  are taken from the security controls in
1864              NIST Special Publication 800-53.
1865
1866              This profile configures Oracle Linux 9 to the NIST Special  Pub‐
1867              lication  800-53 controls identified for securing Controlled Un‐
1868              classified Information (CUI)."
1869
1870
1871       Australian Cyber Security Centre (ACSC) Essential Eight
1872
1873              Profile ID:  xccdf_org.ssgproject.content_profile_e8
1874
1875              This profile contains configuration checks for  Oracle  Linux  9
1876              that align to the Australian Cyber Security Centre (ACSC) Essen‐
1877              tial Eight.
1878
1879              A copy of the Essential Eight in Linux Environments guide can be
1880              found at the ACSC website:
1881
1882              https://www.cyber.gov.au/acsc/view-all-content/publica
1883              tions/hardening-linux-workstations-and-servers
1884
1885
1886       Health Insurance Portability and Accountability Act (HIPAA)
1887
1888              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
1889
1890              The HIPAA Security Rule establishes U.S. national  standards  to
1891              protect individuals’ electronic personal health information that
1892              is created, received, used, or maintained by a  covered  entity.
1893              The  Security Rule requires appropriate administrative, physical
1894              and technical safeguards to ensure the  confidentiality,  integ‐
1895              rity, and security of electronic protected health information.
1896
1897              This  profile  configures  Oracle  Linux 9 to the HIPAA Security
1898              Rule identified for securing of electronic protected health  in‐
1899              formation.   Use  of  this profile in no way guarantees or makes
1900              claims against  legal  compliance  against  the  HIPAA  Security
1901              Rule(s).
1902
1903
1904       [DRAFT] Protection Profile for General Purpose Operating Systems
1905
1906              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
1907
1908              This  profile is part of Oracle Linux 9 Common Criteria Guidance
1909              documentation for Target of Evaluation based on Protection  Pro‐
1910              file  for General Purpose Operating Systems (OSPP) version 4.2.1
1911              and Functional Package for SSH version 1.0.
1912
1913              Where appropriate, CNSSI 1253 or DoD-specific  values  are  used
1914              for configuration, based on Configuration Annex to the OSPP.
1915
1916
1917       PCI-DSS v3.2.1 Control Baseline for Oracle Linux 9
1918
1919              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
1920
1921              Ensures  PCI-DSS  v3.2.1 security configuration settings are ap‐
1922              plied.
1923
1924
1925       Standard System Security Profile for Oracle Linux 9
1926
1927              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1928
1929              This profile contains rules to ensure standard security baseline
1930              of  Oracle  Linux 9 system. Regardless of your system's workload
1931              all of these checks should pass.
1932
1933
1934       [DRAFT] DISA STIG for Oracle Linux 9
1935
1936              Profile ID:  xccdf_org.ssgproject.content_profile_stig
1937
1938              This is a draft profile based on its OL8 version for  experimen‐
1939              tal purposes.  It is not based on the DISA STIG for OL9, because
1940              this one was not available at time of the release.
1941
1942
1943       [DRAFT] DISA STIG with GUI for Oracle Linux 9
1944
1945              Profile ID:  xccdf_org.ssgproject.content_profile_stig_gui
1946
1947              This is a draft profile based on its OL8 version for  experimen‐
1948              tal purposes.  It is not based on the DISA STIG for OL9, because
1949              this one was not available at time of the release.
1950
1951              Warning: The installation and use of a Graphical User  Interface
1952              (GUI)  increases  your  attack vector and decreases your overall
1953              security posture. If your Information Systems  Security  Officer
1954              (ISSO)  lacks a documented operational requirement for a graphi‐
1955              cal user interface, please consider using the standard DISA STIG
1956              for Oracle Linux 9 profile.
1957
1958
1959
1960
1961

Profiles in Guide to the Secure Configuration of openSUSE

1963       Source Datastream:  ssg-opensuse-ds.xml
1964
1965       The  Guide to the Secure Configuration of openSUSE is broken into 'pro‐
1966       files', groupings of security settings that correlate to a  known  pol‐
1967       icy. Available profiles are:
1968
1969
1970
1971       Standard System Security Profile for openSUSE
1972
1973              Profile ID:  xccdf_org.ssgproject.content_profile_standard
1974
1975              This profile contains rules to ensure standard security baseline
1976              of an openSUSE system. Regardless of your system's workload  all
1977              of these checks should pass.
1978
1979
1980
1981
1982

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux

1984       CoreOS 4
1985       Source Datastream:  ssg-rhcos4-ds.xml
1986
1987       The Guide to the Secure  Configuration  of  Red  Hat  Enterprise  Linux
1988       CoreOS 4 is broken into 'profiles', groupings of security settings that
1989       correlate to a known policy. Available profiles are:
1990
1991
1992
1993       DRAFT - ANSSI-BP-028 (enhanced)
1994
1995              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
1996              hanced
1997
1998              This  profile contains configurations that align to ANSSI-BP-028
1999              at the enhanced hardening level.
2000
2001              ANSSI is the French National Information  Security  Agency,  and
2002              stands for Agence nationale de la sécurité des systèmes d'infor‐
2003              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
2004              GNU/Linux systems.
2005
2006              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
2007              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2008              securite-relatives-a-un-systeme-gnulinux/
2009
2010
2011       DRAFT - ANSSI-BP-028 (high)
2012
2013              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2014              file_anssi_bp28_high
2015
2016              This profile contains configurations that align to  ANSSI-BP-028
2017              at the high hardening level.
2018
2019              ANSSI  is  the  French National Information Security Agency, and
2020              stands for Agence nationale de la sécurité des systèmes d'infor‐
2021              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
2022              GNU/Linux systems.
2023
2024              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
2025              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2026              securite-relatives-a-un-systeme-gnulinux/
2027
2028
2029       DRAFT - ANSSI-BP-028 (intermediary)
2030
2031              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
2032              termediary
2033
2034              This  profile contains configurations that align to ANSSI-BP-028
2035              at the intermediary hardening level.
2036
2037              ANSSI is the French National Information  Security  Agency,  and
2038              stands for Agence nationale de la sécurité des systèmes d'infor‐
2039              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
2040              GNU/Linux systems.
2041
2042              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
2043              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2044              securite-relatives-a-un-systeme-gnulinux/
2045
2046
2047       DRAFT - ANSSI-BP-028 (minimal)
2048
2049              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2050              file_anssi_bp28_minimal
2051
2052              This profile contains configurations that align to  ANSSI-BP-028
2053              at the minimal hardening level.
2054
2055              ANSSI  is  the  French National Information Security Agency, and
2056              stands for Agence nationale de la sécurité des systèmes d'infor‐
2057              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
2058              GNU/Linux systems.
2059
2060              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
2061              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2062              securite-relatives-a-un-systeme-gnulinux/
2063
2064
2065       Australian Cyber Security Centre (ACSC) Essential Eight
2066
2067              Profile ID:  xccdf_org.ssgproject.content_profile_e8
2068
2069              This profile contains configuration checks for  Red  Hat  Enter‐
2070              prise  Linux  CoreOS that align to the Australian Cyber Security
2071              Centre (ACSC) Essential Eight.
2072
2073              A copy of the Essential Eight in Linux Environments guide can be
2074              found at the ACSC website:
2075
2076              https://www.cyber.gov.au/acsc/view-all-content/publica
2077              tions/hardening-linux-workstations-and-servers
2078
2079
2080       NIST 800-53 High-Impact Baseline for Red Hat Enterprise Linux CoreOS
2081
2082              Profile ID:  xccdf_org.ssgproject.content_profile_high
2083
2084              This compliance profile reflects the  core  set  of  High-Impact
2085              Baseline configuration settings for deployment of Red Hat Enter‐
2086              prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
2087              agencies.   Development  partners  and sponsors include the U.S.
2088              National Institute of Standards and Technology (NIST), U.S.  De‐
2089              partment of Defense, the National Security Agency, and Red Hat.
2090
2091              This  baseline  implements  configuration  requirements from the
2092              following sources:
2093
2094              - NIST 800-53 control selections for High-Impact  systems  (NIST
2095              800-53)
2096
2097              For  any  differing  configuration  requirements,  e.g. password
2098              lengths, the stricter security setting was chosen. Security  Re‐
2099              quirement  Traceability Guides (RTMs) and sample System Security
2100              Configuration Guides are provided via  the  scap-security-guide-
2101              docs package.
2102
2103              This  profile  reflects U.S. Government consensus content and is
2104              developed through the ComplianceAsCode initiative, championed by
2105              the  National Security Agency. Except for differences in format‐
2106              ting to accommodate publishing processes, this  profile  mirrors
2107              ComplianceAsCode content as minor divergences, such as bugfixes,
2108              work through the consensus and release processes.
2109
2110
2111       NIST 800-53 Moderate-Impact  Baseline  for  Red  Hat  Enterprise  Linux
2112       CoreOS
2113
2114              Profile ID:  xccdf_org.ssgproject.content_profile_moderate
2115
2116              This compliance profile reflects the core set of Moderate-Impact
2117              Baseline configuration settings for deployment of Red Hat Enter‐
2118              prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
2119              agencies.  Development partners and sponsors  include  the  U.S.
2120              National  Institute of Standards and Technology (NIST), U.S. De‐
2121              partment of Defense, the National Security Agency, and Red Hat.
2122
2123              This baseline implements  configuration  requirements  from  the
2124              following sources:
2125
2126              -  NIST  800-53  control  selections for Moderate-Impact systems
2127              (NIST 800-53)
2128
2129              For any  differing  configuration  requirements,  e.g.  password
2130              lengths,  the stricter security setting was chosen. Security Re‐
2131              quirement Traceability Guides (RTMs) and sample System  Security
2132              Configuration  Guides  are provided via the scap-security-guide-
2133              docs package.
2134
2135              This profile reflects U.S. Government consensus content  and  is
2136              developed through the ComplianceAsCode initiative, championed by
2137              the National Security Agency. Except for differences in  format‐
2138              ting  to  accommodate publishing processes, this profile mirrors
2139              ComplianceAsCode content as minor divergences, such as bugfixes,
2140              work through the consensus and release processes.
2141
2142
2143       North  American Electric Reliability Corporation (NERC) Critical Infra‐
2144       structure Protection (CIP) cybersecurity standards profile for Red  Hat
2145       Enterprise Linux CoreOS
2146
2147              Profile ID:  xccdf_org.ssgproject.content_profile_nerc-cip
2148
2149              This  compliance  profile reflects a set of security recommenda‐
2150              tions for the usage of Red Hat Enterprise Linux CoreOS in criti‐
2151              cal infrastructure in the energy sector. This follows the recom‐
2152              mendations coming from the following CIP standards:
2153
2154              - CIP-002-5 - CIP-003-8 - CIP-004-6 - CIP-005-6  -  CIP-007-3  -
2155              CIP-007-6 - CIP-009-6
2156
2157
2158
2159
2160

