1scap-security-guide(8) System Manager's Manual scap-security-guide(8)
2
3
4
6 SCAP-Security-Guide - Delivers security guidance, baselines, and asso‐
7 ciated validation mechanisms utilizing the Security Content Automation
8 Protocol (SCAP).
9
10
11
13 The project provides practical security hardening advice and also links
14 it to compliance requirements in order to ease deployment activities,
15 such as certification and accreditation. These include requirements in
16 the U.S. government (Federal, Defense, and Intelligence Community) as
17 well as of the financial services and health care industries. For exam‐
18 ple, high-level and widely-accepted policies such as NIST 800-53 pro‐
19 vides prose stating that System Administrators must audit "privileged
20 user actions," but do not define what "privileged actions" are. The SSG
21 bridges the gap between generalized policy requirements and specific
22 implementation guidance, in SCAP formats to support automation whenever
23 possible.
24
25 The projects homepage is located at: https://www.open-scap.org/secu‐
26 rity-policies/scap-security-guide
27
28
29
31 Source data stream: ssg-alinux2-ds.xml
32
33 The Guide to the Secure Configuration of Alibaba Cloud Linux 2 is bro‐
34 ken into 'profiles', groupings of security settings that correlate to a
35 known policy. Available profiles are:
36
37
38
39 CIS Aliyun Linux 2 Benchmark for Level 2
40
41 Profile ID: xccdf_org.ssgproject.content_profile_cis
42
43 This profile defines a baseline that aligns to the "Level 2"
44 configuration from the Center for Internet Security® Aliyun
45 Linux 2 Benchmark™, v1.0.0, released 08-16-2019.
46
47 This profile includes Center for Internet Security® Aliyun Linux
48 2 CIS Benchmarks™ content.
49
50
51 CIS Aliyun Linux 2 Benchmark for Level 1
52
53 Profile ID: xccdf_org.ssgproject.content_profile_cis_l1
54
55 This profile defines a baseline that aligns to the "Level 1"
56 configuration from the Center for Internet Security® Aliyun
57 Linux 2 Benchmark™, v1.0.0, released 08-16-2019.
58
59 This profile includes Center for Internet Security® Aliyun Linux
60 2 CIS Benchmarks™ content.
61
62
63 Standard System Security Profile for Alibaba Cloud Linux 2
64
65 Profile ID: xccdf_org.ssgproject.content_profile_standard
66
67 This profile contains rules to ensure standard security baseline
68 of a Alibaba Cloud Linux 2 system. Regardless of your system's
69 workload all of these checks should pass.
70
71
72
73
74
76 Source data stream: ssg-alinux3-ds.xml
77
78 The Guide to the Secure Configuration of Alibaba Cloud Linux 3 is bro‐
79 ken into 'profiles', groupings of security settings that correlate to a
80 known policy. Available profiles are:
81
82
83
84 CIS Benchmark for Alibaba Cloud Linux 3 for Level 2
85
86 Profile ID: xccdf_org.ssgproject.content_profile_cis
87
88 This profile defines a baseline that aligns to the "Level 2"
89 configuration from the Center for Internet Security® Alibaba
90 Cloud Linux 3 Benchmark™, v1.0.0, released 08-16-2019.
91
92 This profile includes Center for Internet Security® Alibaba
93 Cloud Linux 3 Benchmark™ content.
94
95
96 CIS Benchmark for Alibaba Cloud Linux 3 for Level 1
97
98 Profile ID: xccdf_org.ssgproject.content_profile_cis_l1
99
100 This profile defines a baseline that aligns to the "Level 1"
101 configuration from the Center for Internet Security® Alibaba
102 Cloud Linux 3 Benchmark™, v1.0.0, released 08-16-2019.
103
104 This profile includes Center for Internet Security® Alibaba
105 Cloud Linux 3 Benchmark™ content.
106
107
108 Standard System Security Profile for Alibaba Cloud Linux 3
109
110 Profile ID: xccdf_org.ssgproject.content_profile_standard
111
112 This profile contains rules to ensure standard security baseline
113 of a Alibaba Cloud Linux 3 system. Regardless of your system's
114 workload all of these checks should pass.
115
116
117
118
119
121 Source data stream: ssg-anolis23-ds.xml
122
123 The Guide to the Secure Configuration of Anolis OS 23 is broken into
124 'profiles', groupings of security settings that correlate to a known
125 policy. Available profiles are:
126
127
128
129 Standard System Security Profile for Anolis OS 23
130
131 Profile ID: xccdf_org.ssgproject.content_profile_standard
132
133 This profile contains rules to ensure standard security baseline
134 of a Anolis OS 23 system.
135
136
137
138
139
141 Source data stream: ssg-anolis8-ds.xml
142
143 The Guide to the Secure Configuration of Anolis OS 8 is broken into
144 'profiles', groupings of security settings that correlate to a known
145 policy. Available profiles are:
146
147
148
149 Standard System Security Profile for Anolis OS 8
150
151 Profile ID: xccdf_org.ssgproject.content_profile_standard
152
153 This profile contains rules to ensure standard security baseline
154 of a Anolis OS 8 system.
155
156
157
158
159
161 Source data stream: ssg-centos7-ds.xml
162
163 The Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
164 broken into 'profiles', groupings of security settings that correlate
165 to a known policy. Available profiles are:
166
167
168
169 C2S for Red Hat Enterprise Linux 7
170
171 Profile ID: xccdf_org.ssgproject.content_profile_C2S
172
173 This profile demonstrates compliance against the U.S. Government
174 Commercial Cloud Services (C2S) baseline.
175
176 This baseline was inspired by the Center for Internet Security
177 (CIS) Red Hat Enterprise Linux 7 Benchmark, v2.1.1 - 01-31-2017.
178
179 For the SCAP Security Guide project to remain in compliance with
180 CIS' terms and conditions, specifically Restrictions(8), note
181 there is no representation or claim that the C2S profile will
182 ensure a system is in compliance or consistency with the CIS
183 baseline.
184
185
186 ANSSI-BP-028 (enhanced)
187
188 Profile ID: xccdf_org.ssgproject.content_profile_anssi_nt28_en‐
189 hanced
190
191 This profile contains configurations that align to ANSSI-BP-028
192 v2.0 at the enhanced hardening level.
193
194 ANSSI is the French National Information Security Agency, and
195 stands for Agence nationale de la sécurité des systèmes d'infor‐
196 mation. ANSSI-BP-028 is a configuration recommendation for
197 GNU/Linux systems.
198
199 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
200 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
201 securite-relatives-a-un-systeme-gnulinux/
202
203
204 ANSSI-BP-028 (high)
205
206 Profile ID: xccdf_org.ssgproject.content_pro‐
207 file_anssi_nt28_high
208
209 This profile contains configurations that align to ANSSI-BP-028
210 v2.0 at the high hardening level.
211
212 ANSSI is the French National Information Security Agency, and
213 stands for Agence nationale de la sécurité des systèmes d'infor‐
214 mation. ANSSI-BP-028 is a configuration recommendation for
215 GNU/Linux systems.
216
217 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
218 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
219 securite-relatives-a-un-systeme-gnulinux/
220
221
222 ANSSI-BP-028 (intermediary)
223
224 Profile ID: xccdf_org.ssgproject.content_profile_anssi_nt28_in‐
225 termediary
226
227 This profile contains configurations that align to ANSSI-BP-028
228 v2.0 at the intermediary hardening level.
229
230 ANSSI is the French National Information Security Agency, and
231 stands for Agence nationale de la sécurité des systèmes d'infor‐
232 mation. ANSSI-BP-028 is a configuration recommendation for
233 GNU/Linux systems.
234
235 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
236 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
237 securite-relatives-a-un-systeme-gnulinux/
238
239
240 ANSSI-BP-028 (minimal)
241
242 Profile ID: xccdf_org.ssgproject.content_pro‐
243 file_anssi_nt28_minimal
244
245 This profile contains configurations that align to ANSSI-BP-028
246 v2.0 at the minimal hardening level.
247
248 ANSSI is the French National Information Security Agency, and
249 stands for Agence nationale de la sécurité des systèmes d'infor‐
250 mation. ANSSI-BP-028 is a configuration recommendation for
251 GNU/Linux systems.
252
253 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
254 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
255 securite-relatives-a-un-systeme-gnulinux/
256
257
258 CIS Red Hat Enterprise Linux 7 Benchmark for Level 2 - Server
259
260 Profile ID: xccdf_org.ssgproject.content_profile_cis
261
262 This profile defines a baseline that aligns to the "Level 2 -
263 Server" configuration from the Center for Internet Security® Red
264 Hat Enterprise Linux 7 Benchmark™, v3.1.1, released 05-21-2021.
265
266 This profile includes Center for Internet Security® Red Hat En‐
267 terprise Linux 7 CIS Benchmarks™ content.
268
269
270 CIS Red Hat Enterprise Linux 7 Benchmark for Level 1 - Server
271
272 Profile ID: xccdf_org.ssgproject.content_profile_cis_server_l1
273
274 This profile defines a baseline that aligns to the "Level 1 -
275 Server" configuration from the Center for Internet Security® Red
276 Hat Enterprise Linux 7 Benchmark™, v3.1.1, released 05-21-2021.
277
278 This profile includes Center for Internet Security® Red Hat En‐
279 terprise Linux 7 CIS Benchmarks™ content.
280
281
282 CIS Red Hat Enterprise Linux 7 Benchmark for Level 1 - Workstation
283
284 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
285 tion_l1
286
287 This profile defines a baseline that aligns to the "Level 1 -
288 Workstation" configuration from the Center for Internet Secu‐
289 rity® Red Hat Enterprise Linux 7 Benchmark™, v3.1.1, released
290 05-21-2021.
291
292 This profile includes Center for Internet Security® Red Hat En‐
293 terprise Linux 7 CIS Benchmarks™ content.
294
295
296 CIS Red Hat Enterprise Linux 7 Benchmark for Level 2 - Workstation
297
298 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
299 tion_l2
300
301 This profile defines a baseline that aligns to the "Level 2 -
302 Workstation" configuration from the Center for Internet Secu‐
303 rity® Red Hat Enterprise Linux 7 Benchmark™, v3.1.1, released
304 05-21-2021.
305
306 This profile includes Center for Internet Security® Red Hat En‐
307 terprise Linux 7 CIS Benchmarks™ content.
308
309
310 Criminal Justice Information Services (CJIS) Security Policy
311
312 Profile ID: xccdf_org.ssgproject.content_profile_cjis
313
314 This profile is derived from FBI's CJIS v5.4 Security Policy. A
315 copy of this policy can be found at the CJIS Security Policy Re‐
316 source Center:
317
318 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
319 center
320
321
322 Unclassified Information in Non-federal Information Systems and Organi‐
323 zations (NIST 800-171)
324
325 Profile ID: xccdf_org.ssgproject.content_profile_cui
326
327 From NIST 800-171, Section 2.2: Security requirements for pro‐
328 tecting the confidentiality of CUI in non-federal information
329 systems and organizations have a well-defined structure that
330 consists of:
331
332 (i) a basic security requirements section; (ii) a derived secu‐
333 rity requirements section.
334
335 The basic security requirements are obtained from FIPS Publica‐
336 tion 200, which provides the high-level and fundamental security
337 requirements for federal information and information systems.
338 The derived security requirements, which supplement the basic
339 security requirements, are taken from the security controls in
340 NIST Special Publication 800-53.
341
342 This profile configures Red Hat Enterprise Linux 7 to the NIST
343 Special Publication 800-53 controls identified for securing Con‐
344 trolled Unclassified Information (CUI).
345
346
347 Australian Cyber Security Centre (ACSC) Essential Eight
348
349 Profile ID: xccdf_org.ssgproject.content_profile_e8
350
351 This profile contains configuration checks for Red Hat Enter‐
352 prise Linux 7 that align to the Australian Cyber Security Centre
353 (ACSC) Essential Eight.
354
355 A copy of the Essential Eight in Linux Environments guide can be
356 found at the ACSC website:
357
358 https://www.cyber.gov.au/acsc/view-all-content/publica‐
359 tions/hardening-linux-workstations-and-servers
360
361
362 Health Insurance Portability and Accountability Act (HIPAA)
363
364 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
365
366 The HIPAA Security Rule establishes U.S. national standards to
367 protect individuals’ electronic personal health information that
368 is created, received, used, or maintained by a covered entity.
369 The Security Rule requires appropriate administrative, physical
370 and technical safeguards to ensure the confidentiality, integ‐
371 rity, and security of electronic protected health information.
372
373 This profile configures Red Hat Enterprise Linux 7 to the HIPAA
374 Security Rule identified for securing of electronic protected
375 health information. Use of this profile in no way guarantees or
376 makes claims against legal compliance against the HIPAA Security
377 Rule(s).
378
379
380 NIST National Checklist Program Security Guide
381
382 Profile ID: xccdf_org.ssgproject.content_profile_ncp
383
384 This compliance profile reflects the core set of security re‐
385 lated configuration settings for deployment of Red Hat Enter‐
386 prise Linux 7.x into U.S. Defense, Intelligence, and Civilian
387 agencies. Development partners and sponsors include the U.S.
388 National Institute of Standards and Technology (NIST), U.S. De‐
389 partment of Defense, the National Security Agency, and Red Hat.
390
391 This baseline implements configuration requirements from the
392 following sources:
393
394 - Committee on National Security Systems Instruction No. 1253
395 (CNSSI 1253) - NIST Controlled Unclassified Information (NIST
396 800-171) - NIST 800-53 control selections for MODERATE impact
397 systems (NIST 800-53) - U.S. Government Configuration Baseline
398 (USGCB) - NIAP Protection Profile for General Purpose Operating
399 Systems v4.2.1 (OSPP v4.2.1) - DISA Operating System Security
400 Requirements Guide (OS SRG)
401
402 For any differing configuration requirements, e.g. password
403 lengths, the stricter security setting was chosen. Security Re‐
404 quirement Traceability Guides (RTMs) and sample System Security
405 Configuration Guides are provided via the scap-security-guide-
406 docs package.
407
408 This profile reflects U.S. Government consensus content and is
409 developed through the OpenSCAP/SCAP Security Guide initiative,
410 championed by the National Security Agency. Except for differ‐
411 ences in formatting to accommodate publishing processes, this
412 profile mirrors OpenSCAP/SCAP Security Guide content as minor
413 divergences, such as bugfixes, work through the consensus and
414 release processes.
415
416
417 OSPP - Protection Profile for General Purpose Operating Systems v4.2.1
418
419 Profile ID: xccdf_org.ssgproject.content_profile_ospp
420
421 This profile reflects mandatory configuration controls identi‐
422 fied in the NIAP Configuration Annex to the Protection Profile
423 for General Purpose Operating Systems (Protection Profile Ver‐
424 sion 4.2.1).
425
426 This configuration profile is consistent with CNSSI-1253, which
427 requires U.S. National Security Systems to adhere to certain
428 configuration parameters. Accordingly, this configuration pro‐
429 file is suitable for use in U.S. National Security Systems.
430
431
432 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
433
434 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
435
436 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
437 plied.
438
439
440 RHV hardening based on STIG for Red Hat Enterprise Linux 7
441
442 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-stig
443
444 This profile contains configuration checks for Red Hat Virtual‐
445 ization based on the the DISA STIG for Red Hat Enterprise Linux
446 7.
447
448
449 VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Virtual‐
450 ization
451
452 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-vpp
453
454 This compliance profile reflects the core set of security re‐
455 lated configuration settings for deployment of Red Hat Enter‐
456 prise Linux Hypervisor (RHELH) 7.x into U.S. Defense, Intelli‐
457 gence, and Civilian agencies. Development partners and sponsors
458 include the U.S. National Institute of Standards and Technology
459 (NIST), U.S. Department of Defense, the National Security
460 Agency, and Red Hat.
461
462 This baseline implements configuration requirements from the
463 following sources:
464
465 - Committee on National Security Systems Instruction No. 1253
466 (CNSSI 1253) - NIST 800-53 control selections for MODERATE im‐
467 pact systems (NIST 800-53) - U.S. Government Configuration Base‐
468 line (USGCB) - NIAP Protection Profile for Virtualization v1.0
469 (VPP v1.0)
470
471 For any differing configuration requirements, e.g. password
472 lengths, the stricter security setting was chosen. Security Re‐
473 quirement Traceability Guides (RTMs) and sample System Security
474 Configuration Guides are provided via the scap-security-guide-
475 docs package.
476
477 This profile reflects U.S. Government consensus content and is
478 developed through the ComplianceAsCode project, championed by
479 the National Security Agency. Except for differences in format‐
480 ting to accommodate publishing processes, this profile mirrors
481 ComplianceAsCode content as minor divergences, such as bugfixes,
482 work through the consensus and release processes.
483
484
485 Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
486
487 Profile ID: xccdf_org.ssgproject.content_profile_rht-ccp
488
489 This profile contains the minimum security relevant configura‐
490 tion settings recommended by Red Hat, Inc for Red Hat Enterprise
491 Linux 7 instances deployed by Red Hat Certified Cloud Providers.
492
493
494 Standard System Security Profile for Red Hat Enterprise Linux 7
495
496 Profile ID: xccdf_org.ssgproject.content_profile_standard
497
498 This profile contains rules to ensure standard security baseline
499 of a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
500 tem's workload all of these checks should pass.
501
502
503 DISA STIG for Red Hat Enterprise Linux 7
504
505 Profile ID: xccdf_org.ssgproject.content_profile_stig
506
507 This profile contains configuration checks that align to the
508 DISA STIG for Red Hat Enterprise Linux V3R12.
509
510 In addition to being applicable to Red Hat Enterprise Linux 7,
511 DISA recognizes this configuration baseline as applicable to the
512 operating system tier of Red Hat technologies that are based on
513 Red Hat Enterprise Linux 7, such as:
514
515 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
516 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
517 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
518 7 image
519
520
521 DISA STIG with GUI for Red Hat Enterprise Linux 7
522
523 Profile ID: xccdf_org.ssgproject.content_profile_stig_gui
524
525 This profile contains configuration checks that align to the
526 DISA STIG with GUI for Red Hat Enterprise Linux V3R12.
527
528 In addition to being applicable to Red Hat Enterprise Linux 7,
529 DISA recognizes this configuration baseline as applicable to the
530 operating system tier of Red Hat technologies that are based on
531 Red Hat Enterprise Linux 7, such as:
532
533 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
534 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
535 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
536 7 image
537
538 Warning: The installation and use of a Graphical User Interface
539 (GUI) increases your attack vector and decreases your overall
540 security posture. If your Information Systems Security Officer
541 (ISSO) lacks a documented operational requirement for a graphi‐
542 cal user interface, please consider using the standard DISA STIG
543 for Red Hat Enterprise Linux 7 profile.
544
545
546
547
548
550 Source data stream: ssg-centos8-ds.xml
551
552 The Guide to the Secure Configuration of Red Hat Enterprise Linux 8 is
553 broken into 'profiles', groupings of security settings that correlate
554 to a known policy. Available profiles are:
555
556
557
558 ANSSI-BP-028 (enhanced)
559
560 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
561 hanced
562
563 This profile contains configurations that align to ANSSI-BP-028
564 v2.0 at the enhanced hardening level.
565
566 ANSSI is the French National Information Security Agency, and
567 stands for Agence nationale de la sécurité des systèmes d'infor‐
568 mation. ANSSI-BP-028 is a configuration recommendation for
569 GNU/Linux systems.
570
571 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
572 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
573 securite-relatives-a-un-systeme-gnulinux/
574
575
576 ANSSI-BP-028 (high)
577
578 Profile ID: xccdf_org.ssgproject.content_pro‐
579 file_anssi_bp28_high
580
581 This profile contains configurations that align to ANSSI-BP-028
582 v2.0 at the high hardening level.
583
584 ANSSI is the French National Information Security Agency, and
585 stands for Agence nationale de la sécurité des systèmes d'infor‐
586 mation. ANSSI-BP-028 is a configuration recommendation for
587 GNU/Linux systems.
588
589 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
590 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
591 securite-relatives-a-un-systeme-gnulinux/
592
593
594 ANSSI-BP-028 (intermediary)
595
596 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
597 termediary
598
599 This profile contains configurations that align to ANSSI-BP-028
600 v2.0 at the intermediary hardening level.
601
602 ANSSI is the French National Information Security Agency, and
603 stands for Agence nationale de la sécurité des systèmes d'infor‐
604 mation. ANSSI-BP-028 is a configuration recommendation for
605 GNU/Linux systems.
606
607 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
608 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
609 securite-relatives-a-un-systeme-gnulinux/
610
611
612 ANSSI-BP-028 (minimal)
613
614 Profile ID: xccdf_org.ssgproject.content_pro‐
615 file_anssi_bp28_minimal
616
617 This profile contains configurations that align to ANSSI-BP-028
618 v2.0 at the minimal hardening level.
619
620 ANSSI is the French National Information Security Agency, and
621 stands for Agence nationale de la sécurité des systèmes d'infor‐
622 mation. ANSSI-BP-028 is a configuration recommendation for
623 GNU/Linux systems.
624
625 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
626 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
627 securite-relatives-a-un-systeme-gnulinux/
628
629
630 CIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Server
631
632 Profile ID: xccdf_org.ssgproject.content_profile_cis
633
634 This profile defines a baseline that aligns to the "Level 2 -
635 Server" configuration from the Center for Internet Security® Red
636 Hat Enterprise Linux 8 Benchmark™, v2.0.0, released 2022-02-23.
637
638 This profile includes Center for Internet Security® Red Hat En‐
639 terprise Linux 8 CIS Benchmarks™ content.
640
641
642 CIS Red Hat Enterprise Linux 8 Benchmark for Level 1 - Server
643
644 Profile ID: xccdf_org.ssgproject.content_profile_cis_server_l1
645
646 This profile defines a baseline that aligns to the "Level 1 -
647 Server" configuration from the Center for Internet Security® Red
648 Hat Enterprise Linux 8 Benchmark™, v2.0.0, released 2022-02-23.
649
650 This profile includes Center for Internet Security® Red Hat En‐
651 terprise Linux 8 CIS Benchmarks™ content.
652
653
654 CIS Red Hat Enterprise Linux 8 Benchmark for Level 1 - Workstation
655
656 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
657 tion_l1
658
659 This profile defines a baseline that aligns to the "Level 1 -
660 Workstation" configuration from the Center for Internet Secu‐
661 rity® Red Hat Enterprise Linux 8 Benchmark™, v2.0.0, released
662 2022-02-23.
663
664 This profile includes Center for Internet Security® Red Hat En‐
665 terprise Linux 8 CIS Benchmarks™ content.
666
667
668 CIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Workstation
669
670 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
671 tion_l2
672
673 This profile defines a baseline that aligns to the "Level 2 -
674 Workstation" configuration from the Center for Internet Secu‐
675 rity® Red Hat Enterprise Linux 8 Benchmark™, v2.0.0, released
676 2022-02-23.
677
678 This profile includes Center for Internet Security® Red Hat En‐
679 terprise Linux 8 CIS Benchmarks™ content.
680
681
682 Criminal Justice Information Services (CJIS) Security Policy
683
684 Profile ID: xccdf_org.ssgproject.content_profile_cjis
685
686 This profile is derived from FBI's CJIS v5.4 Security Policy. A
687 copy of this policy can be found at the CJIS Security Policy Re‐
688 source Center:
689
690 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
691 center
692
693
694 Unclassified Information in Non-federal Information Systems and Organi‐
695 zations (NIST 800-171)
696
697 Profile ID: xccdf_org.ssgproject.content_profile_cui
698
699 From NIST 800-171, Section 2.2: Security requirements for pro‐
700 tecting the confidentiality of CUI in nonfederal information
701 systems and organizations have a well-defined structure that
702 consists of:
703
704 (i) a basic security requirements section; (ii) a derived secu‐
705 rity requirements section.
706
707 The basic security requirements are obtained from FIPS Publica‐
708 tion 200, which provides the high-level and fundamental security
709 requirements for federal information and information systems.
710 The derived security requirements, which supplement the basic
711 security requirements, are taken from the security controls in
712 NIST Special Publication 800-53.
713
714 This profile configures Red Hat Enterprise Linux 8 to the NIST
715 Special Publication 800-53 controls identified for securing Con‐
716 trolled Unclassified Information (CUI)."
717
718
719 Australian Cyber Security Centre (ACSC) Essential Eight
720
721 Profile ID: xccdf_org.ssgproject.content_profile_e8
722
723 This profile contains configuration checks for Red Hat Enter‐
724 prise Linux 8 that align to the Australian Cyber Security Centre
725 (ACSC) Essential Eight.
726
727 A copy of the Essential Eight in Linux Environments guide can be
728 found at the ACSC website:
729
730 https://www.cyber.gov.au/acsc/view-all-content/publica‐
731 tions/hardening-linux-workstations-and-servers
732
733
734 Health Insurance Portability and Accountability Act (HIPAA)
735
736 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
737
738 The HIPAA Security Rule establishes U.S. national standards to
739 protect individuals’ electronic personal health information that
740 is created, received, used, or maintained by a covered entity.
741 The Security Rule requires appropriate administrative, physical
742 and technical safeguards to ensure the confidentiality, integ‐
743 rity, and security of electronic protected health information.
744
745 This profile configures Red Hat Enterprise Linux 8 to the HIPAA
746 Security Rule identified for securing of electronic protected
747 health information. Use of this profile in no way guarantees or
748 makes claims against legal compliance against the HIPAA Security
749 Rule(s).
750
751
752 Australian Cyber Security Centre (ACSC) ISM Official
753
754 Profile ID: xccdf_org.ssgproject.content_profile_ism_o
755
756 This profile contains configuration checks for Red Hat Enter‐
757 prise Linux 8 that align to the Australian Cyber Security Centre
758 (ACSC) Information Security Manual (ISM) with the applicability
759 marking of OFFICIAL.
760
761 The ISM uses a risk-based approach to cyber security. This pro‐
762 file provides a guide to aligning Red Hat Enterprise Linux secu‐
763 rity controls with the ISM, which can be used to select controls
764 specific to an organisation's security posture and risk profile.
765
766 A copy of the ISM can be found at the ACSC website:
767
768 https://www.cyber.gov.au/ism
769
770
771 Protection Profile for General Purpose Operating Systems
772
773 Profile ID: xccdf_org.ssgproject.content_profile_ospp
774
775 This profile reflects mandatory configuration controls identi‐
776 fied in the NIAP Configuration Annex to the Protection Profile
777 for General Purpose Operating Systems (Protection Profile Ver‐
778 sion 4.2.1).
779
780 This configuration profile is consistent with CNSSI-1253, which
781 requires U.S. National Security Systems to adhere to certain
782 configuration parameters. Accordingly, this configuration pro‐
783 file is suitable for use in U.S. National Security Systems.
784
785
786 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
787
788 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
789
790 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
791 plied.
792
793
794 Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
795
796 Profile ID: xccdf_org.ssgproject.content_profile_rht-ccp
797
798 This profile contains the minimum security relevant configura‐
799 tion settings recommended by Red Hat, Inc for Red Hat Enterprise
800 Linux 8 instances deployed by Red Hat Certified Cloud Providers.
801
802
803 Standard System Security Profile for Red Hat Enterprise Linux 8
804
805 Profile ID: xccdf_org.ssgproject.content_profile_standard
806
807 This profile contains rules to ensure standard security baseline
808 of a Red Hat Enterprise Linux 8 system. Regardless of your sys‐
809 tem's workload all of these checks should pass.
810
811
812 DISA STIG for Red Hat Enterprise Linux 8
813
814 Profile ID: xccdf_org.ssgproject.content_profile_stig
815
816 This profile contains configuration checks that align to the
817 DISA STIG for Red Hat Enterprise Linux 8 V1R11.
818
819 In addition to being applicable to Red Hat Enterprise Linux 8,
820 DISA recognizes this configuration baseline as applicable to the
821 operating system tier of Red Hat technologies that are based on
822 Red Hat Enterprise Linux 8, such as:
823
824 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
825 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
826 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
827 8 image
828
829
830 DISA STIG with GUI for Red Hat Enterprise Linux 8
831
832 Profile ID: xccdf_org.ssgproject.content_profile_stig_gui
833
834 This profile contains configuration checks that align to the
835 DISA STIG with GUI for Red Hat Enterprise Linux 8 V1R11.
836
837 In addition to being applicable to Red Hat Enterprise Linux 8,
838 DISA recognizes this configuration baseline as applicable to the
839 operating system tier of Red Hat technologies that are based on
840 Red Hat Enterprise Linux 8, such as:
841
842 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
843 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
844 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
845 8 image
846
847 Warning: The installation and use of a Graphical User Interface
848 (GUI) increases your attack vector and decreases your overall
849 security posture. If your Information Systems Security Officer
850 (ISSO) lacks a documented operational requirement for a graphi‐
851 cal user interface, please consider using the standard DISA STIG
852 for Red Hat Enterprise Linux 8 profile.
853
854
855
856
857
859 Source data stream: ssg-chromium-ds.xml
860
861 The Guide to the Secure Configuration of Chromium is broken into 'pro‐
862 files', groupings of security settings that correlate to a known pol‐
863 icy. Available profiles are:
864
865
866
867 Upstream STIG for Google Chromium
868
869 Profile ID: xccdf_org.ssgproject.content_profile_stig
870
871 This profile is developed under the DoD consensus model and DISA
872 FSO Vendor STIG process, serving as the upstream development en‐
873 vironment for the Google Chromium STIG.