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 7

2162       Source Datastream:  ssg-rhel7-ds.xml
2163
2164       The  Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
2165       broken into 'profiles', groupings of security settings  that  correlate
2166       to a known policy. Available profiles are:
2167
2168
2169
2170       C2S for Red Hat Enterprise Linux 7
2171
2172              Profile ID:  xccdf_org.ssgproject.content_profile_C2S
2173
2174              This profile demonstrates compliance against the U.S. Government
2175              Commercial Cloud Services (C2S) baseline.
2176
2177              This baseline was inspired by the Center for  Internet  Security
2178              (CIS) Red Hat Enterprise Linux 7 Benchmark, v2.1.1 - 01-31-2017.
2179
2180              For the SCAP Security Guide project to remain in compliance with
2181              CIS' terms and conditions,  specifically  Restrictions(8),  note
2182              there  is  no  representation or claim that the C2S profile will
2183              ensure a system is in compliance or  consistency  with  the  CIS
2184              baseline.
2185
2186
2187       ANSSI-BP-028 (enhanced)
2188
2189              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_nt28_en‐
2190              hanced
2191
2192              This profile contains configurations that align to  ANSSI-BP-028
2193              v1.2 at the enhanced hardening level.
2194
2195              ANSSI  is  the  French National Information Security Agency, and
2196              stands for Agence nationale de la sécurité des systèmes d'infor‐
2197              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
2198              GNU/Linux systems.
2199
2200              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
2201              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2202              securite-relatives-a-un-systeme-gnulinux/
2203
2204
2205       ANSSI-BP-028 (high)
2206
2207              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2208              file_anssi_nt28_high
2209
2210              This  profile contains configurations that align to ANSSI-BP-028
2211              v1.2 at the high hardening level.
2212
2213              ANSSI is the French National Information  Security  Agency,  and
2214              stands for Agence nationale de la sécurité des systèmes d'infor‐
2215              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
2216              GNU/Linux systems.
2217
2218              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
2219              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2220              securite-relatives-a-un-systeme-gnulinux/
2221
2222
2223       ANSSI-BP-028 (intermediary)
2224
2225              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_nt28_in‐
2226              termediary
2227
2228              This profile contains configurations that align to  ANSSI-BP-028
2229              v1.2 at the intermediary hardening level.
2230
2231              ANSSI  is  the  French National Information Security Agency, and
2232              stands for Agence nationale de la sécurité des systèmes d'infor‐
2233              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
2234              GNU/Linux systems.
2235
2236              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
2237              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2238              securite-relatives-a-un-systeme-gnulinux/
2239
2240
2241       ANSSI-BP-028 (minimal)
2242
2243              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2244              file_anssi_nt28_minimal
2245
2246              This  profile contains configurations that align to ANSSI-BP-028
2247              v1.2 at the minimal hardening level.
2248
2249              ANSSI is the French National Information  Security  Agency,  and
2250              stands for Agence nationale de la sécurité des systèmes d'infor‐
2251              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
2252              GNU/Linux systems.
2253
2254              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
2255              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2256              securite-relatives-a-un-systeme-gnulinux/
2257
2258
2259       CIS Red Hat Enterprise Linux 7 Benchmark for Level 2 - Server
2260
2261              Profile ID:  xccdf_org.ssgproject.content_profile_cis
2262
2263              This  profile  defines  a baseline that aligns to the "Level 2 -
2264              Server" configuration from the Center for Internet Security® Red
2265              Hat Enterprise Linux 7 Benchmark™, v3.1.1, released 05-21-2021.
2266
2267              This  profile includes Center for Internet Security® Red Hat En‐
2268              terprise Linux 7 CIS Benchmarks™ content.
2269
2270
2271       CIS Red Hat Enterprise Linux 7 Benchmark for Level 1 - Server
2272
2273              Profile ID:  xccdf_org.ssgproject.content_profile_cis_server_l1
2274
2275              This profile defines a baseline that aligns to the  "Level  1  -
2276              Server" configuration from the Center for Internet Security® Red
2277              Hat Enterprise Linux 7 Benchmark™, v3.1.1, released 05-21-2021.
2278
2279              This profile includes Center for Internet Security® Red Hat  En‐
2280              terprise Linux 7 CIS Benchmarks™ content.
2281
2282
2283       CIS Red Hat Enterprise Linux 7 Benchmark for Level 1 - Workstation
2284
2285              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
2286              tion_l1
2287
2288              This profile defines a baseline that aligns to the  "Level  1  -
2289              Workstation"  configuration  from  the Center for Internet Secu‐
2290              rity® Red Hat Enterprise Linux 7  Benchmark™,  v3.1.1,  released
2291              05-21-2021.
2292
2293              This  profile includes Center for Internet Security® Red Hat En‐
2294              terprise Linux 7 CIS Benchmarks™ content.
2295
2296
2297       CIS Red Hat Enterprise Linux 7 Benchmark for Level 2 - Workstation
2298
2299              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
2300              tion_l2
2301
2302              This  profile  defines  a baseline that aligns to the "Level 2 -
2303              Workstation" configuration from the Center  for  Internet  Secu‐
2304              rity®  Red  Hat  Enterprise Linux 7 Benchmark™, v3.1.1, released
2305              05-21-2021.
2306
2307              This profile includes Center for Internet Security® Red Hat  En‐
2308              terprise Linux 7 CIS Benchmarks™ content.
2309
2310
2311       Criminal Justice Information Services (CJIS) Security Policy
2312
2313              Profile ID:  xccdf_org.ssgproject.content_profile_cjis
2314
2315              This  profile is derived from FBI's CJIS v5.4 Security Policy. A
2316              copy of this policy can be found at the CJIS Security Policy Re‐
2317              source Center:
2318
2319              https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
2320              center
2321
2322
2323       Unclassified Information in Non-federal Information Systems and Organi‐
2324       zations (NIST 800-171)
2325
2326              Profile ID:  xccdf_org.ssgproject.content_profile_cui
2327
2328              From  NIST  800-171, Section 2.2: Security requirements for pro‐
2329              tecting the confidentiality of CUI  in  non-federal  information
2330              systems  and  organizations  have  a well-defined structure that
2331              consists of:
2332
2333              (i) a basic security requirements section; (ii) a derived  secu‐
2334              rity requirements section.
2335
2336              The  basic security requirements are obtained from FIPS Publica‐
2337              tion 200, which provides the high-level and fundamental security
2338              requirements  for  federal  information and information systems.
2339              The derived security requirements, which  supplement  the  basic
2340              security  requirements,  are taken from the security controls in
2341              NIST Special Publication 800-53.
2342
2343              This profile configures Red Hat Enterprise Linux 7 to  the  NIST
2344              Special Publication 800-53 controls identified for securing Con‐
2345              trolled Unclassified Information (CUI).
2346
2347
2348       Australian Cyber Security Centre (ACSC) Essential Eight
2349
2350              Profile ID:  xccdf_org.ssgproject.content_profile_e8
2351
2352              This profile contains configuration checks for  Red  Hat  Enter‐
2353              prise Linux 7 that align to the Australian Cyber Security Centre
2354              (ACSC) Essential Eight.
2355
2356              A copy of the Essential Eight in Linux Environments guide can be
2357              found at the ACSC website:
2358
2359              https://www.cyber.gov.au/acsc/view-all-content/publica
2360              tions/hardening-linux-workstations-and-servers
2361
2362
2363       Health Insurance Portability and Accountability Act (HIPAA)
2364
2365              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
2366
2367              The HIPAA Security Rule establishes U.S. national  standards  to
2368              protect individuals’ electronic personal health information that