874
875 As a result of the upstream/downstream relationship between the
876 SCAP Security Guide project and the official DISA FSO STIG base‐
877 line, users should expect variance between SSG and DISA FSO con‐
878 tent. For official DISA FSO STIG content, refer to https://pub‐
879 lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
880 rity%2Cbrowser-guidance.
881
882 While this profile is packaged by Red Hat as part of the SCAP
883 Security Guide package, please note that commercial support of
884 this SCAP content is NOT available. This profile is provided as
885 example SCAP content with no endorsement for suitability or pro‐
886 duction readiness. Support for this profile is provided by the
887 upstream SCAP Security Guide community on a best-effort basis.
888 The upstream project homepage is https://www.open-scap.org/secu‐
889 rity-policies/scap-security-guide/.
890
891
892
893
894
896 Source data stream: ssg-cs9-ds.xml
897
898 The Guide to the Secure Configuration of Red Hat Enterprise Linux 9 is
899 broken into 'profiles', groupings of security settings that correlate
900 to a known policy. Available profiles are:
901
902
903
904 ANSSI-BP-028 (enhanced)
905
906 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
907 hanced
908
909 This profile contains configurations that align to ANSSI-BP-028
910 v2.0 at the enhanced hardening level.
911
912 ANSSI is the French National Information Security Agency, and
913 stands for Agence nationale de la sécurité des systèmes d'infor‐
914 mation. ANSSI-BP-028 is a configuration recommendation for
915 GNU/Linux systems.
916
917 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
918 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
919 securite-relatives-a-un-systeme-gnulinux/
920
921
922 ANSSI-BP-028 (high)
923
924 Profile ID: xccdf_org.ssgproject.content_pro‐
925 file_anssi_bp28_high
926
927 This profile contains configurations that align to ANSSI-BP-028
928 v2.0 at the high hardening level.
929
930 ANSSI is the French National Information Security Agency, and
931 stands for Agence nationale de la sécurité des systèmes d'infor‐
932 mation. ANSSI-BP-028 is a configuration recommendation for
933 GNU/Linux systems.
934
935 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
936 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
937 securite-relatives-a-un-systeme-gnulinux/
938
939
940 ANSSI-BP-028 (intermediary)
941
942 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
943 termediary
944
945 This profile contains configurations that align to ANSSI-BP-028
946 v2.0 at the intermediary hardening level.
947
948 ANSSI is the French National Information Security Agency, and
949 stands for Agence nationale de la sécurité des systèmes d'infor‐
950 mation. ANSSI-BP-028 is a configuration recommendation for
951 GNU/Linux systems.
952
953 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
954 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
955 securite-relatives-a-un-systeme-gnulinux/
956
957
958 ANSSI-BP-028 (minimal)
959
960 Profile ID: xccdf_org.ssgproject.content_pro‐
961 file_anssi_bp28_minimal
962
963 This profile contains configurations that align to ANSSI-BP-028
964 v2.0 at the minimal hardening level.
965
966 ANSSI is the French National Information Security Agency, and
967 stands for Agence nationale de la sécurité des systèmes d'infor‐
968 mation. ANSSI-BP-028 is a configuration recommendation for
969 GNU/Linux systems.
970
971 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
972 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
973 securite-relatives-a-un-systeme-gnulinux/
974
975
976 CCN Red Hat Enterprise Linux 9 - Advanced
977
978 Profile ID: xccdf_org.ssgproject.content_profile_ccn_advanced
979
980 This profile defines a baseline that aligns with the "Advanced"
981 configuration of the CCN-STIC-610A22 Guide issued by the Na‐
982 tional Cryptological Center of Spain in 2022-10.
983
984 The CCN-STIC-610A22 guide includes hardening settings for Red
985 Hat Enterprise Linux 9 at basic, intermediate, and advanced lev‐
986 els.
987
988
989 CCN Red Hat Enterprise Linux 9 - Basic
990
991 Profile ID: xccdf_org.ssgproject.content_profile_ccn_basic
992
993 This profile defines a baseline that aligns with the "Basic"
994 configuration of the CCN-STIC-610A22 Guide issued by the Na‐
995 tional Cryptological Center of Spain in 2022-10.
996
997 The CCN-STIC-610A22 guide includes hardening settings for Red
998 Hat Enterprise Linux 9 at basic, intermediate, and advanced lev‐
999 els.
1000
1001
1002 CCN Red Hat Enterprise Linux 9 - Intermediate
1003
1004 Profile ID: xccdf_org.ssgproject.content_profile_ccn_intermedi‐
1005 ate
1006
1007 This profile defines a baseline that aligns with the "Intermedi‐
1008 ate" configuration of the CCN-STIC-610A22 Guide issued by the
1009 National Cryptological Center of Spain in 2022-10.
1010
1011 The CCN-STIC-610A22 guide includes hardening settings for Red
1012 Hat Enterprise Linux 9 at basic, intermediate, and advanced lev‐
1013 els.
1014
1015
1016 CIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Server
1017
1018 Profile ID: xccdf_org.ssgproject.content_profile_cis
1019
1020 This profile defines a baseline that aligns to the "Level 2 -
1021 Server" configuration from the Center for Internet Security® Red
1022 Hat Enterprise Linux 9 Benchmark™, v1.0.0, released 2022-11-28.
1023
1024 This profile includes Center for Internet Security® Red Hat En‐
1025 terprise Linux 9 CIS Benchmarks™ content.
1026
1027
1028 CIS Red Hat Enterprise Linux 9 Benchmark for Level 1 - Server
1029
1030 Profile ID: xccdf_org.ssgproject.content_profile_cis_server_l1
1031
1032 This profile defines a baseline that aligns to the "Level 1 -
1033 Server" configuration from the Center for Internet Security® Red
1034 Hat Enterprise Linux 9 Benchmark™, v1.0.0, released 2022-11-28.
1035
1036 This profile includes Center for Internet Security® Red Hat En‐
1037 terprise Linux 9 CIS Benchmarks™ content.
1038
1039
1040 CIS Red Hat Enterprise Linux 9 Benchmark for Level 1 - Workstation
1041
1042 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
1043 tion_l1
1044
1045 This profile defines a baseline that aligns to the "Level 1 -
1046 Workstation" configuration from the Center for Internet Secu‐
1047 rity® Red Hat Enterprise Linux 9 Benchmark™, v1.0.0, released
1048 2022-11-28.
1049
1050 This profile includes Center for Internet Security® Red Hat En‐
1051 terprise Linux 9 CIS Benchmarks™ content.
1052
1053
1054 CIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Workstation
1055
1056 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
1057 tion_l2
1058
1059 This profile defines a baseline that aligns to the "Level 2 -
1060 Workstation" configuration from the Center for Internet Secu‐
1061 rity® Red Hat Enterprise Linux 9 Benchmark™, v1.0.0, released
1062 2022-11-28.
1063
1064 This profile includes Center for Internet Security® Red Hat En‐
1065 terprise Linux 9 CIS Benchmarks™ content.
1066
1067
1068 DRAFT - Unclassified Information in Non-federal Information Systems and
1069 Organizations (NIST 800-171)
1070
1071 Profile ID: xccdf_org.ssgproject.content_profile_cui
1072
1073 From NIST 800-171, Section 2.2: Security requirements for pro‐
1074 tecting the confidentiality of CUI in nonfederal information
1075 systems and organizations have a well-defined structure that
1076 consists of:
1077
1078 (i) a basic security requirements section; (ii) a derived secu‐
1079 rity requirements section.
1080
1081 The basic security requirements are obtained from FIPS Publica‐
1082 tion 200, which provides the high-level and fundamental security
1083 requirements for federal information and information systems.
1084 The derived security requirements, which supplement the basic
1085 security requirements, are taken from the security controls in
1086 NIST Special Publication 800-53.
1087
1088 This profile configures Red Hat Enterprise Linux 9 to the NIST
1089 Special Publication 800-53 controls identified for securing Con‐
1090 trolled Unclassified Information (CUI)."
1091
1092
1093 Australian Cyber Security Centre (ACSC) Essential Eight
1094
1095 Profile ID: xccdf_org.ssgproject.content_profile_e8
1096
1097 This profile contains configuration checks for Red Hat Enter‐
1098 prise Linux 9 that align to the Australian Cyber Security Centre
1099 (ACSC) Essential Eight.
1100
1101 A copy of the Essential Eight in Linux Environments guide can be
1102 found at the ACSC website:
1103
1104 https://www.cyber.gov.au/acsc/view-all-content/publica‐
1105 tions/hardening-linux-workstations-and-servers
1106
1107
1108 Health Insurance Portability and Accountability Act (HIPAA)
1109
1110 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
1111
1112 The HIPAA Security Rule establishes U.S. national standards to
1113 protect individuals’ electronic personal health information that
1114 is created, received, used, or maintained by a covered entity.
1115 The Security Rule requires appropriate administrative, physical
1116 and technical safeguards to ensure the confidentiality, integ‐
1117 rity, and security of electronic protected health information.
1118
1119 This profile configures Red Hat Enterprise Linux 9 to the HIPAA
1120 Security Rule identified for securing of electronic protected
1121 health information. Use of this profile in no way guarantees or
1122 makes claims against legal compliance against the HIPAA Security
1123 Rule(s).
1124
1125
1126 Australian Cyber Security Centre (ACSC) ISM Official
1127
1128 Profile ID: xccdf_org.ssgproject.content_profile_ism_o
1129
1130 This profile contains configuration checks for Red Hat Enter‐
1131 prise Linux 9 that align to the Australian Cyber Security Centre
1132 (ACSC) Information Security Manual (ISM) with the applicability
1133 marking of OFFICIAL.
1134
1135 The ISM uses a risk-based approach to cyber security. This pro‐
1136 file provides a guide to aligning Red Hat Enterprise Linux secu‐
1137 rity controls with the ISM, which can be used to select controls
1138 specific to an organisation's security posture and risk profile.
1139
1140 A copy of the ISM can be found at the ACSC website:
1141
1142 https://www.cyber.gov.au/ism
1143
1144
1145 Protection Profile for General Purpose Operating Systems
1146
1147 Profile ID: xccdf_org.ssgproject.content_profile_ospp
1148
1149 This profile is part of Red Hat Enterprise Linux 9 Common Crite‐
1150 ria Guidance documentation for Target of Evaluation based on
1151 Protection Profile for General Purpose Operating Systems (OSPP)
1152 version 4.3 and Functional Package for SSH version 1.0.
1153
1154 Where appropriate, CNSSI 1253 or DoD-specific values are used
1155 for configuration, based on Configuration Annex to the OSPP.
1156
1157
1158 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 9
1159
1160 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1161
1162 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
1163 plied.
1164
1165
1166 DRAFT - DISA STIG for Red Hat Enterprise Linux 9
1167
1168 Profile ID: xccdf_org.ssgproject.content_profile_stig
1169
1170 This is a draft profile based on its RHEL8 version for experi‐
1171 mental purposes. It is not based on the DISA STIG for RHEL9,
1172 because this one was not available at time of the release.
1173
1174 In addition to being applicable to Red Hat Enterprise Linux 9,
1175 DISA recognizes this configuration baseline as applicable to the
1176 operating system tier of Red Hat technologies that are based on
1177 Red Hat Enterprise Linux 9, such as:
1178
1179 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
1180 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1181 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1182 9 image
1183
1184
1185 DRAFT - DISA STIG with GUI for Red Hat Enterprise Linux 9
1186
1187 Profile ID: xccdf_org.ssgproject.content_profile_stig_gui
1188
1189 This is a draft profile based on its RHEL8 version for experi‐
1190 mental purposes. It is not based on the DISA STIG for RHEL9,
1191 because this one was not available at time of the release.
1192
1193 In addition to being applicable to Red Hat Enterprise Linux 9,
1194 DISA recognizes this configuration baseline as applicable to the
1195 operating system tier of Red Hat technologies that are based on
1196 Red Hat Enterprise Linux 9, such as:
1197
1198 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
1199 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
1200 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
1201 9 image
1202
1203 Warning: The installation and use of a Graphical User Interface
1204 (GUI) increases your attack vector and decreases your overall
1205 security posture. If your Information Systems Security Officer
1206 (ISSO) lacks a documented operational requirement for a graphi‐
1207 cal user interface, please consider using the standard DISA STIG
1208 for Red Hat Enterprise Linux 9 profile.
1209
1210
1211
1212
1213
1215 Source data stream: ssg-debian10-ds.xml
1216
1217 The Guide to the Secure Configuration of Debian 10 is broken into 'pro‐
1218 files', groupings of security settings that correlate to a known pol‐
1219 icy. Available profiles are:
1220
1221
1222
1223 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
1224
1225 Profile ID: xccdf_org.ssgproject.content_pro‐
1226 file_anssi_np_nt28_average
1227
1228 This profile contains items for GNU/Linux installations already
1229 protected by multiple higher level security stacks.
1230
1231
1232 Profile for ANSSI DAT-NT28 High (Enforced) Level
1233
1234 Profile ID: xccdf_org.ssgproject.content_pro‐
1235 file_anssi_np_nt28_high
1236
1237 This profile contains items for GNU/Linux installations storing
1238 sensitive information that can be accessible from unauthenti‐
1239 cated or uncontroled networks.
1240
1241
1242 Profile for ANSSI DAT-NT28 Minimal Level
1243
1244 Profile ID: xccdf_org.ssgproject.content_pro‐
1245 file_anssi_np_nt28_minimal
1246
1247 This profile contains items to be applied systematically.
1248
1249
1250 Profile for ANSSI DAT-NT28 Restrictive Level
1251
1252 Profile ID: xccdf_org.ssgproject.content_pro‐
1253 file_anssi_np_nt28_restrictive
1254
1255 This profile contains items for GNU/Linux installations exposed
1256 to unauthenticated flows or multiple sources.
1257
1258
1259 Standard System Security Profile for Debian 10
1260
1261 Profile ID: xccdf_org.ssgproject.content_profile_standard
1262
1263 This profile contains rules to ensure standard security baseline
1264 of a Debian 10 system. Regardless of your system's workload all
1265 of these checks should pass.
1266
1267
1268
1269
1270
1272 Source data stream: ssg-debian11-ds.xml
1273
1274 The Guide to the Secure Configuration of Debian 11 is broken into 'pro‐
1275 files', groupings of security settings that correlate to a known pol‐
1276 icy. Available profiles are:
1277
1278
1279
1280 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
1281
1282 Profile ID: xccdf_org.ssgproject.content_pro‐
1283 file_anssi_np_nt28_average
1284
1285 This profile contains items for GNU/Linux installations already
1286 protected by multiple higher level security stacks.