2369              is created, received, used, or maintained by a  covered  entity.
2370              The  Security Rule requires appropriate administrative, physical
2371              and technical safeguards to ensure the  confidentiality,  integ‐
2372              rity, and security of electronic protected health information.
2373
2374              This  profile configures Red Hat Enterprise Linux 7 to the HIPAA
2375              Security Rule identified for securing  of  electronic  protected
2376              health information.  Use of this profile in no way guarantees or
2377              makes claims against legal compliance against the HIPAA Security
2378              Rule(s).
2379
2380
2381       NIST National Checklist Program Security Guide
2382
2383              Profile ID:  xccdf_org.ssgproject.content_profile_ncp
2384
2385              This  compliance  profile  reflects the core set of security re‐
2386              lated configuration settings for deployment of  Red  Hat  Enter‐
2387              prise  Linux  7.x  into U.S. Defense, Intelligence, and Civilian
2388              agencies.  Development partners and sponsors  include  the  U.S.
2389              National  Institute of Standards and Technology (NIST), U.S. De‐
2390              partment of Defense, the National Security Agency, and Red Hat.
2391
2392              This baseline implements  configuration  requirements  from  the
2393              following sources:
2394
2395              -  Committee  on  National Security Systems Instruction No. 1253
2396              (CNSSI 1253) - NIST Controlled  Unclassified  Information  (NIST
2397              800-171)  -  NIST  800-53 control selections for MODERATE impact
2398              systems (NIST 800-53) - U.S. Government  Configuration  Baseline
2399              (USGCB)  - NIAP Protection Profile for General Purpose Operating
2400              Systems v4.2.1 (OSPP v4.2.1) - DISA  Operating  System  Security
2401              Requirements Guide (OS SRG)
2402
2403              For  any  differing  configuration  requirements,  e.g. password
2404              lengths, the stricter security setting was chosen. Security  Re‐
2405              quirement  Traceability Guides (RTMs) and sample System Security
2406              Configuration Guides are provided via  the  scap-security-guide-
2407              docs package.
2408
2409              This  profile  reflects U.S. Government consensus content and is
2410              developed through the OpenSCAP/SCAP Security  Guide  initiative,
2411              championed  by  the National Security Agency. Except for differ‐
2412              ences in formatting to accommodate  publishing  processes,  this
2413              profile  mirrors  OpenSCAP/SCAP  Security Guide content as minor
2414              divergences, such as bugfixes, work through  the  consensus  and
2415              release processes.
2416
2417
2418       OSPP - Protection Profile for General Purpose Operating Systems v4.2.1
2419
2420              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
2421
2422              This  profile  reflects mandatory configuration controls identi‐
2423              fied in the NIAP Configuration Annex to the  Protection  Profile
2424              for  General  Purpose Operating Systems (Protection Profile Ver‐
2425              sion 4.2.1).
2426
2427              This configuration profile is consistent with CNSSI-1253,  which
2428              requires  U.S.  National  Security  Systems to adhere to certain
2429              configuration parameters. Accordingly, this  configuration  pro‐
2430              file is suitable for use in U.S. National Security Systems.
2431
2432
2433       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
2434
2435              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
2436
2437              Ensures  PCI-DSS  v3.2.1 security configuration settings are ap‐
2438              plied.
2439
2440
2441       RHV hardening based on STIG for Red Hat Enterprise Linux 7
2442
2443              Profile ID:  xccdf_org.ssgproject.content_profile_rhelh-stig
2444
2445              This profile contains configuration checks for Red Hat  Virtual‐
2446              ization  based on the the DISA STIG for Red Hat Enterprise Linux
2447              7.
2448
2449
2450       VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Virtual‐
2451       ization
2452
2453              Profile ID:  xccdf_org.ssgproject.content_profile_rhelh-vpp
2454
2455              This  compliance  profile  reflects the core set of security re‐
2456              lated configuration settings for deployment of  Red  Hat  Enter‐
2457              prise  Linux  Hypervisor (RHELH) 7.x into U.S. Defense, Intelli‐
2458              gence, and Civilian agencies.  Development partners and sponsors
2459              include  the U.S. National Institute of Standards and Technology
2460              (NIST),  U.S.  Department  of  Defense,  the  National  Security
2461              Agency, and Red Hat.
2462
2463              This  baseline  implements  configuration  requirements from the
2464              following sources:
2465
2466              - Committee on National Security Systems  Instruction  No.  1253
2467              (CNSSI  1253)  - NIST 800-53 control selections for MODERATE im‐
2468              pact systems (NIST 800-53) - U.S. Government Configuration Base‐
2469              line  (USGCB)  - NIAP Protection Profile for Virtualization v1.0
2470              (VPP v1.0)
2471
2472              For any  differing  configuration  requirements,  e.g.  password
2473              lengths,  the stricter security setting was chosen. Security Re‐
2474              quirement Traceability Guides (RTMs) and sample System  Security
2475              Configuration  Guides  are provided via the scap-security-guide-
2476              docs package.
2477
2478              This profile reflects U.S. Government consensus content  and  is
2479              developed  through  the  ComplianceAsCode project, championed by
2480              the National Security Agency. Except for differences in  format‐
2481              ting  to  accommodate publishing processes, this profile mirrors
2482              ComplianceAsCode content as minor divergences, such as bugfixes,
2483              work through the consensus and release processes.
2484
2485
2486       Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
2487
2488              Profile ID:  xccdf_org.ssgproject.content_profile_rht-ccp
2489
2490              This  profile  contains the minimum security relevant configura‐
2491              tion settings recommended by Red Hat, Inc for Red Hat Enterprise
2492              Linux 7 instances deployed by Red Hat Certified Cloud Providers.
2493
2494
2495       Standard System Security Profile for Red Hat Enterprise Linux 7
2496
2497              Profile ID:  xccdf_org.ssgproject.content_profile_standard
2498
2499              This profile contains rules to ensure standard security baseline
2500              of a Red Hat Enterprise Linux 7 system. Regardless of your  sys‐
2501              tem's workload all of these checks should pass.
2502
2503
2504       DISA STIG for Red Hat Enterprise Linux 7
2505
2506              Profile ID:  xccdf_org.ssgproject.content_profile_stig
2507
2508              This  profile  contains  configuration  checks that align to the
2509              DISA STIG for Red Hat Enterprise Linux V3R9.
2510
2511              In addition to being applicable to Red Hat Enterprise  Linux  7,
2512              DISA recognizes this configuration baseline as applicable to the
2513              operating system tier of Red Hat technologies that are based  on
2514              Red Hat Enterprise Linux 7, such as:
2515
2516              -  Red  Hat  Enterprise  Linux Server - Red Hat Enterprise Linux
2517              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
2518              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
2519              7 image
2520
2521
2522       DISA STIG with GUI for Red Hat Enterprise Linux 7
2523
2524              Profile ID:  xccdf_org.ssgproject.content_profile_stig_gui
2525
2526              This profile contains configuration checks  that  align  to  the
2527              DISA STIG with GUI for Red Hat Enterprise Linux V3R9.
2528
2529              In  addition  to being applicable to Red Hat Enterprise Linux 7,
2530              DISA recognizes this configuration baseline as applicable to the
2531              operating  system tier of Red Hat technologies that are based on
2532              Red Hat Enterprise Linux 7, such as:
2533
2534              - Red Hat Enterprise Linux Server -  Red  Hat  Enterprise  Linux
2535              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
2536              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
2537              7 image
2538
2539              Warning:  The installation and use of a Graphical User Interface
2540              (GUI) increases your attack vector and  decreases  your  overall
2541              security  posture.  If your Information Systems Security Officer
2542              (ISSO) lacks a documented operational requirement for a  graphi‐
2543              cal user interface, please consider using the standard DISA STIG
2544              for Red Hat Enterprise Linux 7 profile.
2545
2546
2547
2548
2549

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 8

2551       Source Datastream:  ssg-rhel8-ds.xml
2552
2553       The Guide to the Secure Configuration of Red Hat Enterprise Linux 8  is
2554       broken  into  'profiles', groupings of security settings that correlate
2555       to a known policy. Available profiles are:
2556
2557
2558
2559       ANSSI-BP-028 (enhanced)
2560
2561              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
2562              hanced
2563
2564              This  profile contains configurations that align to ANSSI-BP-028
2565              v1.2 at the enhanced hardening level.
2566
2567              ANSSI is the French National Information  Security  Agency,  and
2568              stands for Agence nationale de la sécurité des systèmes d'infor‐
2569              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
2570              GNU/Linux systems.
2571
2572              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
2573              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2574              securite-relatives-a-un-systeme-gnulinux/
2575
2576
2577       ANSSI-BP-028 (high)
2578
2579              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2580              file_anssi_bp28_high
2581
2582              This profile contains configurations that align to  ANSSI-BP-028
2583              v1.2 at the high hardening level.
2584
2585              ANSSI  is  the  French National Information Security Agency, and
2586              stands for Agence nationale de la sécurité des systèmes d'infor‐
2587              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
2588              GNU/Linux systems.
2589
2590              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
2591              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2592              securite-relatives-a-un-systeme-gnulinux/
2593
2594
2595       ANSSI-BP-028 (intermediary)
2596
2597              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
2598              termediary
2599
2600              This  profile contains configurations that align to ANSSI-BP-028
2601              v1.2 at the intermediary hardening level.
2602
2603              ANSSI is the French National Information  Security  Agency,  and
2604              stands for Agence nationale de la sécurité des systèmes d'infor‐
2605              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
2606              GNU/Linux systems.
2607
2608              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
2609              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2610              securite-relatives-a-un-systeme-gnulinux/
2611
2612
2613       ANSSI-BP-028 (minimal)
2614
2615              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2616              file_anssi_bp28_minimal
2617
2618              This profile contains configurations that align to  ANSSI-BP-028
2619              v1.2 at the minimal hardening level.
2620
2621              ANSSI  is  the  French National Information Security Agency, and
2622              stands for Agence nationale de la sécurité des systèmes d'infor‐
2623              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
2624              GNU/Linux systems.
2625
2626              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
2627              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2628              securite-relatives-a-un-systeme-gnulinux/
2629
2630
2631       CIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Server
2632
2633              Profile ID:  xccdf_org.ssgproject.content_profile_cis
2634
2635              This profile defines a baseline that aligns to the  "Level  2  -
2636              Server" configuration from the Center for Internet Security® Red
2637              Hat Enterprise Linux 8 Benchmark™, v2.0.0, released 2022-02-23.
2638
2639              This profile includes Center for Internet Security® Red Hat  En‐
2640              terprise Linux 8 CIS Benchmarks™ content.
2641
2642
2643       CIS Red Hat Enterprise Linux 8 Benchmark for Level 1 - Server
2644
2645              Profile ID:  xccdf_org.ssgproject.content_profile_cis_server_l1
2646
2647              This  profile  defines  a baseline that aligns to the "Level 1 -
2648              Server" configuration from the Center for Internet Security® Red
2649              Hat Enterprise Linux 8 Benchmark™, v2.0.0, released 2022-02-23.
2650
2651              This  profile includes Center for Internet Security® Red Hat En‐
2652              terprise Linux 8 CIS Benchmarks™ content.
2653
2654
2655       CIS Red Hat Enterprise Linux 8 Benchmark for Level 1 - Workstation
2656
2657              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
2658              tion_l1
2659
2660              This  profile  defines  a baseline that aligns to the "Level 1 -
2661              Workstation" configuration from the Center  for  Internet  Secu‐
2662              rity®  Red  Hat  Enterprise Linux 8 Benchmark™, v2.0.0, released
2663              2022-02-23.
2664
2665              This profile includes Center for Internet Security® Red Hat  En‐
2666              terprise Linux 8 CIS Benchmarks™ content.
2667
2668
2669       CIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Workstation
2670
2671              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
2672              tion_l2
2673
2674              This profile defines a baseline that aligns to the  "Level  2  -
2675              Workstation"  configuration  from  the Center for Internet Secu‐
2676              rity® Red Hat Enterprise Linux 8  Benchmark™,  v2.0.0,  released
2677              2022-02-23.
2678
2679              This  profile includes Center for Internet Security® Red Hat En‐
2680              terprise Linux 8 CIS Benchmarks™ content.
2681
2682
2683       Criminal Justice Information Services (CJIS) Security Policy
2684
2685              Profile ID:  xccdf_org.ssgproject.content_profile_cjis
2686
2687              This profile is derived from FBI's CJIS v5.4 Security Policy.  A
2688              copy of this policy can be found at the CJIS Security Policy Re‐
2689              source Center:
2690
2691              https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
2692              center
2693
2694
2695       Unclassified Information in Non-federal Information Systems and Organi‐
2696       zations (NIST 800-171)
2697
2698              Profile ID:  xccdf_org.ssgproject.content_profile_cui
2699
2700              From NIST 800-171, Section 2.2: Security requirements  for  pro‐
2701              tecting  the  confidentiality  of  CUI in nonfederal information
2702              systems and organizations have  a  well-defined  structure  that
2703              consists of:
2704
2705              (i)  a basic security requirements section; (ii) a derived secu‐
2706              rity requirements section.
2707
2708              The basic security requirements are obtained from FIPS  Publica‐
2709              tion 200, which provides the high-level and fundamental security
2710              requirements for federal information  and  information  systems.
2711              The  derived  security  requirements, which supplement the basic
2712              security requirements, are taken from the security  controls  in
2713              NIST Special Publication 800-53.
2714
2715              This  profile  configures Red Hat Enterprise Linux 8 to the NIST
2716              Special Publication 800-53 controls identified for securing Con‐
2717              trolled Unclassified Information (CUI)."
2718
2719
2720       Australian Cyber Security Centre (ACSC) Essential Eight
2721
2722              Profile ID:  xccdf_org.ssgproject.content_profile_e8
2723
2724              This  profile  contains  configuration checks for Red Hat Enter‐
2725              prise Linux 8 that align to the Australian Cyber Security Centre
2726              (ACSC) Essential Eight.
2727
2728              A copy of the Essential Eight in Linux Environments guide can be
2729              found at the ACSC website:
2730
2731              https://www.cyber.gov.au/acsc/view-all-content/publica
2732              tions/hardening-linux-workstations-and-servers
2733
2734
2735       Health Insurance Portability and Accountability Act (HIPAA)
2736
2737              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
2738
2739              The  HIPAA  Security Rule establishes U.S. national standards to
2740              protect individuals’ electronic personal health information that
2741              is  created,  received, used, or maintained by a covered entity.
2742              The Security Rule requires appropriate administrative,  physical
2743              and  technical  safeguards to ensure the confidentiality, integ‐
2744              rity, and security of electronic protected health information.
2745
2746              This profile configures Red Hat Enterprise Linux 8 to the  HIPAA
2747              Security  Rule  identified  for securing of electronic protected
2748              health information.  Use of this profile in no way guarantees or
2749              makes claims against legal compliance against the HIPAA Security
2750              Rule(s).
2751
2752
2753       Australian Cyber Security Centre (ACSC) ISM Official
2754
2755              Profile ID:  xccdf_org.ssgproject.content_profile_ism_o
2756
2757              This profile contains configuration checks for  Red  Hat  Enter‐
2758              prise Linux 8 that align to the Australian Cyber Security Centre
2759              (ACSC) Information Security Manual (ISM) with the  applicability
2760              marking of OFFICIAL.
2761
2762              The  ISM uses a risk-based approach to cyber security. This pro‐
2763              file provides a guide to aligning Red Hat Enterprise Linux secu‐
2764              rity controls with the ISM, which can be used to select controls
2765              specific to an organisation's security posture and risk profile.
2766
2767              A copy of the ISM can be found at the ACSC website:
2768
2769              https://www.cyber.gov.au/ism
2770
2771
2772       Protection Profile for General Purpose Operating Systems
2773
2774              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
2775
2776              This profile reflects mandatory configuration  controls  identi‐
2777              fied  in  the NIAP Configuration Annex to the Protection Profile
2778              for General Purpose Operating Systems (Protection  Profile  Ver‐
2779              sion 4.2.1).
2780
2781              This  configuration profile is consistent with CNSSI-1253, which
2782              requires U.S. National Security Systems  to  adhere  to  certain
2783              configuration  parameters.  Accordingly, this configuration pro‐
2784              file is suitable for use in U.S. National Security Systems.
2785
2786
2787       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
2788
2789              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
2790
2791              Ensures PCI-DSS v3.2.1 security configuration settings  are  ap‐
2792              plied.
2793
2794
2795       Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
2796
2797              Profile ID:  xccdf_org.ssgproject.content_profile_rht-ccp
2798
2799              This  profile  contains the minimum security relevant configura‐
2800              tion settings recommended by Red Hat, Inc for Red Hat Enterprise
2801              Linux 8 instances deployed by Red Hat Certified Cloud Providers.
2802
2803
2804       Standard System Security Profile for Red Hat Enterprise Linux 8
2805
2806              Profile ID:  xccdf_org.ssgproject.content_profile_standard
2807
2808              This profile contains rules to ensure standard security baseline
2809              of a Red Hat Enterprise Linux 8 system. Regardless of your  sys‐
2810              tem's workload all of these checks should pass.
2811
2812
2813       DISA STIG for Red Hat Enterprise Linux 8
2814
2815              Profile ID:  xccdf_org.ssgproject.content_profile_stig
2816
2817              This  profile  contains  configuration  checks that align to the
2818              DISA STIG for Red Hat Enterprise Linux 8 V1R8.
2819
2820              In addition to being applicable to Red Hat Enterprise  Linux  8,
2821              DISA recognizes this configuration baseline as applicable to the
2822              operating system tier of Red Hat technologies that are based  on
2823              Red Hat Enterprise Linux 8, such as:
2824
2825              -  Red  Hat  Enterprise  Linux Server - Red Hat Enterprise Linux
2826              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
2827              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
2828              8 image
2829
2830
2831       DISA STIG with GUI for Red Hat Enterprise Linux 8
2832
2833              Profile ID:  xccdf_org.ssgproject.content_profile_stig_gui
2834
2835              This profile contains configuration checks  that  align  to  the
2836              DISA STIG with GUI for Red Hat Enterprise Linux 8 V1R8.
2837
2838              In  addition  to being applicable to Red Hat Enterprise Linux 8,
2839              DISA recognizes this configuration baseline as applicable to the
2840              operating  system tier of Red Hat technologies that are based on
2841              Red Hat Enterprise Linux 8, such as:
2842
2843              - Red Hat Enterprise Linux Server -  Red  Hat  Enterprise  Linux
2844              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
2845              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
2846              8 image
2847
2848              Warning:  The installation and use of a Graphical User Interface
2849              (GUI) increases your attack vector and  decreases  your  overall
2850              security  posture.  If your Information Systems Security Officer
2851              (ISSO) lacks a documented operational requirement for a  graphi‐
2852              cal user interface, please consider using the standard DISA STIG
2853              for Red Hat Enterprise Linux 8 profile.
2854
2855
2856
2857
2858