1287
1288
1289 Profile for ANSSI DAT-NT28 High (Enforced) Level
1290
1291 Profile ID: xccdf_org.ssgproject.content_pro‐
1292 file_anssi_np_nt28_high
1293
1294 This profile contains items for GNU/Linux installations storing
1295 sensitive information that can be accessible from unauthenti‐
1296 cated or uncontroled networks.
1297
1298
1299 Profile for ANSSI DAT-NT28 Minimal Level
1300
1301 Profile ID: xccdf_org.ssgproject.content_pro‐
1302 file_anssi_np_nt28_minimal
1303
1304 This profile contains items to be applied systematically.
1305
1306
1307 Profile for ANSSI DAT-NT28 Restrictive Level
1308
1309 Profile ID: xccdf_org.ssgproject.content_pro‐
1310 file_anssi_np_nt28_restrictive
1311
1312 This profile contains items for GNU/Linux installations exposed
1313 to unauthenticated flows or multiple sources.
1314
1315
1316 Standard System Security Profile for Debian 11
1317
1318 Profile ID: xccdf_org.ssgproject.content_profile_standard
1319
1320 This profile contains rules to ensure standard security baseline
1321 of a Debian 11 system. Regardless of your system's workload all
1322 of these checks should pass.
1323
1324
1325
1326
1327
1329 Service
1330 Source data stream: ssg-eks-ds.xml
1331
1332 The Guide to the Secure Configuration of Amazon Elastic Kubernetes Ser‐
1333 vice is broken into 'profiles', groupings of security settings that
1334 correlate to a known policy. Available profiles are:
1335
1336
1337
1338 CIS Amazon Elastic Kubernetes Service (EKS) Benchmark - Node
1339
1340 Profile ID: xccdf_org.ssgproject.content_profile_cis-node
1341
1342 This profile defines a baseline that aligns to the Center for
1343 Internet Security® Amazon Elastic Kubernetes Service (EKS)
1344 Benchmark™, V1.0.1.
1345
1346 This profile includes Center for Internet Security® Amazon Elas‐
1347 tic Kubernetes Service (EKS)™ content.
1348
1349 This profile is applicable to EKS 1.21 and greater.
1350
1351
1352 CIS Amazon Elastic Kubernetes Service Benchmark - Platform
1353
1354 Profile ID: xccdf_org.ssgproject.content_profile_cis
1355
1356 This profile defines a baseline that aligns to the Center for
1357 Internet Security® Amazon Elastic Kubernetes Service (EKS)
1358 Benchmark™, V1.0.1.
1359
1360 This profile includes Center for Internet Security® Amazon Elas‐
1361 tic Kubernetes Service (EKS)™ content.
1362
1363 This profile is applicable to EKS 1.21 and greater.
1364
1365
1366
1367
1368
1370 Source data stream: ssg-fedora-ds.xml
1371
1372 The Guide to the Secure Configuration of Fedora is broken into 'pro‐
1373 files', groupings of security settings that correlate to a known pol‐
1374 icy. Available profiles are:
1375
1376
1377
1378 CUSP - Common User Security Profile for Fedora Workstation
1379
1380 Profile ID: xccdf_org.ssgproject.content_profile_cusp_fedora
1381
1382 This profile contains rules to harden Fedora Linux according to
1383 the Common User Security Guide for Fedora Workstation.
1384
1385
1386 OSPP - Protection Profile for General Purpose Operating Systems
1387
1388 Profile ID: xccdf_org.ssgproject.content_profile_ospp
1389
1390 This profile reflects mandatory configuration controls identi‐
1391 fied in the NIAP Configuration Annex to the Protection Profile
1392 for General Purpose Operating Systems (Protection Profile Ver‐
1393 sion 4.2).
1394
1395 As Fedora OS is moving target, this profile does not guarantee
1396 to provide security levels required from US National Security
1397 Systems. Main goal of the profile is to provide Fedora develop‐
1398 ers with hardened environment similar to the one mandated by US
1399 National Security Systems.
1400
1401
1402 PCI-DSS v3.2.1 Control Baseline for Fedora
1403
1404 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1405
1406 Ensures PCI-DSS v3.2.1 related security configuration settings
1407 are applied.
1408
1409
1410 Standard System Security Profile for Fedora
1411
1412 Profile ID: xccdf_org.ssgproject.content_profile_standard
1413
1414 This profile contains rules to ensure standard security baseline
1415 of a Fedora system. Regardless of your system's workload all of
1416 these checks should pass.
1417
1418
1419
1420
1421
1423 Source data stream: ssg-firefox-ds.xml
1424
1425 The Guide to the Secure Configuration of Firefox is broken into 'pro‐
1426 files', groupings of security settings that correlate to a known pol‐
1427 icy. Available profiles are:
1428
1429
1430
1431 CUSP - Common User Security Profile for Mozilla Firefox
1432
1433 Profile ID: xccdf_org.ssgproject.content_profile_cusp_firefox
1434
1435 This profile contains rules to harden Mozilla Firefox according
1436 to rule 6.1 in the Common User Security Guide for Fedora Work‐
1437 station.
1438
1439
1440 Mozilla Firefox STIG
1441
1442 Profile ID: xccdf_org.ssgproject.content_profile_stig
1443
1444 This profile is developed under the DoD consensus model and DISA
1445 FSO Vendor STIG process, serving as the upstream development en‐
1446 vironment for the Firefox STIG.
1447
1448 As a result of the upstream/downstream relationship between the
1449 SCAP Security Guide project and the official DISA FSO STIG base‐
1450 line, users should expect variance between SSG and DISA FSO con‐
1451 tent. For official DISA FSO STIG content, refer to https://pub‐
1452 lic.cyber.mil/stigs/downloads/?_dl_facet_stigs=app-secu‐
1453 rity%2Cbrowser-guidance.
1454
1455 While this profile is packaged by Red Hat as part of the SCAP
1456 Security Guide package, please note that commercial support of
1457 this SCAP content is NOT available. This profile is provided as
1458 example SCAP content with no endorsement for suitability or pro‐
1459 duction readiness. Support for this profile is provided by the
1460 upstream SCAP Security Guide community on a best-effort basis.
1461 The upstream project homepage is https://www.open-scap.org/secu‐
1462 rity-policies/scap-security-guide/.
1463
1464
1465
1466
1467
1469 Source data stream: ssg-macos1015-ds.xml
1470
1471 The Guide to the Secure Configuration of Apple macOS 10.15 is broken
1472 into 'profiles', groupings of security settings that correlate to a
1473 known policy. Available profiles are:
1474
1475
1476
1477 NIST 800-53 Moderate-Impact Baseline for Apple macOS 10.15 Catalina
1478
1479 Profile ID: xccdf_org.ssgproject.content_profile_moderate
1480
1481 This compliance profile reflects the core set of Moderate-Impact
1482 Baseline configuration settings for deployment of Apple macOS
1483 10.15 Catalina into U.S. Defense, Intelligence, and Civilian
1484 agencies. Development partners and sponsors include the U.S.
1485 National Institute of Standards and Technology (NIST), U.S. De‐
1486 partment of Defense, and the the National Security Agency.
1487
1488 This baseline implements configuration requirements from the
1489 following sources:
1490
1491 - NIST 800-53 control selections for Moderate-Impact systems
1492 (NIST 800-53)
1493
1494 For any differing configuration requirements, e.g. password
1495 lengths, the stricter security setting was chosen. Security Re‐
1496 quirement Traceability Guides (RTMs) and sample System Security
1497 Configuration Guides are provided via the scap-security-guide-
1498 docs package.
1499
1500 This profile reflects U.S. Government consensus content and is
1501 developed through the ComplianceAsCode initiative, championed by
1502 the National Security Agency. Except for differences in format‐
1503 ting to accommodate publishing processes, this profile mirrors
1504 ComplianceAsCode content as minor divergences, such as bugfixes,
1505 work through the consensus and release processes.
1506
1507
1508
1509
1510
1512 Platform 4
1513 Source data stream: ssg-ocp4-ds.xml
1514
1515 The Guide to the Secure Configuration of Red Hat OpenShift Container
1516 Platform 4 is broken into 'profiles', groupings of security settings
1517 that correlate to a known policy. Available profiles are:
1518
1519
1520
1521 CIS Red Hat OpenShift Container Platform 4 Benchmark
1522
1523 Profile ID: xccdf_org.ssgproject.content_profile_cis-node
1524
1525 This profile defines a baseline that aligns to the Center for
1526 Internet Security® Red Hat OpenShift Container Platform 4 Bench‐
1527 mark™, V1.4.
1528
1529 This profile includes Center for Internet Security® Red Hat
1530 OpenShift Container Platform 4 CIS Benchmarks™ content.
1531
1532 Note that this part of the profile is meant to run on the Oper‐
1533 ating System that Red Hat OpenShift Container Platform 4 runs on
1534 top of.
1535
1536 This profile is applicable to OpenShift versions 4.10 and
1537 greater.
1538
1539
1540 CIS Red Hat OpenShift Container Platform 4 Benchmark
1541
1542 Profile ID: xccdf_org.ssgproject.content_profile_cis
1543
1544 This profile defines a baseline that aligns to the Center for
1545 Internet Security® Red Hat OpenShift Container Platform 4 Bench‐
1546 mark™, V1.4.
1547
1548 This profile includes Center for Internet Security® Red Hat
1549 OpenShift Container Platform 4 CIS Benchmarks™ content.
1550
1551 Note that this part of the profile is meant to run on the Plat‐
1552 form that Red Hat OpenShift Container Platform 4 runs on top of.
1553
1554 This profile is applicable to OpenShift versions 4.10 and
1555 greater.
1556
1557
1558 Australian Cyber Security Centre (ACSC) Essential Eight
1559
1560 Profile ID: xccdf_org.ssgproject.content_profile_e8
1561
1562 This profile contains configuration checks for Red Hat OpenShift
1563 Container Platform that align to the Australian Cyber Security
1564 Centre (ACSC) Essential Eight.
1565
1566 A copy of the Essential Eight in Linux Environments guide can be
1567 found at the ACSC website:
1568
1569 https://www.cyber.gov.au/acsc/view-all-content/publica‐
1570 tions/hardening-linux-workstations-and-servers
1571
1572
1573 NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Node level
1574
1575 Profile ID: xccdf_org.ssgproject.content_profile_high-node
1576
1577 This compliance profile reflects the core set of High-Impact
1578 Baseline configuration settings for deployment of Red Hat Open‐
1579 Shift Container Platform into U.S. Defense, Intelligence, and
1580 Civilian agencies. Development partners and sponsors include
1581 the U.S. National Institute of Standards and Technology (NIST),
1582 U.S. Department of Defense, the National Security Agency, and
1583 Red Hat.
1584
1585 This baseline implements configuration requirements from the
1586 following sources:
1587
1588 - NIST 800-53 control selections for High-Impact systems (NIST
1589 800-53)
1590
1591 For any differing configuration requirements, e.g. password
1592 lengths, the stricter security setting was chosen. Security Re‐
1593 quirement Traceability Guides (RTMs) and sample System Security
1594 Configuration Guides are provided via the scap-security-guide-
1595 docs package.
1596
1597 This profile reflects U.S. Government consensus content and is
1598 developed through the ComplianceAsCode initiative, championed by
1599 the National Security Agency. Except for differences in format‐
1600 ting to accommodate publishing processes, this profile mirrors
1601 ComplianceAsCode content as minor divergences, such as bugfixes,
1602 work through the consensus and release processes.
1603
1604
1605 NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Platform level
1606
1607 Profile ID: xccdf_org.ssgproject.content_profile_high
1608
1609 This compliance profile reflects the core set of High-Impact
1610 Baseline configuration settings for deployment of Red Hat Open‐
1611 Shift Container Platform into U.S. Defense, Intelligence, and
1612 Civilian agencies. Development partners and sponsors include
1613 the U.S. National Institute of Standards and Technology (NIST),
1614 U.S. Department of Defense, the National Security Agency, and
1615 Red Hat.
1616
1617 This baseline implements configuration requirements from the
1618 following sources:
1619
1620 - NIST 800-53 control selections for High-Impact systems (NIST
1621 800-53)
1622
1623 For any differing configuration requirements, e.g. password
1624 lengths, the stricter security setting was chosen. Security Re‐
1625 quirement Traceability Guides (RTMs) and sample System Security
1626 Configuration Guides are provided via the scap-security-guide-
1627 docs package.
1628
1629 This profile reflects U.S. Government consensus content and is
1630 developed through the ComplianceAsCode initiative, championed by
1631 the National Security Agency. Except for differences in format‐
1632 ting to accommodate publishing processes, this profile mirrors
1633 ComplianceAsCode content as minor divergences, such as bugfixes,
1634 work through the consensus and release processes.
1635
1636
1637 NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level
1638
1639 Profile ID: xccdf_org.ssgproject.content_profile_moderate-node
1640
1641 This compliance profile reflects the core set of Moderate-Impact
1642 Baseline configuration settings for deployment of Red Hat Open‐
1643 Shift Container Platform into U.S. Defense, Intelligence, and
1644 Civilian agencies. Development partners and sponsors include
1645 the U.S. National Institute of Standards and Technology (NIST),
1646 U.S. Department of Defense, the National Security Agency, and
1647 Red Hat.
1648
1649 This baseline implements configuration requirements from the
1650 following sources:
1651
1652 - NIST 800-53 control selections for Moderate-Impact systems
1653 (NIST 800-53)
1654
1655 For any differing configuration requirements, e.g. password
1656 lengths, the stricter security setting was chosen. Security Re‐
1657 quirement Traceability Guides (RTMs) and sample System Security
1658 Configuration Guides are provided via the scap-security-guide-
1659 docs package.
1660
1661 This profile reflects U.S. Government consensus content and is
1662 developed through the ComplianceAsCode initiative, championed by
1663 the National Security Agency. Except for differences in format‐
1664 ting to accommodate publishing processes, this profile mirrors
1665 ComplianceAsCode content as minor divergences, such as bugfixes,
1666 work through the consensus and release processes.
1667
1668
1669 NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Platform
1670 level
1671
1672 Profile ID: xccdf_org.ssgproject.content_profile_moderate
1673
1674 This compliance profile reflects the core set of Moderate-Impact
1675 Baseline configuration settings for deployment of Red Hat Open‐
1676 Shift Container Platform into U.S. Defense, Intelligence, and
1677 Civilian agencies. Development partners and sponsors include
1678 the U.S. National Institute of Standards and Technology (NIST),
1679 U.S. Department of Defense, the National Security Agency, and
1680 Red Hat.
1681
1682 This baseline implements configuration requirements from the
1683 following sources:
1684
1685 - NIST 800-53 control selections for Moderate-Impact systems
1686 (NIST 800-53)
1687
1688 For any differing configuration requirements, e.g. password
1689 lengths, the stricter security setting was chosen. Security Re‐
1690 quirement Traceability Guides (RTMs) and sample System Security
1691 Configuration Guides are provided via the scap-security-guide-
1692 docs package.