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 9

2860       Source Datastream:  ssg-rhel9-ds.xml
2861
2862       The Guide to the Secure Configuration of Red Hat Enterprise Linux 9  is
2863       broken  into  'profiles', groupings of security settings that correlate
2864       to a known policy. Available profiles are:
2865
2866
2867
2868       ANSSI-BP-028 (enhanced)
2869
2870              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
2871              hanced
2872
2873              This  profile contains configurations that align to ANSSI-BP-028
2874              at the enhanced hardening level.
2875
2876              ANSSI is the French National Information  Security  Agency,  and
2877              stands for Agence nationale de la sécurité des systèmes d'infor‐
2878              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
2879              GNU/Linux systems.
2880
2881              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
2882              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2883              securite-relatives-a-un-systeme-gnulinux/
2884
2885
2886       ANSSI-BP-028 (high)
2887
2888              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2889              file_anssi_bp28_high
2890
2891              This profile contains configurations that align to  ANSSI-BP-028
2892              at the high hardening level.
2893
2894              ANSSI  is  the  French National Information Security Agency, and
2895              stands for Agence nationale de la sécurité des systèmes d'infor‐
2896              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
2897              GNU/Linux systems.
2898
2899              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
2900              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2901              securite-relatives-a-un-systeme-gnulinux/
2902
2903
2904       ANSSI-BP-028 (intermediary)
2905
2906              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
2907              termediary
2908
2909              This  profile contains configurations that align to ANSSI-BP-028
2910              at the intermediary hardening level.
2911
2912              ANSSI is the French National Information  Security  Agency,  and
2913              stands for Agence nationale de la sécurité des systèmes d'infor‐
2914              mation.  ANSSI-BP-028  is  a  configuration  recommendation  for
2915              GNU/Linux systems.
2916
2917              A  copy  of  the ANSSI-BP-028 can be found at the ANSSI website:
2918              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2919              securite-relatives-a-un-systeme-gnulinux/
2920
2921
2922       ANSSI-BP-028 (minimal)
2923
2924              Profile          ID:           xccdf_org.ssgproject.content_pro‐
2925              file_anssi_bp28_minimal
2926
2927              This profile contains configurations that align to  ANSSI-BP-028
2928              at the minimal hardening level.
2929
2930              ANSSI  is  the  French National Information Security Agency, and
2931              stands for Agence nationale de la sécurité des systèmes d'infor‐
2932              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
2933              GNU/Linux systems.
2934
2935              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
2936              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2937              securite-relatives-a-un-systeme-gnulinux/
2938
2939
2940       [DRAFT] CIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Server
2941
2942              Profile ID:  xccdf_org.ssgproject.content_profile_cis
2943
2944              This is a draft profile based on its RHEL8 version  for  experi‐
2945              mental  purposes.   It  is  not  based  on the CIS benchmark for
2946              RHEL9, because this one was not available at  time  of  the  re‐
2947              lease.
2948
2949
2950       [DRAFT] CIS Red Hat Enterprise Linux 9 Benchmark for Level 1 - Server
2951
2952              Profile ID:  xccdf_org.ssgproject.content_profile_cis_server_l1
2953
2954              This  is  a draft profile based on its RHEL8 version for experi‐
2955              mental purposes.  It is not  based  on  the  CIS  benchmark  for
2956              RHEL9,  because  this  one  was not available at time of the re‐
2957              lease.
2958
2959
2960       [DRAFT] CIS Red Hat Enterprise Linux 9 Benchmark for Level 1 - Worksta‐
2961       tion
2962
2963              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
2964              tion_l1
2965
2966              This is a draft profile based on its RHEL8 version  for  experi‐
2967              mental  purposes.   It  is  not  based  on the CIS benchmark for
2968              RHEL9, because this one was not available at  time  of  the  re‐
2969              lease.
2970
2971
2972       [DRAFT] CIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Worksta‐
2973       tion
2974
2975              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
2976              tion_l2
2977
2978              This  is  a draft profile based on its RHEL8 version for experi‐
2979              mental purposes.  It is not  based  on  the  CIS  benchmark  for
2980              RHEL9,  because  this  one  was not available at time of the re‐
2981              lease.
2982
2983
2984       [DRAFT] Unclassified Information in Non-federal Information Systems and
2985       Organizations (NIST 800-171)
2986
2987              Profile ID:  xccdf_org.ssgproject.content_profile_cui
2988
2989              From  NIST  800-171, Section 2.2: Security requirements for pro‐
2990              tecting the confidentiality of  CUI  in  nonfederal  information
2991              systems  and  organizations  have  a well-defined structure that
2992              consists of:
2993
2994              (i) a basic security requirements section; (ii) a derived  secu‐
2995              rity requirements section.
2996
2997              The  basic security requirements are obtained from FIPS Publica‐
2998              tion 200, which provides the high-level and fundamental security
2999              requirements  for  federal  information and information systems.
3000              The derived security requirements, which  supplement  the  basic
3001              security  requirements,  are taken from the security controls in
3002              NIST Special Publication 800-53.
3003
3004              This profile configures Red Hat Enterprise Linux 9 to  the  NIST
3005              Special Publication 800-53 controls identified for securing Con‐
3006              trolled Unclassified Information (CUI)."
3007
3008
3009       Australian Cyber Security Centre (ACSC) Essential Eight
3010
3011              Profile ID:  xccdf_org.ssgproject.content_profile_e8
3012
3013              This profile contains configuration checks for  Red  Hat  Enter‐
3014              prise Linux 9 that align to the Australian Cyber Security Centre
3015              (ACSC) Essential Eight.
3016
3017              A copy of the Essential Eight in Linux Environments guide can be
3018              found at the ACSC website:
3019
3020              https://www.cyber.gov.au/acsc/view-all-content/publica
3021              tions/hardening-linux-workstations-and-servers
3022
3023
3024       Health Insurance Portability and Accountability Act (HIPAA)
3025
3026              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
3027
3028              The HIPAA Security Rule establishes U.S. national  standards  to
3029              protect individuals’ electronic personal health information that
3030              is created, received, used, or maintained by a  covered  entity.
3031              The  Security Rule requires appropriate administrative, physical
3032              and technical safeguards to ensure the  confidentiality,  integ‐
3033              rity, and security of electronic protected health information.
3034
3035              This  profile configures Red Hat Enterprise Linux 9 to the HIPAA
3036              Security Rule identified for securing  of  electronic  protected
3037              health information.  Use of this profile in no way guarantees or
3038              makes claims against legal compliance against the HIPAA Security
3039              Rule(s).
3040
3041
3042       Australian Cyber Security Centre (ACSC) ISM Official
3043
3044              Profile ID:  xccdf_org.ssgproject.content_profile_ism_o
3045
3046              This  profile  contains  configuration checks for Red Hat Enter‐
3047              prise Linux 9 that align to the Australian Cyber Security Centre
3048              (ACSC)  Information Security Manual (ISM) with the applicability
3049              marking of OFFICIAL.
3050
3051              The ISM uses a risk-based approach to cyber security. This  pro‐
3052              file provides a guide to aligning Red Hat Enterprise Linux secu‐
3053              rity controls with the ISM, which can be used to select controls
3054              specific to an organisation's security posture and risk profile.
3055
3056              A copy of the ISM can be found at the ACSC website:
3057
3058              https://www.cyber.gov.au/ism
3059
3060
3061       Protection Profile for General Purpose Operating Systems
3062
3063              Profile ID:  xccdf_org.ssgproject.content_profile_ospp
3064
3065              This profile is part of Red Hat Enterprise Linux 9 Common Crite‐
3066              ria Guidance documentation for Target  of  Evaluation  based  on
3067              Protection  Profile for General Purpose Operating Systems (OSPP)
3068              version 4.2.1 and Functional Package for SSH version 1.0.
3069
3070              Where appropriate, CNSSI 1253 or DoD-specific  values  are  used
3071              for configuration, based on Configuration Annex to the OSPP.
3072
3073
3074       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 9
3075
3076              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
3077
3078              Ensures  PCI-DSS  v3.2.1 security configuration settings are ap‐
3079              plied.
3080
3081
3082       [DRAFT] DISA STIG for Red Hat Enterprise Linux 9
3083
3084              Profile ID:  xccdf_org.ssgproject.content_profile_stig
3085
3086              This is a draft profile based on its RHEL8 version  for  experi‐
3087              mental  purposes.   It  is not based on the DISA STIG for RHEL9,
3088              because this one was not available at time of the release.
3089
3090              In addition to being applicable to Red Hat Enterprise  Linux  9,
3091              DISA recognizes this configuration baseline as applicable to the
3092              operating system tier of Red Hat technologies that are based  on
3093              Red Hat Enterprise Linux 9, such as:
3094
3095              -  Red  Hat  Enterprise  Linux Server - Red Hat Enterprise Linux
3096              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
3097              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
3098              9 image
3099
3100
3101       [DRAFT] DISA STIG with GUI for Red Hat Enterprise Linux 9
3102
3103              Profile ID:  xccdf_org.ssgproject.content_profile_stig_gui
3104
3105              This is a draft profile based on its RHEL8 version  for  experi‐
3106              mental  purposes.   It  is not based on the DISA STIG for RHEL9,
3107              because this one was not available at time of the release.
3108
3109              In addition to being applicable to Red Hat Enterprise  Linux  9,
3110              DISA recognizes this configuration baseline as applicable to the
3111              operating system tier of Red Hat technologies that are based  on
3112              Red Hat Enterprise Linux 9, such as:
3113
3114              -  Red  Hat  Enterprise  Linux Server - Red Hat Enterprise Linux
3115              Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
3116              Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
3117              9 image
3118
3119              Warning: The installation and use of a Graphical User  Interface
3120              (GUI)  increases  your  attack vector and decreases your overall
3121              security posture. If your Information Systems  Security  Officer
3122              (ISSO)  lacks a documented operational requirement for a graphi‐
3123              cal user interface, please consider using the standard DISA STIG
3124              for Red Hat Enterprise Linux 9 profile.
3125
3126
3127
3128
3129

Profiles in Guide to the Secure Configuration of Red Hat Virtualization 4

3131       Source Datastream:  ssg-rhv4-ds.xml
3132
3133       The  Guide  to  the Secure Configuration of Red Hat Virtualization 4 is
3134       broken into 'profiles', groupings of security settings  that  correlate
3135       to a known policy. Available profiles are:
3136
3137
3138
3139       PCI-DSS v3.2.1 Control Baseline for Red Hat Virtualization Host (RHVH)
3140
3141              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
3142
3143              Ensures  PCI-DSS  v3.2.1 security configuration settings are ap‐
3144              plied.
3145
3146
3147       [DRAFT] DISA STIG for Red Hat Virtualization Host (RHVH)
3148
3149              Profile ID:  xccdf_org.ssgproject.content_profile_rhvh-stig
3150
3151              This *draft* profile contains configuration checks that align to
3152              the DISA STIG for Red Hat Virtualization Host (RHVH).
3153
3154
3155       VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Virtual‐
3156       ization Host (RHVH)
3157
3158              Profile ID:  xccdf_org.ssgproject.content_profile_rhvh-vpp
3159
3160              This compliance profile reflects the core set  of  security  re‐
3161              lated  configuration settings for deployment of Red Hat Virtual‐
3162              ization Host (RHVH) 4.x into  U.S.  Defense,  Intelligence,  and
3163              Civilian  agencies.   Development  partners and sponsors include
3164              the U.S. National Institute of Standards and Technology  (NIST),
3165              U.S.  Department  of  Defense, the National Security Agency, and
3166              Red Hat.
3167
3168              This baseline implements  configuration  requirements  from  the
3169              following sources:
3170
3171              -  Committee  on  National Security Systems Instruction No. 1253
3172              (CNSSI 1253) - NIST 800-53 control selections for  MODERATE  im‐
3173              pact systems (NIST 800-53) - U.S. Government Configuration Base‐
3174              line (USGCB) - NIAP Protection Profile for  Virtualization  v1.0
3175              (VPP v1.0)
3176
3177              For  any  differing  configuration  requirements,  e.g. password
3178              lengths, the stricter security setting was chosen. Security  Re‐
3179              quirement  Traceability Guides (RTMs) and sample System Security
3180              Configuration Guides are provided via  the  scap-security-guide-
3181              docs package.
3182
3183              This  profile  reflects U.S. Government consensus content and is
3184              developed through the ComplianceAsCode  project,  championed  by
3185              the  National Security Agency. Except for differences in format‐
3186              ting to accommodate publishing processes, this  profile  mirrors
3187              ComplianceAsCode content as minor divergences, such as bugfixes,
3188              work through the consensus and release processes.
3189
3190
3191
3192
3193

Profiles in Guide to the Secure Configuration of Red Hat Enterprise Linux 7

3195       Source Datastream:  ssg-sl7-ds.xml
3196
3197       The Guide to the Secure Configuration of Red Hat Enterprise Linux 7  is
3198       broken  into  'profiles', groupings of security settings that correlate
3199       to a known policy. Available profiles are:
3200
3201
3202
3203       PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
3204
3205              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
3206
3207              Ensures PCI-DSS v3.2.1 security configuration settings  are  ap‐
3208              plied.
3209
3210
3211       Standard System Security Profile for Red Hat Enterprise Linux 7
3212
3213              Profile ID:  xccdf_org.ssgproject.content_profile_standard
3214
3215              This profile contains rules to ensure standard security baseline
3216              of a Red Hat Enterprise Linux 7 system. Regardless of your  sys‐
3217              tem's workload all of these checks should pass.
3218
3219
3220
3221
3222

Profiles in Guide to the Secure Configuration of SUSE Linux Enterprise 12

3224       Source Datastream:  ssg-sle12-ds.xml
3225
3226       The  Guide  to  the Secure Configuration of SUSE Linux Enterprise 12 is
3227       broken into 'profiles', groupings of security settings  that  correlate
3228       to a known policy. Available profiles are:
3229
3230
3231
3232       ANSSI-BP-028 (enhanced)
3233
3234              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
3235              hanced
3236
3237              This profile contains configurations that align to  ANSSI-BP-028
3238              v1.2 at the enhanced hardening level.
3239
3240              ANSSI  is  the  French National Information Security Agency, and
3241              stands for Agence nationale de la sécurité des systèmes d'infor‐
3242              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
3243              GNU/Linux systems.
3244
3245              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
3246              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3247              securite-relatives-a-un-systeme-gnulinux/
3248
3249              Only the components strictly necessary to the  service  provided
3250              by the system should be installed.  Those whose presence can not
3251              be justified should be disabled, removed or deleted.  Performing
3252              a  minimal install is a good starting point, but doesn't provide
3253              any assurance over any package installed later.   Manual  review
3254              is required to assess if the installed services are minimal.
3255
3256
3257       ANSSI-BP-028 (high)
3258
3259              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3260              file_anssi_bp28_high
3261
3262              This profile contains configurations that align to  ANSSI-BP-028
3263              v1.2 at the high hardening level.
3264
3265              ANSSI  is  the  French National Information Security Agency, and
3266              stands for Agence nationale de la sécurité des systèmes d'infor‐
3267              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
3268              GNU/Linux systems.
3269
3270              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
3271              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3272              securite-relatives-a-un-systeme-gnulinux/
3273
3274              Only the components strictly necessary to the  service  provided
3275              by the system should be installed.  Those whose presence can not
3276              be justified should be disabled, removed or deleted.  Performing
3277              a  minimal install is a good starting point, but doesn't provide
3278              any assurance over any package installed later.   Manual  review
3279              is required to assess if the installed services are minimal.
3280
3281
3282       ANSSI-BP-028 (intermediary)
3283
3284              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
3285              termediary
3286
3287              This profile contains configurations that align to  ANSSI-BP-028
3288              v1.2 at the intermediary hardening level.
3289
3290              ANSSI  is  the  French National Information Security Agency, and
3291              stands for Agence nationale de la sécurité des systèmes d'infor‐
3292              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
3293              GNU/Linux systems.
3294
3295              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
3296              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3297              securite-relatives-a-un-systeme-gnulinux/
3298
3299              Only the components strictly necessary to the  service  provided
3300              by the system should be installed.  Those whose presence can not
3301              be justified should be disabled, removed or deleted.  Performing
3302              a  minimal install is a good starting point, but doesn't provide
3303              any assurance over any package installed later.   Manual  review
3304              is required to assess if the installed services are minimal.
3305
3306
3307       ANSSI-BP-028 (minimal)
3308
3309              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3310              file_anssi_bp28_minimal
3311
3312              This profile contains configurations that align to  ANSSI-BP-028
3313              v1.2 at the minimal hardening level.
3314
3315              ANSSI  is  the  French National Information Security Agency, and
3316              stands for Agence nationale de la sécurité des systèmes d'infor‐
3317              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
3318              GNU/Linux systems.
3319
3320              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
3321              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3322              securite-relatives-a-un-systeme-gnulinux/
3323
3324              Only the components strictly necessary to the  service  provided
3325              by the system should be installed.  Those whose presence can not
3326              be justified should be disabled, removed or deleted.  Performing
3327              a  minimal install is a good starting point, but doesn't provide
3328              any assurance over any package installed later.   Manual  review
3329              is required to assess if the installed services are minimal.
3330
3331
3332       CIS SUSE Linux Enterprise 12 Benchmark for Level 2 - Server
3333
3334              Profile ID:  xccdf_org.ssgproject.content_profile_cis
3335
3336              This  profile  defines  a baseline that aligns to the "Level 2 -
3337              Server" configuration from the  Center  for  Internet  Security®
3338              SUSE   Linux   Enterprise   12   Benchmark™,   v3.0.0,  released
3339              04-27-2021.
3340
3341              This profile includes Center for Internet Security®  SUSE  Linux
3342              Enterprise 12 CIS Benchmarks™ content.
3343
3344
3345       CIS SUSE Linux Enterprise 12 Benchmark for Level 1 - Server
3346
3347              Profile ID:  xccdf_org.ssgproject.content_profile_cis_server_l1
3348
3349              This  profile  defines  a baseline that aligns to the "Level 1 -
3350              Server" configuration from the  Center  for  Internet  Security®
3351              SUSE   Linux   Enterprise   12   Benchmark™,   v3.0.0,  released
3352              04-27-2021.
3353
3354              This profile includes Center for Internet Security®  SUSE  Linux
3355              Enterprise 12 CIS Benchmarks™ content.
3356
3357
3358       CIS SUSE Linux Enterprise 12 Benchmark for Level 1 - Workstation
3359
3360              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
3361              tion_l1
3362
3363              This profile defines a baseline that aligns to the  "Level  1  -
3364              Workstation"  configuration  from  the Center for Internet Secu‐
3365              rity® SUSE Linux  Enterprise  12  Benchmark™,  v3.0.0,  released
3366              04-27-2021.
3367
3368              This  profile  includes Center for Internet Security® SUSE Linux
3369              Enterprise 12 CIS Benchmarks™ content.
3370
3371
3372       CIS SUSE Linux Enterprise 12 Benchmark Level 2 - Workstation
3373
3374              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
3375              tion_l2
3376
3377              This  profile  defines  a baseline that aligns to the "Level 2 -
3378              Workstation" configuration from the Center  for  Internet  Secu‐
3379              rity®  SUSE  Linux  Enterprise  12  Benchmark™, v3.0.0, released
3380              04-27-2021.
3381
3382              This profile includes Center for Internet Security®  SUSE  Linux
3383              Enterprise 12 CIS Benchmarks™ content.
3384
3385
3386       PCI-DSS v4 Control Baseline for SUSE Linux enterprise 12
3387
3388              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss-4
3389
3390              Ensures PCI-DSS v4 security configuration settings are applied.
3391
3392
3393       PCI-DSS v3.2.1 Control Baseline for SUSE Linux enterprise 12
3394
3395              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
3396
3397              Ensures  PCI-DSS  v3.2.1 security configuration settings are ap‐
3398              plied.
3399
3400
3401       Standard System Security Profile for SUSE Linux Enterprise 12
3402
3403              Profile ID:  xccdf_org.ssgproject.content_profile_standard
3404
3405              This profile contains rules to ensure standard security baseline
3406              of  a  SUSE  Linux Enterprise 12 system. Regardless of your sys‐
3407              tem's workload all of these checks should pass.
3408
3409
3410       DISA STIG for SUSE Linux Enterprise 12
3411
3412              Profile ID:  xccdf_org.ssgproject.content_profile_stig
3413
3414              This profile contains configuration checks  that  align  to  the
3415              DISA STIG for SUSE Linux Enterprise 12 V2R5.
3416
3417
3418
3419
3420