1693
1694 This profile reflects U.S. Government consensus content and is
1695 developed through the ComplianceAsCode initiative, championed by
1696 the National Security Agency. Except for differences in format‐
1697 ting to accommodate publishing processes, this profile mirrors
1698 ComplianceAsCode content as minor divergences, such as bugfixes,
1699 work through the consensus and release processes.
1700
1701
1702 North American Electric Reliability Corporation (NERC) Critical Infra‐
1703 structure Protection (CIP) cybersecurity standards profile for the Red
1704 Hat OpenShift Container Platform - Node level
1705
1706 Profile ID: xccdf_org.ssgproject.content_profile_nerc-cip-node
1707
1708 This compliance profile reflects a set of security recommenda‐
1709 tions for the usage of Red Hat OpenShift Container Platform in
1710 critical infrastructure in the energy sector. This follows the
1711 recommendations coming from the following CIP standards:
1712
1713 - CIP-002-5 - CIP-003-8 - CIP-004-6 - CIP-005-6 - CIP-007-3 -
1714 CIP-007-6 - CIP-009-6
1715
1716
1717 North American Electric Reliability Corporation (NERC) Critical Infra‐
1718 structure Protection (CIP) cybersecurity standards profile for the Red
1719 Hat OpenShift Container Platform - Platform level
1720
1721 Profile ID: xccdf_org.ssgproject.content_profile_nerc-cip
1722
1723 This compliance profile reflects a set of security recommenda‐
1724 tions for the usage of Red Hat OpenShift Container Platform in
1725 critical infrastructure in the energy sector. This follows the
1726 recommendations coming from the following CIP standards:
1727
1728 - CIP-002-5 - CIP-003-8 - CIP-004-6 - CIP-005-6 - CIP-007-3 -
1729 CIP-007-6 - CIP-009-6
1730
1731
1732 PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Plat‐
1733 form 4
1734
1735 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss-node
1736
1737 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
1738 plied.
1739
1740
1741 PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Plat‐
1742 form 4
1743
1744 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1745
1746 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
1747 plied.
1748
1749
1750 DISA STIG for Red Hat OpenShift Container Platform 4 - Node level
1751
1752 Profile ID: xccdf_org.ssgproject.content_profile_stig-node
1753
1754 This profile contains configuration checks that align to the
1755 DISA STIG for Red Hat OpenShift Container Platform 4.
1756
1757
1758 DISA STIG for Red Hat OpenShift Container Platform 4 - Platform level
1759
1760 Profile ID: xccdf_org.ssgproject.content_profile_stig
1761
1762 This profile contains configuration checks that align to the
1763 DISA STIG for Red Hat OpenShift Container Platform 4.
1764
1765
1766
1767
1768
1770 Source data stream: ssg-ol7-ds.xml
1771
1772 The Guide to the Secure Configuration of Oracle Linux 7 is broken into
1773 'profiles', groupings of security settings that correlate to a known
1774 policy. Available profiles are:
1775
1776
1777
1778 ANSSI-BP-028 (enhanced)
1779
1780 Profile ID: xccdf_org.ssgproject.content_profile_anssi_nt28_en‐
1781 hanced
1782
1783 This profile contains configurations that align to ANSSI-BP-028
1784 at the enhanced hardening level.
1785
1786 ANSSI is the French National Information Security Agency, and
1787 stands for Agence nationale de la sécurité des systèmes d'infor‐
1788 mation. ANSSI-BP-028 is a configuration recommendation for
1789 GNU/Linux systems.
1790
1791 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1792 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1793 securite-relatives-a-un-systeme-gnulinux/
1794
1795
1796 DRAFT - ANSSI-BP-028 (high)
1797
1798 Profile ID: xccdf_org.ssgproject.content_pro‐
1799 file_anssi_nt28_high
1800
1801 This profile contains configurations that align to ANSSI-BP-028
1802 at the high hardening level.
1803
1804 ANSSI is the French National Information Security Agency, and
1805 stands for Agence nationale de la sécurité des systèmes d'infor‐
1806 mation. ANSSI-BP-028 is a configuration recommendation for
1807 GNU/Linux systems.
1808
1809 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1810 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1811 securite-relatives-a-un-systeme-gnulinux/
1812
1813
1814 ANSSI-BP-028 (intermediary)
1815
1816 Profile ID: xccdf_org.ssgproject.content_profile_anssi_nt28_in‐
1817 termediary
1818
1819 This profile contains configurations that align to ANSSI-BP-028
1820 at the intermediary hardening level.
1821
1822 ANSSI is the French National Information Security Agency, and
1823 stands for Agence nationale de la sécurité des systèmes d'infor‐
1824 mation. ANSSI-BP-028 is a configuration recommendation for
1825 GNU/Linux systems.
1826
1827 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1828 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1829 securite-relatives-a-un-systeme-gnulinux/
1830
1831
1832 ANSSI-BP-028 (minimal)
1833
1834 Profile ID: xccdf_org.ssgproject.content_pro‐
1835 file_anssi_nt28_minimal
1836
1837 This profile contains configurations that align to ANSSI-BP-028
1838 at the minimal hardening level.
1839
1840 ANSSI is the French National Information Security Agency, and
1841 stands for Agence nationale de la sécurité des systèmes d'infor‐
1842 mation. ANSSI-BP-028 is a configuration recommendation for
1843 GNU/Linux systems.
1844
1845 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
1846 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
1847 securite-relatives-a-un-systeme-gnulinux/
1848
1849
1850 Criminal Justice Information Services (CJIS) Security Policy
1851
1852 Profile ID: xccdf_org.ssgproject.content_profile_cjis
1853
1854 This profile is derived from FBI's CJIS v5.4 Security Policy. A
1855 copy of this policy can be found at the CJIS Security Policy Re‐
1856 source Center:
1857
1858 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
1859 center
1860
1861
1862 Unclassified Information in Non-federal Information Systems and Organi‐
1863 zations (NIST 800-171)
1864
1865 Profile ID: xccdf_org.ssgproject.content_profile_cui
1866
1867 From NIST 800-171, Section 2.2: Security requirements for pro‐
1868 tecting the confidentiality of CUI in non-federal information
1869 systems and organizations have a well-defined structure that
1870 consists of:
1871
1872 (i) a basic security requirements section; (ii) a derived secu‐
1873 rity requirements section.
1874
1875 The basic security requirements are obtained from FIPS Publica‐
1876 tion 200, which provides the high-level and fundamental security
1877 requirements for federal information and information systems.
1878 The derived security requirements, which supplement the basic
1879 security requirements, are taken from the security controls in
1880 NIST Special Publication 800-53.
1881
1882 This profile configures Oracle Linux 7 to the NIST Special Pub‐
1883 lication 800-53 controls identified for securing Controlled Un‐
1884 classified Information (CUI).
1885
1886
1887 DRAFT - Australian Cyber Security Centre (ACSC) Essential Eight
1888
1889 Profile ID: xccdf_org.ssgproject.content_profile_e8
1890
1891 This profile contains configuration checks for Oracle Linux 7
1892 that align to the Australian Cyber Security Centre (ACSC) Essen‐
1893 tial Eight.
1894
1895 A copy of the Essential Eight in Linux Environments guide can be
1896 found at the ACSC website:
1897
1898 https://www.cyber.gov.au/acsc/view-all-content/publica‐
1899 tions/hardening-linux-workstations-and-servers
1900
1901
1902 Health Insurance Portability and Accountability Act (HIPAA)
1903
1904 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
1905
1906 The HIPAA Security Rule establishes U.S. national standards to
1907 protect individuals’ electronic personal health information that
1908 is created, received, used, or maintained by a covered entity.
1909 The Security Rule requires appropriate administrative, physical
1910 and technical safeguards to ensure the confidentiality, integ‐
1911 rity, and security of electronic protected health information.
1912
1913 This profile configures Oracle Linux 7 to the HIPAA Security
1914 Rule identified for securing of electronic protected health in‐
1915 formation. Use of this profile in no way guarantees or makes
1916 claims against legal compliance against the HIPAA Security
1917 Rule(s).
1918
1919
1920 NIST National Checklist Program Security Guide
1921
1922 Profile ID: xccdf_org.ssgproject.content_profile_ncp
1923
1924 This compliance profile reflects the core set of security re‐
1925 lated configuration settings for deployment of Oracle Linux 7
1926 into U.S. Defense, Intelligence, and Civilian agencies. Devel‐
1927 opment partners and sponsors include the U.S. National Institute
1928 of Standards and Technology (NIST), U.S. Department of Defense,
1929 the National Security Agency, and Red Hat.
1930
1931 This baseline implements configuration requirements from the
1932 following sources:
1933
1934 - Committee on National Security Systems Instruction No. 1253
1935 (CNSSI 1253) - NIST Controlled Unclassified Information (NIST
1936 800-171) - NIST 800-53 control selections for MODERATE impact
1937 systems (NIST 800-53) - U.S. Government Configuration Baseline
1938 (USGCB) - NIAP Protection Profile for General Purpose Operating
1939 Systems v4.2.1 (OSPP v4.2.1) - DISA Operating System Security
1940 Requirements Guide (OS SRG)
1941
1942 For any differing configuration requirements, e.g. password
1943 lengths, the stricter security setting was chosen. Security Re‐
1944 quirement Traceability Guides (RTMs) and sample System Security
1945 Configuration Guides are provided via the scap-security-guide-
1946 docs package.
1947
1948 This profile reflects U.S. Government consensus content and is
1949 developed through the OpenSCAP/SCAP Security Guide initiative,
1950 championed by the National Security Agency. Except for differ‐
1951 ences in formatting to accommodate publishing processes, this
1952 profile mirrors OpenSCAP/SCAP Security Guide content as minor
1953 divergences, such as bugfixes, work through the consensus and
1954 release processes.
1955
1956
1957 DRAFT - Protection Profile for General Purpose Operating Systems
1958
1959 Profile ID: xccdf_org.ssgproject.content_profile_ospp
1960
1961 This profile reflects mandatory configuration controls identi‐
1962 fied in the NIAP Configuration Annex to the Protection Profile
1963 for General Purpose Operating Systems (Protection Profile Ver‐
1964 sion 4.2.1).
1965
1966 This configuration profile is consistent with CNSSI-1253, which
1967 requires U.S. National Security Systems to adhere to certain
1968 configuration parameters. Accordingly, this configuration pro‐
1969 file is suitable for use in U.S. National Security Systems.
1970
1971
1972 PCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 7
1973
1974 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
1975
1976 Ensures PCI-DSS v3.2.1 related security configuration settings
1977 are applied.
1978
1979
1980 Security Profile of Oracle Linux 7 for SAP
1981
1982 Profile ID: xccdf_org.ssgproject.content_profile_sap
1983
1984 This profile contains rules for Oracle Linux 7 Operating System
1985 in compliance with SAP note 2069760 and SAP Security Baseline
1986 Template version 1.9 Item I-8 and section 4.1.2.2. Regardless
1987 of your system's workload all of these checks should pass.
1988
1989
1990 Standard System Security Profile for Oracle Linux 7
1991
1992 Profile ID: xccdf_org.ssgproject.content_profile_standard
1993
1994 This profile contains rules to ensure standard security baseline
1995 of Oracle Linux 7 system. Regardless of your system's workload
1996 all of these checks should pass.
1997
1998
1999 DISA STIG for Oracle Linux 7
2000
2001 Profile ID: xccdf_org.ssgproject.content_profile_stig
2002
2003 This profile contains configuration checks that align to the
2004 DISA STIG for Oracle Linux V2R12.
2005
2006
2007 DISA STIG with GUI for Oracle Linux 7
2008
2009 Profile ID: xccdf_org.ssgproject.content_profile_stig_gui
2010
2011 This profile contains configuration checks that align to the
2012 DISA STIG with GUI for Oracle Linux V2R12.
2013
2014 Warning: The installation and use of a Graphical User Interface
2015 (GUI) increases your attack vector and decreases your overall
2016 security posture. If your Information Systems Security Officer
2017 (ISSO) lacks a documented operational requirement for a graphi‐
2018 cal user interface, please consider using the standard DISA STIG
2019 for Oracle Linux 7 profile.
2020
2021
2022
2023
2024
2026 Source data stream: ssg-ol8-ds.xml
2027
2028 The Guide to the Secure Configuration of Oracle Linux 8 is broken into
2029 'profiles', groupings of security settings that correlate to a known
2030 policy. Available profiles are:
2031
2032
2033
2034 ANSSI-BP-028 (enhanced)
2035
2036 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
2037 hanced
2038
2039 This profile contains configurations that align to ANSSI-BP-028
2040 v2.0 at the enhanced hardening level.
2041
2042 ANSSI is the French National Information Security Agency, and
2043 stands for Agence nationale de la sécurité des systèmes d'infor‐
2044 mation. ANSSI-BP-028 is a configuration recommendation for
2045 GNU/Linux systems.
2046
2047 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2048 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2049 securite-relatives-a-un-systeme-gnulinux/
2050
2051
2052 ANSSI-BP-028 (high)
2053
2054 Profile ID: xccdf_org.ssgproject.content_pro‐
2055 file_anssi_bp28_high
2056
2057 This profile contains configurations that align to ANSSI-BP-028
2058 v2.0 at the high hardening level.
2059
2060 ANSSI is the French National Information Security Agency, and
2061 stands for Agence nationale de la sécurité des systèmes d'infor‐
2062 mation. ANSSI-BP-028 is a configuration recommendation for
2063 GNU/Linux systems.
2064
2065 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2066 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2067 securite-relatives-a-un-systeme-gnulinux/
2068
2069
2070 ANSSI-BP-028 (intermediary)
2071
2072 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
2073 termediary
2074
2075 This profile contains configurations that align to ANSSI-BP-028
2076 v2.0 at the intermediary hardening level.
2077
2078 ANSSI is the French National Information Security Agency, and
2079 stands for Agence nationale de la sécurité des systèmes d'infor‐
2080 mation. ANSSI-BP-028 is a configuration recommendation for
2081 GNU/Linux systems.
2082
2083 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2084 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2085 securite-relatives-a-un-systeme-gnulinux/
2086
2087
2088 ANSSI-BP-028 (minimal)
2089
2090 Profile ID: xccdf_org.ssgproject.content_pro‐
2091 file_anssi_bp28_minimal
2092
2093 This profile contains configurations that align to ANSSI-BP-028
2094 v2.0 at the minimal hardening level.