Profiles in Guide to the Secure Configuration of SUSE Linux Enterprise 15

3422       Source Datastream:  ssg-sle15-ds.xml
3423
3424       The  Guide  to  the Secure Configuration of SUSE Linux Enterprise 15 is
3425       broken into 'profiles', groupings of security settings  that  correlate
3426       to a known policy. Available profiles are:
3427
3428
3429
3430       ANSSI-BP-028 (enhanced)
3431
3432              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
3433              hanced
3434
3435              This profile contains configurations that align to  ANSSI-BP-028
3436              v1.2 at the enhanced hardening level.
3437
3438              ANSSI  is  the  French National Information Security Agency, and
3439              stands for Agence nationale de la sécurité des systèmes d'infor‐
3440              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
3441              GNU/Linux systems.
3442
3443              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
3444              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3445              securite-relatives-a-un-systeme-gnulinux/
3446
3447              Only the components strictly necessary to the  service  provided
3448              by the system should be installed.  Those whose presence can not
3449              be justified should be disabled, removed or deleted.  Performing
3450              a  minimal install is a good starting point, but doesn't provide
3451              any assurance over any package installed later.   Manual  review
3452              is required to assess if the installed services are minimal.
3453
3454
3455       ANSSI-BP-028 (high)
3456
3457              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3458              file_anssi_bp28_high
3459
3460              This profile contains configurations that align to  ANSSI-BP-028
3461              v1.2 at the high hardening level.
3462
3463              ANSSI  is  the  French National Information Security Agency, and
3464              stands for Agence nationale de la sécurité des systèmes d'infor‐
3465              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
3466              GNU/Linux systems.
3467
3468              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
3469              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3470              securite-relatives-a-un-systeme-gnulinux/
3471
3472              Only the components strictly necessary to the  service  provided
3473              by the system should be installed.  Those whose presence can not
3474              be justified should be disabled, removed or deleted.  Performing
3475              a  minimal install is a good starting point, but doesn't provide
3476              any assurance over any package installed later.   Manual  review
3477              is required to assess if the installed services are minimal.
3478
3479
3480       ANSSI-BP-028 (intermediary)
3481
3482              Profile ID:  xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
3483              termediary
3484
3485              This profile contains configurations that align to  ANSSI-BP-028
3486              v1.2 at the intermediary hardening level.
3487
3488              ANSSI  is  the  French National Information Security Agency, and
3489              stands for Agence nationale de la sécurité des systèmes d'infor‐
3490              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
3491              GNU/Linux systems.
3492
3493              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
3494              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3495              securite-relatives-a-un-systeme-gnulinux/
3496
3497              Only the components strictly necessary to the  service  provided
3498              by the system should be installed.  Those whose presence can not
3499              be justified should be disabled, removed or deleted.  Performing
3500              a  minimal install is a good starting point, but doesn't provide
3501              any assurance over any package installed later.   Manual  review
3502              is required to assess if the installed services are minimal.
3503
3504
3505       ANSSI-BP-028 (minimal)
3506
3507              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3508              file_anssi_bp28_minimal
3509
3510              This profile contains configurations that align to  ANSSI-BP-028
3511              v1.2 at the minimal hardening level.
3512
3513              ANSSI  is  the  French National Information Security Agency, and
3514              stands for Agence nationale de la sécurité des systèmes d'infor‐
3515              mation.   ANSSI-BP-028  is  a  configuration  recommendation for
3516              GNU/Linux systems.
3517
3518              A copy of the ANSSI-BP-028 can be found at  the  ANSSI  website:
3519              https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3520              securite-relatives-a-un-systeme-gnulinux/
3521
3522              Only the components strictly necessary to the  service  provided
3523              by the system should be installed.  Those whose presence can not
3524              be justified should be disabled, removed or deleted.  Performing
3525              a  minimal install is a good starting point, but doesn't provide
3526              any assurance over any package installed later.   Manual  review
3527              is required to assess if the installed services are minimal.
3528
3529
3530       CIS SUSE Linux Enterprise 15 Benchmark for Level 2 - Server
3531
3532              Profile ID:  xccdf_org.ssgproject.content_profile_cis
3533
3534              This  profile  defines  a baseline that aligns to the "Level 2 -
3535              Server" configuration from the  Center  for  Internet  Security®
3536              SUSE   Linux   Enterprise   15   Benchmark™,   v1.1.0,  released
3537              09-17-2021.
3538
3539              This profile includes Center for Internet Security®  SUSE  Linux
3540              Enterprise 15 CIS Benchmarks™ content.
3541
3542
3543       CIS SUSE Linux Enterprise 15 Benchmark for Level 1 - Server
3544
3545              Profile ID:  xccdf_org.ssgproject.content_profile_cis_server_l1
3546
3547              This  profile  defines  a baseline that aligns to the "Level 1 -
3548              Server" configuration from the  Center  for  Internet  Security®
3549              SUSE   Linux   Enterprise   15   Benchmark™,   v1.1.0,  released
3550              09-17-2021.
3551
3552              This profile includes Center for Internet Security®  SUSE  Linux
3553              Enterprise 15 CIS Benchmarks™ content.
3554
3555
3556       CIS SUSE Linux Enterprise 15 Benchmark for Level 1 - Workstation
3557
3558              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
3559              tion_l1
3560
3561              This profile defines a baseline that aligns to the  "Level  1  -
3562              Workstation"  configuration  from  the Center for Internet Secu‐
3563              rity® SUSE Linux  Enterprise  15  Benchmark™,  v1.1.0,  released
3564              09-17-2021.
3565
3566              This  profile  includes Center for Internet Security® SUSE Linux
3567              Enterprise 15 CIS Benchmarks™ content.
3568
3569
3570       CIS SUSE Linux Enterprise 15 Benchmark Level 2 - Workstation
3571
3572              Profile  ID:   xccdf_org.ssgproject.content_profile_cis_worksta‐
3573              tion_l2
3574
3575              This  profile  defines  a baseline that aligns to the "Level 2 -
3576              Workstation" configuration from the Center  for  Internet  Secu‐
3577              rity®  SUSE  Linux  Enterprise  15  Benchmark™, v1.1.0, released
3578              09-17-2021.
3579
3580              This profile includes Center for Internet Security®  SUSE  Linux
3581              Enterprise 15 CIS Benchmarks™ content.
3582
3583
3584       Health Insurance Portability and Accountability Act (HIPAA)
3585
3586              Profile ID:  xccdf_org.ssgproject.content_profile_hipaa
3587
3588              The  HIPAA  Security Rule establishes U.S. national standards to
3589              protect individuals’ electronic personal health information that
3590              is  created,  received, used, or maintained by a covered entity.
3591              The Security Rule requires appropriate administrative,  physical
3592              and  technical  safeguards to ensure the confidentiality, integ‐
3593              rity, and security of electronic protected health information.
3594
3595              This profile contains configuration checks  that  align  to  the
3596              HIPPA Security Rule for SUSE Linux Enterprise 15 V1R3.
3597
3598
3599       PCI-DSS v4 Control Baseline for SUSE Linux enterprise 15
3600
3601              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss-4
3602
3603              Ensures PCI-DSS v4 security configuration settings are applied.
3604
3605
3606       PCI-DSS v3.2.1 Control Baseline for SUSE Linux enterprise 15
3607
3608              Profile ID:  xccdf_org.ssgproject.content_profile_pci-dss
3609
3610              Ensures  PCI-DSS  v3.2.1 security configuration settings are ap‐
3611              plied.
3612
3613
3614       Hardening for Public Cloud Image of SUSE Linux Enterprise Server (SLES)
3615       for SAP Applications 15
3616
3617              Profile ID:  xccdf_org.ssgproject.content_profile_pcs-hardening-
3618              sap
3619
3620              This profile contains configuration rules to be used  to  harden
3621              the images of SUSE Linux Enterprise Server (SLES) for SAP Appli‐
3622              cations  15  including  all  Service  Packs,  for  Public  Cloud
3623              providers, currently AWS, Microsoft Azure, and Google Cloud.
3624
3625
3626       Public Cloud Hardening for SUSE Linux Enterprise 15
3627
3628              Profile ID:  xccdf_org.ssgproject.content_profile_pcs-hardening
3629
3630              This  profile contains configuration checks to be used to harden
3631              SUSE Linux Enterprise 15 for use with public cloud providers.
3632
3633
3634       Standard System Security Profile for SUSE Linux Enterprise 15
3635
3636              Profile ID:  xccdf_org.ssgproject.content_profile_standard
3637
3638              This profile contains rules to ensure standard security baseline
3639              of a SUSE Linux Enterprise 15 system based off of the SUSE Hard‐
3640              ening Guide. Regardless of your system's workload all  of  these
3641              checks should pass.
3642
3643
3644       DISA STIG for SUSE Linux Enterprise 15
3645
3646              Profile ID:  xccdf_org.ssgproject.content_profile_stig
3647
3648              This  profile  contains  configuration  checks that align to the
3649              DISA STIG for SUSE Linux Enterprise 15 V1R4.
3650
3651
3652
3653
3654

Profiles in Guide to the Secure Configuration of Ubuntu 16.04

3656       Source Datastream:  ssg-ubuntu1604-ds.xml
3657
3658       The Guide to the Secure Configuration of Ubuntu 16.04  is  broken  into
3659       'profiles',  groupings  of  security settings that correlate to a known
3660       policy. Available profiles are:
3661
3662
3663
3664       Profile for ANSSI DAT-NT28 Average (Intermediate) Level
3665
3666              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3667              file_anssi_np_nt28_average
3668
3669              This  profile contains items for GNU/Linux installations already
3670              protected by multiple higher level security stacks.
3671
3672
3673       Profile for ANSSI DAT-NT28 High (Enforced) Level
3674
3675              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3676              file_anssi_np_nt28_high
3677
3678              This  profile contains items for GNU/Linux installations storing
3679              sensitive information that can be  accessible  from  unauthenti‐
3680              cated or uncontroled networks.
3681
3682
3683       Profile for ANSSI DAT-NT28 Minimal Level
3684
3685              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3686              file_anssi_np_nt28_minimal
3687
3688              This profile contains items to be applied systematically.
3689
3690
3691       Profile for ANSSI DAT-NT28 Restrictive Level
3692
3693              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3694              file_anssi_np_nt28_restrictive
3695
3696              This  profile contains items for GNU/Linux installations exposed
3697              to unauthenticated flows or multiple sources.
3698
3699
3700       Standard System Security Profile for Ubuntu 16.04
3701
3702              Profile ID:  xccdf_org.ssgproject.content_profile_standard
3703
3704              This profile contains rules to ensure standard security baseline
3705              of  an Ubuntu 16.04 system. Regardless of your system's workload
3706              all of these checks should pass.
3707
3708
3709
3710
3711

Profiles in Guide to the Secure Configuration of Ubuntu 18.04

3713       Source Datastream:  ssg-ubuntu1804-ds.xml
3714
3715       The Guide to the Secure Configuration of Ubuntu 18.04  is  broken  into
3716       'profiles',  groupings  of  security settings that correlate to a known
3717       policy. Available profiles are:
3718
3719
3720
3721       Profile for ANSSI DAT-NT28 Average (Intermediate) Level
3722
3723              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3724              file_anssi_np_nt28_average
3725
3726              This  profile contains items for GNU/Linux installations already
3727              protected by multiple higher level security stacks.
3728
3729
3730       Profile for ANSSI DAT-NT28 High (Enforced) Level
3731
3732              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3733              file_anssi_np_nt28_high
3734
3735              This  profile contains items for GNU/Linux installations storing
3736              sensitive information that can be  accessible  from  unauthenti‐
3737              cated or uncontroled networks.
3738
3739
3740       Profile for ANSSI DAT-NT28 Minimal Level
3741
3742              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3743              file_anssi_np_nt28_minimal
3744
3745              This profile contains items to be applied systematically.
3746
3747
3748       Profile for ANSSI DAT-NT28 Restrictive Level
3749
3750              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3751              file_anssi_np_nt28_restrictive
3752
3753              This  profile contains items for GNU/Linux installations exposed
3754              to unauthenticated flows or multiple sources.
3755
3756
3757       CIS Ubuntu 18.04 LTS Benchmark
3758
3759              Profile ID:  xccdf_org.ssgproject.content_profile_cis
3760
3761              This baseline aligns to the Center for Internet Security  Ubuntu
3762              18.04 LTS Benchmark, v1.0.0, released 08-13-2018.
3763
3764
3765       Standard System Security Profile for Ubuntu 18.04
3766
3767              Profile ID:  xccdf_org.ssgproject.content_profile_standard
3768
3769              This profile contains rules to ensure standard security baseline
3770              of an Ubuntu 18.04 system. Regardless of your system's  workload
3771              all of these checks should pass.
3772
3773
3774
3775
3776