2095
2096 ANSSI is the French National Information Security Agency, and
2097 stands for Agence nationale de la sécurité des systèmes d'infor‐
2098 mation. ANSSI-BP-028 is a configuration recommendation for
2099 GNU/Linux systems.
2100
2101 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2102 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2103 securite-relatives-a-un-systeme-gnulinux/
2104
2105
2106 Criminal Justice Information Services (CJIS) Security Policy
2107
2108 Profile ID: xccdf_org.ssgproject.content_profile_cjis
2109
2110 This profile is derived from FBI's CJIS v5.4 Security Policy. A
2111 copy of this policy can be found at the CJIS Security Policy Re‐
2112 source Center:
2113
2114 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
2115 center
2116
2117
2118 Unclassified Information in Non-federal Information Systems and Organi‐
2119 zations (NIST 800-171)
2120
2121 Profile ID: xccdf_org.ssgproject.content_profile_cui
2122
2123 From NIST 800-171, Section 2.2: Security requirements for pro‐
2124 tecting the confidentiality of CUI in non-federal information
2125 systems and organizations have a well-defined structure that
2126 consists of:
2127
2128 (i) a basic security requirements section; (ii) a derived secu‐
2129 rity requirements section.
2130
2131 The basic security requirements are obtained from FIPS Publica‐
2132 tion 200, which provides the high-level and fundamental security
2133 requirements for federal information and information systems.
2134 The derived security requirements, which supplement the basic
2135 security requirements, are taken from the security controls in
2136 NIST Special Publication 800-53.
2137
2138 This profile configures Oracle Linux 8 to the NIST Special Pub‐
2139 lication 800-53 controls identified for securing Controlled Un‐
2140 classified Information (CUI).
2141
2142
2143 DRAFT - Australian Cyber Security Centre (ACSC) Essential Eight
2144
2145 Profile ID: xccdf_org.ssgproject.content_profile_e8
2146
2147 This profile contains configuration checks for Oracle Linux 8
2148 that align to the Australian Cyber Security Centre (ACSC) Essen‐
2149 tial Eight.
2150
2151 A copy of the Essential Eight in Linux Environments guide can be
2152 found at the ACSC website:
2153
2154 https://www.cyber.gov.au/acsc/view-all-content/publica‐
2155 tions/hardening-linux-workstations-and-servers
2156
2157
2158 Health Insurance Portability and Accountability Act (HIPAA)
2159
2160 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
2161
2162 The HIPAA Security Rule establishes U.S. national standards to
2163 protect individuals’ electronic personal health information that
2164 is created, received, used, or maintained by a covered entity.
2165 The Security Rule requires appropriate administrative, physical
2166 and technical safeguards to ensure the confidentiality, integ‐
2167 rity, and security of electronic protected health information.
2168
2169 This profile configures Oracle Linux 8 to the HIPAA Security
2170 Rule identified for securing of electronic protected health in‐
2171 formation. Use of this profile in no way guarantees or makes
2172 claims against legal compliance against the HIPAA Security
2173 Rule(s).
2174
2175
2176 DRAFT - Protection Profile for General Purpose Operating Systems
2177
2178 Profile ID: xccdf_org.ssgproject.content_profile_ospp
2179
2180 This profile reflects mandatory configuration controls identi‐
2181 fied in the NIAP Configuration Annex to the Protection Profile
2182 for General Purpose Operating Systems (Protection Profile Ver‐
2183 sion 4.2.1).
2184
2185 This configuration profile is consistent with CNSSI-1253, which
2186 requires U.S. National Security Systems to adhere to certain
2187 configuration parameters. Accordingly, this configuration pro‐
2188 file is suitable for use in U.S. National Security Systems.
2189
2190
2191 PCI-DSS v3.2.1 Control Baseline Draft for Oracle Linux 8
2192
2193 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
2194
2195 Ensures PCI-DSS v3.2.1 related security configuration settings
2196 are applied.
2197
2198
2199 Standard System Security Profile for Oracle Linux 8
2200
2201 Profile ID: xccdf_org.ssgproject.content_profile_standard
2202
2203 This profile contains rules to ensure standard security baseline
2204 of Oracle Linux 8 system. Regardless of your system's workload
2205 all of these checks should pass.
2206
2207
2208 DISA STIG for Oracle Linux 8
2209
2210 Profile ID: xccdf_org.ssgproject.content_profile_stig
2211
2212 This profile contains configuration checks that align to the
2213 DISA STIG for Oracle Linux 8 V1R7.
2214
2215
2216 DISA STIG with GUI for Oracle Linux 8
2217
2218 Profile ID: xccdf_org.ssgproject.content_profile_stig_gui
2219
2220 This profile contains configuration checks that align to the
2221 DISA STIG with GUI for Oracle Linux V1R7.
2222
2223 Warning: The installation and use of a Graphical User Interface
2224 (GUI) increases your attack vector and decreases your overall
2225 security posture. If your Information Systems Security Officer
2226 (ISSO) lacks a documented operational requirement for a graphi‐
2227 cal user interface, please consider using the standard DISA STIG
2228 for Oracle Linux 8 profile.
2229
2230
2231
2232
2233
2235 Source data stream: ssg-ol9-ds.xml
2236
2237 The Guide to the Secure Configuration of Oracle Linux 9 is broken into
2238 'profiles', groupings of security settings that correlate to a known
2239 policy. Available profiles are:
2240
2241
2242
2243 ANSSI-BP-028 (enhanced)
2244
2245 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
2246 hanced
2247
2248 This profile contains configurations that align to ANSSI-BP-028
2249 at the enhanced hardening level. ANSSI is the French National
2250 Information Security Agency, and stands for Agence nationale de
2251 la sécurité des systèmes d'information. ANSSI-BP-028 is a con‐
2252 figuration recommendation for GNU/Linux systems.
2253
2254 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2255 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2256 securite-relatives-a-un-systeme-gnulinux/
2257
2258
2259 ANSSI-BP-028 (high)
2260
2261 Profile ID: xccdf_org.ssgproject.content_pro‐
2262 file_anssi_bp28_high
2263
2264 This profile contains configurations that align to ANSSI-BP-028
2265 at the high hardening level. ANSSI is the French National Infor‐
2266 mation Security Agency, and stands for Agence nationale de la
2267 sécurité des systèmes d'information. ANSSI-BP-028 is a configu‐
2268 ration recommendation for GNU/Linux systems.
2269
2270 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2271 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2272 securite-relatives-a-un-systeme-gnulinux/
2273
2274
2275 ANSSI-BP-028 (intermediary)
2276
2277 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
2278 termediary
2279
2280 This profile contains configurations that align to ANSSI-BP-028
2281 at the intermediary hardening level. ANSSI is the French Na‐
2282 tional Information Security Agency, and stands for Agence na‐
2283 tionale de la sécurité des systèmes d'information. ANSSI-BP-028
2284 is a configuration recommendation for GNU/Linux systems.
2285
2286 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2287 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2288 securite-relatives-a-un-systeme-gnulinux/
2289
2290
2291 ANSSI-BP-028 (minimal)
2292
2293 Profile ID: xccdf_org.ssgproject.content_pro‐
2294 file_anssi_bp28_minimal
2295
2296 This profile contains configurations that align to ANSSI-BP-028
2297 at the minimal hardening level. ANSSI is the French National In‐
2298 formation Security Agency, and stands for Agence nationale de la
2299 sécurité des systèmes d'information. ANSSI-BP-028 is a configu‐
2300 ration recommendation for GNU/Linux systems.
2301
2302 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2303 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2304 securite-relatives-a-un-systeme-gnulinux/
2305
2306
2307 DRAFT - Unclassified Information in Non-federal Information Systems and
2308 Organizations (NIST 800-171)
2309
2310 Profile ID: xccdf_org.ssgproject.content_profile_cui
2311
2312 From NIST 800-171, Section 2.2: Security requirements for pro‐
2313 tecting the confidentiality of CUI in nonfederal information
2314 systems and organizations have a well-defined structure that
2315 consists of:
2316
2317 (i) a basic security requirements section; (ii) a derived secu‐
2318 rity requirements section.
2319
2320 The basic security requirements are obtained from FIPS Publica‐
2321 tion 200, which provides the high-level and fundamental security
2322 requirements for federal information and information systems.
2323 The derived security requirements, which supplement the basic
2324 security requirements, are taken from the security controls in
2325 NIST Special Publication 800-53.
2326
2327 This profile configures Oracle Linux 9 to the NIST Special Pub‐
2328 lication 800-53 controls identified for securing Controlled Un‐
2329 classified Information (CUI)."
2330
2331
2332 Australian Cyber Security Centre (ACSC) Essential Eight
2333
2334 Profile ID: xccdf_org.ssgproject.content_profile_e8
2335
2336 This profile contains configuration checks for Oracle Linux 9
2337 that align to the Australian Cyber Security Centre (ACSC) Essen‐
2338 tial Eight.
2339
2340 A copy of the Essential Eight in Linux Environments guide can be
2341 found at the ACSC website:
2342
2343 https://www.cyber.gov.au/acsc/view-all-content/publica‐
2344 tions/hardening-linux-workstations-and-servers
2345
2346
2347 Health Insurance Portability and Accountability Act (HIPAA)
2348
2349 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
2350
2351 The HIPAA Security Rule establishes U.S. national standards to
2352 protect individuals’ electronic personal health information that
2353 is created, received, used, or maintained by a covered entity.
2354 The Security Rule requires appropriate administrative, physical
2355 and technical safeguards to ensure the confidentiality, integ‐
2356 rity, and security of electronic protected health information.
2357
2358 This profile configures Oracle Linux 9 to the HIPAA Security
2359 Rule identified for securing of electronic protected health in‐
2360 formation. Use of this profile in no way guarantees or makes
2361 claims against legal compliance against the HIPAA Security
2362 Rule(s).
2363
2364
2365 DRAFT - Protection Profile for General Purpose Operating Systems
2366
2367 Profile ID: xccdf_org.ssgproject.content_profile_ospp
2368
2369 This profile is part of Oracle Linux 9 Common Criteria Guidance
2370 documentation for Target of Evaluation based on Protection Pro‐
2371 file for General Purpose Operating Systems (OSPP) version 4.2.1
2372 and Functional Package for SSH version 1.0.
2373
2374 Where appropriate, CNSSI 1253 or DoD-specific values are used
2375 for configuration, based on Configuration Annex to the OSPP.
2376
2377
2378 PCI-DSS v3.2.1 Control Baseline for Oracle Linux 9
2379
2380 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
2381
2382 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
2383 plied.
2384
2385
2386 Standard System Security Profile for Oracle Linux 9
2387
2388 Profile ID: xccdf_org.ssgproject.content_profile_standard
2389
2390 This profile contains rules to ensure standard security baseline
2391 of Oracle Linux 9 system. Regardless of your system's workload
2392 all of these checks should pass.
2393
2394
2395 DRAFT - DISA STIG for Oracle Linux 9
2396
2397 Profile ID: xccdf_org.ssgproject.content_profile_stig
2398
2399 This is a draft profile based on its OL8 version for experimen‐
2400 tal purposes. It is not based on the DISA STIG for OL9, because
2401 this one was not available at time of the release.
2402
2403
2404 DRAFT - DISA STIG with GUI for Oracle Linux 9
2405
2406 Profile ID: xccdf_org.ssgproject.content_profile_stig_gui
2407
2408 This is a draft profile based on its OL8 version for experimen‐
2409 tal purposes. It is not based on the DISA STIG for OL9, because
2410 this one was not available at time of the release.
2411
2412 Warning: The installation and use of a Graphical User Interface
2413 (GUI) increases your attack vector and decreases your overall
2414 security posture. If your Information Systems Security Officer
2415 (ISSO) lacks a documented operational requirement for a graphi‐
2416 cal user interface, please consider using the standard DISA STIG
2417 for Oracle Linux 9 profile.
2418
2419
2420
2421
2422
2424 Source data stream: ssg-openembedded-ds.xml
2425
2426 The Guide to the Secure Configuration of OpemEmbedded is broken into
2427 'profiles', groupings of security settings that correlate to a known
2428 policy. Available profiles are:
2429
2430
2431
2432 Sample Security Profile for OpenEmbedded Distros
2433
2434 Profile ID: xccdf_org.ssgproject.content_profile_standard
2435
2436 This profile is an sample for use in documentation and example
2437 content. The selected rules are standard and should pass
2438 quickly on most systems.
2439
2440
2441
2442
2443
2445 Source data stream: ssg-opensuse-ds.xml
2446
2447 The Guide to the Secure Configuration of openSUSE is broken into 'pro‐
2448 files', groupings of security settings that correlate to a known pol‐
2449 icy. Available profiles are:
2450
2451
2452
2453 Standard System Security Profile for openSUSE
2454
2455 Profile ID: xccdf_org.ssgproject.content_profile_standard
2456
2457 This profile contains rules to ensure standard security baseline
2458 of an openSUSE system. Regardless of your system's workload all
2459 of these checks should pass.
2460
2461
2462
2463
2464
2466 CoreOS 4
2467 Source data stream: ssg-rhcos4-ds.xml
2468
2469 The Guide to the Secure Configuration of Red Hat Enterprise Linux
2470 CoreOS 4 is broken into 'profiles', groupings of security settings that
2471 correlate to a known policy. Available profiles are:
2472
2473
2474
2475 DRAFT - ANSSI-BP-028 (enhanced)
2476
2477 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
2478 hanced
2479
2480 This profile contains configurations that align to ANSSI-BP-028
2481 at the enhanced hardening level.
2482
2483 ANSSI is the French National Information Security Agency, and
2484 stands for Agence nationale de la sécurité des systèmes d'infor‐
2485 mation. ANSSI-BP-028 is a configuration recommendation for
2486 GNU/Linux systems.
2487
2488 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2489 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2490 securite-relatives-a-un-systeme-gnulinux/
2491
2492
2493 DRAFT - ANSSI-BP-028 (high)
2494
2495 Profile ID: xccdf_org.ssgproject.content_pro‐
2496 file_anssi_bp28_high
2497
2498 This profile contains configurations that align to ANSSI-BP-028
2499 at the high hardening level.
2500
2501 ANSSI is the French National Information Security Agency, and
2502 stands for Agence nationale de la sécurité des systèmes d'infor‐
2503 mation. ANSSI-BP-028 is a configuration recommendation for
2504 GNU/Linux systems.
2505
2506 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2507 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2508 securite-relatives-a-un-systeme-gnulinux/
2509
2510
2511 DRAFT - ANSSI-BP-028 (intermediary)
2512
2513 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
2514 termediary
2515
2516 This profile contains configurations that align to ANSSI-BP-028
2517 at the intermediary hardening level.
2518
2519 ANSSI is the French National Information Security Agency, and
2520 stands for Agence nationale de la sécurité des systèmes d'infor‐
2521 mation. ANSSI-BP-028 is a configuration recommendation for
2522 GNU/Linux systems.
2523
2524 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2525 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2526 securite-relatives-a-un-systeme-gnulinux/
2527
2528
2529 DRAFT - ANSSI-BP-028 (minimal)
2530
2531 Profile ID: xccdf_org.ssgproject.content_pro‐
2532 file_anssi_bp28_minimal
2533
2534 This profile contains configurations that align to ANSSI-BP-028
2535 at the minimal hardening level.