Profiles in Guide to the Secure Configuration of Ubuntu 20.04

3778       Source Datastream:  ssg-ubuntu2004-ds.xml
3779
3780       The  Guide  to  the Secure Configuration of Ubuntu 20.04 is broken into
3781       'profiles', groupings of security settings that correlate  to  a  known
3782       policy. Available profiles are:
3783
3784
3785
3786       CIS Ubuntu 20.04 Level 1 Server Benchmark
3787
3788              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3789              file_cis_level1_server
3790
3791              This baseline aligns to the Center for Internet Security  Ubuntu
3792              20.04 LTS Benchmark, v1.0.0, released 07-21-2020.
3793
3794
3795       CIS Ubuntu 20.04 Level 1 Workstation Benchmark
3796
3797              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3798              file_cis_level1_workstation
3799
3800              This baseline aligns to the Center for Internet Security  Ubuntu
3801              20.04 LTS Benchmark, v1.0.0, released 07-21-2020.
3802
3803
3804       CIS Ubuntu 20.04 Level 2 Server Benchmark
3805
3806              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3807              file_cis_level2_server
3808
3809              This baseline aligns to the Center for Internet Security  Ubuntu
3810              20.04 LTS Benchmark, v1.0.0, released 07-21-2020.
3811
3812
3813       CIS Ubuntu 20.04 Level 2 Workstation Benchmark
3814
3815              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3816              file_cis_level2_workstation
3817
3818              This baseline aligns to the Center for Internet Security  Ubuntu
3819              20.04 LTS Benchmark, v1.0.0, released 07-21-2020.
3820
3821
3822       Standard System Security Profile for Ubuntu 20.04
3823
3824              Profile ID:  xccdf_org.ssgproject.content_profile_standard
3825
3826              This profile contains rules to ensure standard security baseline
3827              of an Ubuntu 20.04 system. Regardless of your system's  workload
3828              all of these checks should pass.
3829
3830
3831       Canonical  Ubuntu  20.04  LTS  Security  Technical Implementation Guide
3832       (STIG) V1R1
3833
3834              Profile ID:  xccdf_org.ssgproject.content_profile_stig
3835
3836              This Security Technical Implementation Guide is published  as  a
3837              tool  to improve the security of Department of Defense (DoD) in‐
3838              formation systems.  The requirements are derived  from  the  Na‐
3839              tional  Institute  of Standards and Technology (NIST) 800-53 and
3840              related documents.
3841
3842
3843
3844
3845

Profiles in Guide to the Secure Configuration of Ubuntu 22.04

3847       Source Datastream:  ssg-ubuntu2204-ds.xml
3848
3849       The Guide to the Secure Configuration of Ubuntu 22.04  is  broken  into
3850       'profiles',  groupings  of  security settings that correlate to a known
3851       policy. Available profiles are:
3852
3853
3854
3855       CIS Ubuntu 22.04 Level 1 Server Benchmark
3856
3857              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3858              file_cis_level1_server
3859
3860              This  baseline aligns to the Center for Internet Security Ubuntu
3861              22.04 LTS Benchmark, v1.0.0, released 07-21-2020.
3862
3863
3864       CIS Ubuntu 22.04 Level 1 Workstation Benchmark
3865
3866              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3867              file_cis_level1_workstation
3868
3869              This  baseline aligns to the Center for Internet Security Ubuntu
3870              22.04 LTS Benchmark, v1.0.0, released 07-21-2020.
3871
3872
3873       CIS Ubuntu 22.04 Level 2 Server Benchmark
3874
3875              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3876              file_cis_level2_server
3877
3878              This  baseline aligns to the Center for Internet Security Ubuntu
3879              22.04 LTS Benchmark, v1.0.0, released 07-21-2020.
3880
3881
3882       CIS Ubuntu 22.04 Level 2 Workstation Benchmark
3883
3884              Profile          ID:           xccdf_org.ssgproject.content_pro‐
3885              file_cis_level2_workstation
3886
3887              This  baseline aligns to the Center for Internet Security Ubuntu
3888              22.04 LTS Benchmark, v1.0.0, released 07-21-2020.
3889
3890
3891       Standard System Security Profile for Ubuntu 22.04
3892
3893              Profile ID:  xccdf_org.ssgproject.content_profile_standard
3894
3895              This profile contains rules to ensure standard security baseline
3896              of  an Ubuntu 22.04 system. Regardless of your system's workload
3897              all of these checks should pass.
3898
3899
3900
3901
3902

Profiles in Guide to the Secure Configuration of UnionTech OS Server 20

3904       Source Datastream:  ssg-uos20-ds.xml
3905
3906       The Guide to the Secure Configuration of UnionTech OS Server 20 is bro‐
3907       ken into 'profiles', groupings of security settings that correlate to a
3908       known policy. Available profiles are:
3909
3910
3911
3912       Standard System Security Profile for UnionTech OS Server 20
3913
3914              Profile ID:  xccdf_org.ssgproject.content_profile_standard
3915
3916              This profile contains rules to ensure standard security baseline
3917              of  a UnionTech OS Server 20 system. Regardless of your system's
3918              workload all of these checks should pass.
3919
3920
3921
3922
3923
3924

EXAMPLES

3926       To scan your system utilizing the OpenSCAP  utility  against  the  ospp
3927       profile:
3928
3929       oscap  xccdf  eval  --profile  ospp  --results  /tmp/`hostname`-ssg-re‐
3930       sults.xml  --report   /tmp/`hostname`-ssg-results.html   --oval-results
3931       /usr/share/xml/scap/ssg/content/ssg-{product}-xccdf.xml
3932
3933       Additional   details   can   be   found  on  the  projects  wiki  page:
3934       https://www.github.com/ComplianceAsCode/content/wiki
3935
3936
3937

FILES

3939       /usr/share/xml/scap/ssg/content
3940              Houses SCAP content utilizing the following naming conventions:
3941
3942              SCAP Source Datastreams: ssg-{product}-ds.xml
3943
3944              CPE Dictionaries: ssg-{product}-cpe-dictionary.xml
3945
3946              CPE OVAL Content: ssg-{product}-cpe-oval.xml
3947
3948              OVAL Content: ssg-{product}-oval.xml
3949
3950              XCCDF Content: ssg-{product}-xccdf.xml
3951
3952       /usr/share/doc/scap-security-guide/guides/
3953              HTML versions of SSG profiles.
3954
3955       /usr/share/scap-security-guide/ansible/
3956              Contains Ansible Playbooks for SSG profiles.
3957
3958       /usr/share/scap-security-guide/bash/
3959              Contains Bash remediation scripts for SSG profiles.
3960
3961
3962

DEPLOYMENT TO U.S. CIVILIAN GOVERNMENT SYSTEMS

3964       SCAP Security Guide content is considered  vendor  (Red  Hat)  provided
3965       content.   Per  guidance  from the U.S. National Institute of Standards
3966       and Technology (NIST), U.S. Government programs are allowed to use Ven‐
3967       dor produced SCAP content in absence of "Governmental Authority" check‐
3968       lists.          The          specific           NIST           verbage:
3969       http://web.nvd.nist.gov/view/ncp/repository/glossary?cid=1#Authority
3970
3971
3972

DEPLOYMENT TO U.S. MILITARY SYSTEMS

3974       DoD  Directive  (DoDD)  8500.1  requires that "all IA and IA-enabled IT
3975       products incorporated into DoD information systems shall be  configured
3976       in  accordance with DoD-approved security configuration guidelines" and
3977       tasks Defense Information Systems Agency (DISA) to "develop and provide
3978       security  configuration  guidance  for IA and IA-enabled IT products in
3979       coordination with Director, NSA."  The output of this authority is  the
3980       DISA Security Technical Implementation Guides, or STIGs. DISA FSO is in
3981       the process of moving the STIGs towards the use of  the  NIST  Security
3982       Content  Automation  Protocol  (SCAP) in order to "automate" compliance
3983       reporting of the STIGs.
3984
3985       Through a common, shared vision, the SCAP Security Guide community  en‐
3986       joys  close  collaboration  directly  with  NSA, NIST, and DISA FSO. As
3987       stated in Section 1.1 of the Red Hat Enterprise Linux 6 STIG  Overview,
3988       Version 1, Release 2, issued on 03-JUNE-2013:
3989
3990       "The  consensus  content  was  developed  using  an open-source project
3991       called SCAP Security Guide. The project's website is  https://www.open-
3992       scap.org/security-policies/scap-security-guide.  Except for differences
3993       in formatting to accommodate the DISA STIG publishing process, the con‐
3994       tent  of the Red Hat Enterprise Linux 6 STIG should mirror the SCAP Se‐
3995       curity Guide content with only minor divergence as updates from  multi‐
3996       ple sources work through the consensus process."
3997
3998       The  DoD  STIG  for  Red Hat Enterprise Linux 7, revision V2R4, was re‐
3999       leased in July 2019 Currently, the DoD Red Hat Enterprise Linux 7  STIG
4000       contains only XCCDF content and is available online: https://public.cy
4001       ber.mil/stigs/downloads/?_dl_facet_stigs=operating-systems%2Cunix-linux
4002
4003       Content published against the public.cyber.mil website is authoritative
4004       STIG  content.  The  SCAP  Security Guide project, as noted in the STIG
4005       overview, is considered upstream content. Unlike DISA FSO, the SCAP Se‐
4006       curity  Guide  project does publish OVAL automation content. Individual
4007       programs and C&A evaluators make program-level  determinations  on  the
4008       direct usage of the SCAP Security Guide.  Currently there is no blanket
4009       approval.
4010
4011
4012

SEE ALSO

4014       oscap(8)
4015
4016
4017

AUTHOR

4019       Please direct all questions to the SSG mailing list:  https://lists.fe
4020       dorahosted.org/mailman/listinfo/scap-security-guide
4021
4022
4023
4024version 1                         26 Jan 2013           scap-security-guide(8)
Impressum