2536
2537 ANSSI is the French National Information Security Agency, and
2538 stands for Agence nationale de la sécurité des systèmes d'infor‐
2539 mation. ANSSI-BP-028 is a configuration recommendation for
2540 GNU/Linux systems.
2541
2542 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2543 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2544 securite-relatives-a-un-systeme-gnulinux/
2545
2546
2547 Australian Cyber Security Centre (ACSC) Essential Eight
2548
2549 Profile ID: xccdf_org.ssgproject.content_profile_e8
2550
2551 This profile contains configuration checks for Red Hat Enter‐
2552 prise Linux CoreOS that align to the Australian Cyber Security
2553 Centre (ACSC) Essential Eight.
2554
2555 A copy of the Essential Eight in Linux Environments guide can be
2556 found at the ACSC website:
2557
2558 https://www.cyber.gov.au/acsc/view-all-content/publica‐
2559 tions/hardening-linux-workstations-and-servers
2560
2561
2562 NIST 800-53 High-Impact Baseline for Red Hat Enterprise Linux CoreOS
2563
2564 Profile ID: xccdf_org.ssgproject.content_profile_high
2565
2566 This compliance profile reflects the core set of High-Impact
2567 Baseline configuration settings for deployment of Red Hat Enter‐
2568 prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
2569 agencies. Development partners and sponsors include the U.S.
2570 National Institute of Standards and Technology (NIST), U.S. De‐
2571 partment of Defense, the National Security Agency, and Red Hat.
2572
2573 This baseline implements configuration requirements from the
2574 following sources:
2575
2576 - NIST 800-53 control selections for High-Impact systems (NIST
2577 800-53)
2578
2579 For any differing configuration requirements, e.g. password
2580 lengths, the stricter security setting was chosen. Security Re‐
2581 quirement Traceability Guides (RTMs) and sample System Security
2582 Configuration Guides are provided via the scap-security-guide-
2583 docs package.
2584
2585 This profile reflects U.S. Government consensus content and is
2586 developed through the ComplianceAsCode initiative, championed by
2587 the National Security Agency. Except for differences in format‐
2588 ting to accommodate publishing processes, this profile mirrors
2589 ComplianceAsCode content as minor divergences, such as bugfixes,
2590 work through the consensus and release processes.
2591
2592
2593 NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux
2594 CoreOS
2595
2596 Profile ID: xccdf_org.ssgproject.content_profile_moderate
2597
2598 This compliance profile reflects the core set of Moderate-Impact
2599 Baseline configuration settings for deployment of Red Hat Enter‐
2600 prise Linux CoreOS into U.S. Defense, Intelligence, and Civilian
2601 agencies. Development partners and sponsors include the U.S.
2602 National Institute of Standards and Technology (NIST), U.S. De‐
2603 partment of Defense, the National Security Agency, and Red Hat.
2604
2605 This baseline implements configuration requirements from the
2606 following sources:
2607
2608 - NIST 800-53 control selections for Moderate-Impact systems
2609 (NIST 800-53)
2610
2611 For any differing configuration requirements, e.g. password
2612 lengths, the stricter security setting was chosen. Security Re‐
2613 quirement Traceability Guides (RTMs) and sample System Security
2614 Configuration Guides are provided via the scap-security-guide-
2615 docs package.
2616
2617 This profile reflects U.S. Government consensus content and is
2618 developed through the ComplianceAsCode initiative, championed by
2619 the National Security Agency. Except for differences in format‐
2620 ting to accommodate publishing processes, this profile mirrors
2621 ComplianceAsCode content as minor divergences, such as bugfixes,
2622 work through the consensus and release processes.
2623
2624
2625 North American Electric Reliability Corporation (NERC) Critical Infra‐
2626 structure Protection (CIP) cybersecurity standards profile for Red Hat
2627 Enterprise Linux CoreOS
2628
2629 Profile ID: xccdf_org.ssgproject.content_profile_nerc-cip
2630
2631 This compliance profile reflects a set of security recommenda‐
2632 tions for the usage of Red Hat Enterprise Linux CoreOS in criti‐
2633 cal infrastructure in the energy sector. This follows the recom‐
2634 mendations coming from the following CIP standards:
2635
2636 - CIP-002-5 - CIP-003-8 - CIP-004-6 - CIP-005-6 - CIP-007-3 -
2637 CIP-007-6 - CIP-009-6
2638
2639
2640 DISA STIG for Red Hat Enterprise Linux CoreOS
2641
2642 Profile ID: xccdf_org.ssgproject.content_profile_stig
2643
2644 This profile contains configuration checks that align to the
2645 DISA STIG for Red Hat Enterprise Linux CoreOS 4.
2646
2647
2648
2649
2650
2652 Source data stream: ssg-rhel7-ds.xml
2653
2654 The Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
2655 broken into 'profiles', groupings of security settings that correlate
2656 to a known policy. Available profiles are:
2657
2658
2659
2660 C2S for Red Hat Enterprise Linux 7
2661
2662 Profile ID: xccdf_org.ssgproject.content_profile_C2S
2663
2664 This profile demonstrates compliance against the U.S. Government
2665 Commercial Cloud Services (C2S) baseline.
2666
2667 This baseline was inspired by the Center for Internet Security
2668 (CIS) Red Hat Enterprise Linux 7 Benchmark, v2.1.1 - 01-31-2017.
2669
2670 For the SCAP Security Guide project to remain in compliance with
2671 CIS' terms and conditions, specifically Restrictions(8), note
2672 there is no representation or claim that the C2S profile will
2673 ensure a system is in compliance or consistency with the CIS
2674 baseline.
2675
2676
2677 ANSSI-BP-028 (enhanced)
2678
2679 Profile ID: xccdf_org.ssgproject.content_profile_anssi_nt28_en‐
2680 hanced
2681
2682 This profile contains configurations that align to ANSSI-BP-028
2683 v2.0 at the enhanced hardening level.
2684
2685 ANSSI is the French National Information Security Agency, and
2686 stands for Agence nationale de la sécurité des systèmes d'infor‐
2687 mation. ANSSI-BP-028 is a configuration recommendation for
2688 GNU/Linux systems.
2689
2690 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2691 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2692 securite-relatives-a-un-systeme-gnulinux/
2693
2694
2695 ANSSI-BP-028 (high)
2696
2697 Profile ID: xccdf_org.ssgproject.content_pro‐
2698 file_anssi_nt28_high
2699
2700 This profile contains configurations that align to ANSSI-BP-028
2701 v2.0 at the high hardening level.
2702
2703 ANSSI is the French National Information Security Agency, and
2704 stands for Agence nationale de la sécurité des systèmes d'infor‐
2705 mation. ANSSI-BP-028 is a configuration recommendation for
2706 GNU/Linux systems.
2707
2708 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2709 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2710 securite-relatives-a-un-systeme-gnulinux/
2711
2712
2713 ANSSI-BP-028 (intermediary)
2714
2715 Profile ID: xccdf_org.ssgproject.content_profile_anssi_nt28_in‐
2716 termediary
2717
2718 This profile contains configurations that align to ANSSI-BP-028
2719 v2.0 at the intermediary hardening level.
2720
2721 ANSSI is the French National Information Security Agency, and
2722 stands for Agence nationale de la sécurité des systèmes d'infor‐
2723 mation. ANSSI-BP-028 is a configuration recommendation for
2724 GNU/Linux systems.
2725
2726 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2727 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2728 securite-relatives-a-un-systeme-gnulinux/
2729
2730
2731 ANSSI-BP-028 (minimal)
2732
2733 Profile ID: xccdf_org.ssgproject.content_pro‐
2734 file_anssi_nt28_minimal
2735
2736 This profile contains configurations that align to ANSSI-BP-028
2737 v2.0 at the minimal hardening level.
2738
2739 ANSSI is the French National Information Security Agency, and
2740 stands for Agence nationale de la sécurité des systèmes d'infor‐
2741 mation. ANSSI-BP-028 is a configuration recommendation for
2742 GNU/Linux systems.
2743
2744 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
2745 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
2746 securite-relatives-a-un-systeme-gnulinux/
2747
2748
2749 CIS Red Hat Enterprise Linux 7 Benchmark for Level 2 - Server
2750
2751 Profile ID: xccdf_org.ssgproject.content_profile_cis
2752
2753 This profile defines a baseline that aligns to the "Level 2 -
2754 Server" configuration from the Center for Internet Security® Red
2755 Hat Enterprise Linux 7 Benchmark™, v3.1.1, released 05-21-2021.
2756
2757 This profile includes Center for Internet Security® Red Hat En‐
2758 terprise Linux 7 CIS Benchmarks™ content.
2759
2760
2761 CIS Red Hat Enterprise Linux 7 Benchmark for Level 1 - Server
2762
2763 Profile ID: xccdf_org.ssgproject.content_profile_cis_server_l1
2764
2765 This profile defines a baseline that aligns to the "Level 1 -
2766 Server" configuration from the Center for Internet Security® Red
2767 Hat Enterprise Linux 7 Benchmark™, v3.1.1, released 05-21-2021.
2768
2769 This profile includes Center for Internet Security® Red Hat En‐
2770 terprise Linux 7 CIS Benchmarks™ content.
2771
2772
2773 CIS Red Hat Enterprise Linux 7 Benchmark for Level 1 - Workstation
2774
2775 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
2776 tion_l1
2777
2778 This profile defines a baseline that aligns to the "Level 1 -
2779 Workstation" configuration from the Center for Internet Secu‐
2780 rity® Red Hat Enterprise Linux 7 Benchmark™, v3.1.1, released
2781 05-21-2021.
2782
2783 This profile includes Center for Internet Security® Red Hat En‐
2784 terprise Linux 7 CIS Benchmarks™ content.
2785
2786
2787 CIS Red Hat Enterprise Linux 7 Benchmark for Level 2 - Workstation
2788
2789 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
2790 tion_l2
2791
2792 This profile defines a baseline that aligns to the "Level 2 -
2793 Workstation" configuration from the Center for Internet Secu‐
2794 rity® Red Hat Enterprise Linux 7 Benchmark™, v3.1.1, released
2795 05-21-2021.
2796
2797 This profile includes Center for Internet Security® Red Hat En‐
2798 terprise Linux 7 CIS Benchmarks™ content.
2799
2800
2801 Criminal Justice Information Services (CJIS) Security Policy
2802
2803 Profile ID: xccdf_org.ssgproject.content_profile_cjis
2804
2805 This profile is derived from FBI's CJIS v5.4 Security Policy. A
2806 copy of this policy can be found at the CJIS Security Policy Re‐
2807 source Center:
2808
2809 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
2810 center
2811
2812
2813 Unclassified Information in Non-federal Information Systems and Organi‐
2814 zations (NIST 800-171)
2815
2816 Profile ID: xccdf_org.ssgproject.content_profile_cui
2817
2818 From NIST 800-171, Section 2.2: Security requirements for pro‐
2819 tecting the confidentiality of CUI in non-federal information
2820 systems and organizations have a well-defined structure that
2821 consists of:
2822
2823 (i) a basic security requirements section; (ii) a derived secu‐
2824 rity requirements section.
2825
2826 The basic security requirements are obtained from FIPS Publica‐
2827 tion 200, which provides the high-level and fundamental security
2828 requirements for federal information and information systems.
2829 The derived security requirements, which supplement the basic
2830 security requirements, are taken from the security controls in
2831 NIST Special Publication 800-53.
2832
2833 This profile configures Red Hat Enterprise Linux 7 to the NIST
2834 Special Publication 800-53 controls identified for securing Con‐
2835 trolled Unclassified Information (CUI).
2836
2837
2838 Australian Cyber Security Centre (ACSC) Essential Eight
2839
2840 Profile ID: xccdf_org.ssgproject.content_profile_e8
2841
2842 This profile contains configuration checks for Red Hat Enter‐
2843 prise Linux 7 that align to the Australian Cyber Security Centre
2844 (ACSC) Essential Eight.
2845
2846 A copy of the Essential Eight in Linux Environments guide can be
2847 found at the ACSC website:
2848
2849 https://www.cyber.gov.au/acsc/view-all-content/publica‐
2850 tions/hardening-linux-workstations-and-servers
2851
2852
2853 Health Insurance Portability and Accountability Act (HIPAA)
2854
2855 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
2856
2857 The HIPAA Security Rule establishes U.S. national standards to
2858 protect individuals’ electronic personal health information that
2859 is created, received, used, or maintained by a covered entity.
2860 The Security Rule requires appropriate administrative, physical
2861 and technical safeguards to ensure the confidentiality, integ‐
2862 rity, and security of electronic protected health information.
2863
2864 This profile configures Red Hat Enterprise Linux 7 to the HIPAA
2865 Security Rule identified for securing of electronic protected
2866 health information. Use of this profile in no way guarantees or
2867 makes claims against legal compliance against the HIPAA Security
2868 Rule(s).
2869
2870
2871 NIST National Checklist Program Security Guide
2872
2873 Profile ID: xccdf_org.ssgproject.content_profile_ncp
2874
2875 This compliance profile reflects the core set of security re‐
2876 lated configuration settings for deployment of Red Hat Enter‐
2877 prise Linux 7.x into U.S. Defense, Intelligence, and Civilian
2878 agencies. Development partners and sponsors include the U.S.
2879 National Institute of Standards and Technology (NIST), U.S. De‐
2880 partment of Defense, the National Security Agency, and Red Hat.
2881
2882 This baseline implements configuration requirements from the
2883 following sources:
2884
2885 - Committee on National Security Systems Instruction No. 1253
2886 (CNSSI 1253) - NIST Controlled Unclassified Information (NIST
2887 800-171) - NIST 800-53 control selections for MODERATE impact
2888 systems (NIST 800-53) - U.S. Government Configuration Baseline
2889 (USGCB) - NIAP Protection Profile for General Purpose Operating
2890 Systems v4.2.1 (OSPP v4.2.1) - DISA Operating System Security
2891 Requirements Guide (OS SRG)
2892
2893 For any differing configuration requirements, e.g. password
2894 lengths, the stricter security setting was chosen. Security Re‐
2895 quirement Traceability Guides (RTMs) and sample System Security
2896 Configuration Guides are provided via the scap-security-guide-
2897 docs package.
2898
2899 This profile reflects U.S. Government consensus content and is
2900 developed through the OpenSCAP/SCAP Security Guide initiative,
2901 championed by the National Security Agency. Except for differ‐
2902 ences in formatting to accommodate publishing processes, this
2903 profile mirrors OpenSCAP/SCAP Security Guide content as minor
2904 divergences, such as bugfixes, work through the consensus and
2905 release processes.
2906
2907
2908 OSPP - Protection Profile for General Purpose Operating Systems v4.2.1
2909
2910 Profile ID: xccdf_org.ssgproject.content_profile_ospp
2911
2912 This profile reflects mandatory configuration controls identi‐
2913 fied in the NIAP Configuration Annex to the Protection Profile
2914 for General Purpose Operating Systems (Protection Profile Ver‐
2915 sion 4.2.1).
2916
2917 This configuration profile is consistent with CNSSI-1253, which
2918 requires U.S. National Security Systems to adhere to certain
2919 configuration parameters. Accordingly, this configuration pro‐
2920 file is suitable for use in U.S. National Security Systems.
2921
2922
2923 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
2924
2925 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
2926
2927 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
2928 plied.
2929
2930
2931 RHV hardening based on STIG for Red Hat Enterprise Linux 7
2932
2933 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-stig
2934
2935 This profile contains configuration checks for Red Hat Virtual‐
2936 ization based on the the DISA STIG for Red Hat Enterprise Linux
2937 7.
2938
2939
2940 VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Virtual‐
2941 ization
2942
2943 Profile ID: xccdf_org.ssgproject.content_profile_rhelh-vpp
2944
2945 This compliance profile reflects the core set of security re‐
2946 lated configuration settings for deployment of Red Hat Enter‐
2947 prise Linux Hypervisor (RHELH) 7.x into U.S. Defense, Intelli‐
2948 gence, and Civilian agencies. Development partners and sponsors
2949 include the U.S. National Institute of Standards and Technology
2950 (NIST), U.S. Department of Defense, the National Security
2951 Agency, and Red Hat.
2952
2953 This baseline implements configuration requirements from the
2954 following sources:
2955
2956 - Committee on National Security Systems Instruction No. 1253
2957 (CNSSI 1253) - NIST 800-53 control selections for MODERATE im‐
2958 pact systems (NIST 800-53) - U.S. Government Configuration Base‐
2959 line (USGCB) - NIAP Protection Profile for Virtualization v1.0
2960 (VPP v1.0)
2961
2962 For any differing configuration requirements, e.g. password
2963 lengths, the stricter security setting was chosen. Security Re‐
2964 quirement Traceability Guides (RTMs) and sample System Security
2965 Configuration Guides are provided via the scap-security-guide-
2966 docs package.
2967
2968 This profile reflects U.S. Government consensus content and is
2969 developed through the ComplianceAsCode project, championed by
2970 the National Security Agency. Except for differences in format‐
2971 ting to accommodate publishing processes, this profile mirrors
2972 ComplianceAsCode content as minor divergences, such as bugfixes,
2973 work through the consensus and release processes.
2974
2975
2976 Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
2977
2978 Profile ID: xccdf_org.ssgproject.content_profile_rht-ccp
2979
2980 This profile contains the minimum security relevant configura‐
2981 tion settings recommended by Red Hat, Inc for Red Hat Enterprise
2982 Linux 7 instances deployed by Red Hat Certified Cloud Providers.
2983
2984
2985 Standard System Security Profile for Red Hat Enterprise Linux 7
2986
2987 Profile ID: xccdf_org.ssgproject.content_profile_standard
2988
2989 This profile contains rules to ensure standard security baseline
2990 of a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
2991 tem's workload all of these checks should pass.
2992
2993
2994 DISA STIG for Red Hat Enterprise Linux 7
2995
2996 Profile ID: xccdf_org.ssgproject.content_profile_stig
2997
2998 This profile contains configuration checks that align to the
2999 DISA STIG for Red Hat Enterprise Linux V3R12.
3000
3001 In addition to being applicable to Red Hat Enterprise Linux 7,
3002 DISA recognizes this configuration baseline as applicable to the
3003 operating system tier of Red Hat technologies that are based on
3004 Red Hat Enterprise Linux 7, such as:
3005
3006 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
3007 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
3008 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
3009 7 image
3010
3011
3012 DISA STIG with GUI for Red Hat Enterprise Linux 7
3013
3014 Profile ID: xccdf_org.ssgproject.content_profile_stig_gui
3015
3016 This profile contains configuration checks that align to the
3017 DISA STIG with GUI for Red Hat Enterprise Linux V3R12.
3018
3019 In addition to being applicable to Red Hat Enterprise Linux 7,
3020 DISA recognizes this configuration baseline as applicable to the
3021 operating system tier of Red Hat technologies that are based on
3022 Red Hat Enterprise Linux 7, such as:
3023
3024 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
3025 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
3026 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
3027 7 image
3028
3029 Warning: The installation and use of a Graphical User Interface
3030 (GUI) increases your attack vector and decreases your overall
3031 security posture. If your Information Systems Security Officer
3032 (ISSO) lacks a documented operational requirement for a graphi‐
3033 cal user interface, please consider using the standard DISA STIG
3034 for Red Hat Enterprise Linux 7 profile.
3035
3036
3037
3038
3039
3041 Source data stream: ssg-rhel8-ds.xml
3042
3043 The Guide to the Secure Configuration of Red Hat Enterprise Linux 8 is
3044 broken into 'profiles', groupings of security settings that correlate
3045 to a known policy. Available profiles are:
3046
3047
3048
3049 ANSSI-BP-028 (enhanced)
3050
3051 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
3052 hanced
3053
3054 This profile contains configurations that align to ANSSI-BP-028
3055 v2.0 at the enhanced hardening level.
3056
3057 ANSSI is the French National Information Security Agency, and
3058 stands for Agence nationale de la sécurité des systèmes d'infor‐
3059 mation. ANSSI-BP-028 is a configuration recommendation for
3060 GNU/Linux systems.
3061
3062 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
3063 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3064 securite-relatives-a-un-systeme-gnulinux/
3065
3066
3067 ANSSI-BP-028 (high)
3068
3069 Profile ID: xccdf_org.ssgproject.content_pro‐
3070 file_anssi_bp28_high
3071
3072 This profile contains configurations that align to ANSSI-BP-028
3073 v2.0 at the high hardening level.
3074
3075 ANSSI is the French National Information Security Agency, and
3076 stands for Agence nationale de la sécurité des systèmes d'infor‐
3077 mation. ANSSI-BP-028 is a configuration recommendation for
3078 GNU/Linux systems.
3079
3080 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
3081 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3082 securite-relatives-a-un-systeme-gnulinux/
3083
3084
3085 ANSSI-BP-028 (intermediary)
3086
3087 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
3088 termediary
3089
3090 This profile contains configurations that align to ANSSI-BP-028
3091 v2.0 at the intermediary hardening level.
3092
3093 ANSSI is the French National Information Security Agency, and
3094 stands for Agence nationale de la sécurité des systèmes d'infor‐
3095 mation. ANSSI-BP-028 is a configuration recommendation for
3096 GNU/Linux systems.
3097
3098 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
3099 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3100 securite-relatives-a-un-systeme-gnulinux/
3101
3102
3103 ANSSI-BP-028 (minimal)
3104
3105 Profile ID: xccdf_org.ssgproject.content_pro‐
3106 file_anssi_bp28_minimal
3107
3108 This profile contains configurations that align to ANSSI-BP-028
3109 v2.0 at the minimal hardening level.
3110
3111 ANSSI is the French National Information Security Agency, and
3112 stands for Agence nationale de la sécurité des systèmes d'infor‐
3113 mation. ANSSI-BP-028 is a configuration recommendation for
3114 GNU/Linux systems.
3115
3116 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
3117 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3118 securite-relatives-a-un-systeme-gnulinux/
3119
3120
3121 CIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Server
3122
3123 Profile ID: xccdf_org.ssgproject.content_profile_cis
3124
3125 This profile defines a baseline that aligns to the "Level 2 -
3126 Server" configuration from the Center for Internet Security® Red
3127 Hat Enterprise Linux 8 Benchmark™, v2.0.0, released 2022-02-23.
3128
3129 This profile includes Center for Internet Security® Red Hat En‐
3130 terprise Linux 8 CIS Benchmarks™ content.
3131
3132
3133 CIS Red Hat Enterprise Linux 8 Benchmark for Level 1 - Server
3134
3135 Profile ID: xccdf_org.ssgproject.content_profile_cis_server_l1
3136
3137 This profile defines a baseline that aligns to the "Level 1 -
3138 Server" configuration from the Center for Internet Security® Red
3139 Hat Enterprise Linux 8 Benchmark™, v2.0.0, released 2022-02-23.
3140
3141 This profile includes Center for Internet Security® Red Hat En‐
3142 terprise Linux 8 CIS Benchmarks™ content.
3143
3144
3145 CIS Red Hat Enterprise Linux 8 Benchmark for Level 1 - Workstation
3146
3147 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
3148 tion_l1
3149
3150 This profile defines a baseline that aligns to the "Level 1 -
3151 Workstation" configuration from the Center for Internet Secu‐
3152 rity® Red Hat Enterprise Linux 8 Benchmark™, v2.0.0, released
3153 2022-02-23.
3154
3155 This profile includes Center for Internet Security® Red Hat En‐
3156 terprise Linux 8 CIS Benchmarks™ content.
3157
3158
3159 CIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Workstation
3160
3161 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
3162 tion_l2
3163
3164 This profile defines a baseline that aligns to the "Level 2 -
3165 Workstation" configuration from the Center for Internet Secu‐
3166 rity® Red Hat Enterprise Linux 8 Benchmark™, v2.0.0, released
3167 2022-02-23.
3168
3169 This profile includes Center for Internet Security® Red Hat En‐
3170 terprise Linux 8 CIS Benchmarks™ content.
3171
3172
3173 Criminal Justice Information Services (CJIS) Security Policy
3174
3175 Profile ID: xccdf_org.ssgproject.content_profile_cjis
3176
3177 This profile is derived from FBI's CJIS v5.4 Security Policy. A
3178 copy of this policy can be found at the CJIS Security Policy Re‐
3179 source Center:
3180
3181 https://www.fbi.gov/services/cjis/cjis-security-policy-resource-
3182 center
3183
3184
3185 Unclassified Information in Non-federal Information Systems and Organi‐
3186 zations (NIST 800-171)
3187
3188 Profile ID: xccdf_org.ssgproject.content_profile_cui
3189
3190 From NIST 800-171, Section 2.2: Security requirements for pro‐
3191 tecting the confidentiality of CUI in nonfederal information
3192 systems and organizations have a well-defined structure that
3193 consists of:
3194
3195 (i) a basic security requirements section; (ii) a derived secu‐
3196 rity requirements section.
3197
3198 The basic security requirements are obtained from FIPS Publica‐
3199 tion 200, which provides the high-level and fundamental security
3200 requirements for federal information and information systems.
3201 The derived security requirements, which supplement the basic
3202 security requirements, are taken from the security controls in
3203 NIST Special Publication 800-53.
3204
3205 This profile configures Red Hat Enterprise Linux 8 to the NIST
3206 Special Publication 800-53 controls identified for securing Con‐
3207 trolled Unclassified Information (CUI)."
3208
3209
3210 Australian Cyber Security Centre (ACSC) Essential Eight
3211
3212 Profile ID: xccdf_org.ssgproject.content_profile_e8
3213
3214 This profile contains configuration checks for Red Hat Enter‐
3215 prise Linux 8 that align to the Australian Cyber Security Centre
3216 (ACSC) Essential Eight.
3217
3218 A copy of the Essential Eight in Linux Environments guide can be
3219 found at the ACSC website:
3220
3221 https://www.cyber.gov.au/acsc/view-all-content/publica‐
3222 tions/hardening-linux-workstations-and-servers
3223
3224
3225 Health Insurance Portability and Accountability Act (HIPAA)
3226
3227 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
3228
3229 The HIPAA Security Rule establishes U.S. national standards to
3230 protect individuals’ electronic personal health information that
3231 is created, received, used, or maintained by a covered entity.
3232 The Security Rule requires appropriate administrative, physical
3233 and technical safeguards to ensure the confidentiality, integ‐
3234 rity, and security of electronic protected health information.
3235
3236 This profile configures Red Hat Enterprise Linux 8 to the HIPAA
3237 Security Rule identified for securing of electronic protected
3238 health information. Use of this profile in no way guarantees or
3239 makes claims against legal compliance against the HIPAA Security
3240 Rule(s).
3241
3242
3243 Australian Cyber Security Centre (ACSC) ISM Official
3244
3245 Profile ID: xccdf_org.ssgproject.content_profile_ism_o
3246
3247 This profile contains configuration checks for Red Hat Enter‐
3248 prise Linux 8 that align to the Australian Cyber Security Centre
3249 (ACSC) Information Security Manual (ISM) with the applicability
3250 marking of OFFICIAL.
3251
3252 The ISM uses a risk-based approach to cyber security. This pro‐
3253 file provides a guide to aligning Red Hat Enterprise Linux secu‐
3254 rity controls with the ISM, which can be used to select controls
3255 specific to an organisation's security posture and risk profile.
3256
3257 A copy of the ISM can be found at the ACSC website:
3258
3259 https://www.cyber.gov.au/ism
3260
3261
3262 Protection Profile for General Purpose Operating Systems
3263
3264 Profile ID: xccdf_org.ssgproject.content_profile_ospp
3265
3266 This profile reflects mandatory configuration controls identi‐
3267 fied in the NIAP Configuration Annex to the Protection Profile
3268 for General Purpose Operating Systems (Protection Profile Ver‐
3269 sion 4.2.1).
3270
3271 This configuration profile is consistent with CNSSI-1253, which
3272 requires U.S. National Security Systems to adhere to certain
3273 configuration parameters. Accordingly, this configuration pro‐
3274 file is suitable for use in U.S. National Security Systems.
3275
3276
3277 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 8
3278
3279 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
3280
3281 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
3282 plied.
3283
3284
3285 Red Hat Corporate Profile for Certified Cloud Providers (RH CCP)
3286
3287 Profile ID: xccdf_org.ssgproject.content_profile_rht-ccp
3288
3289 This profile contains the minimum security relevant configura‐
3290 tion settings recommended by Red Hat, Inc for Red Hat Enterprise
3291 Linux 8 instances deployed by Red Hat Certified Cloud Providers.
3292
3293
3294 Standard System Security Profile for Red Hat Enterprise Linux 8
3295
3296 Profile ID: xccdf_org.ssgproject.content_profile_standard
3297
3298 This profile contains rules to ensure standard security baseline
3299 of a Red Hat Enterprise Linux 8 system. Regardless of your sys‐
3300 tem's workload all of these checks should pass.
3301
3302
3303 DISA STIG for Red Hat Enterprise Linux 8
3304
3305 Profile ID: xccdf_org.ssgproject.content_profile_stig
3306
3307 This profile contains configuration checks that align to the
3308 DISA STIG for Red Hat Enterprise Linux 8 V1R11.
3309
3310 In addition to being applicable to Red Hat Enterprise Linux 8,
3311 DISA recognizes this configuration baseline as applicable to the
3312 operating system tier of Red Hat technologies that are based on
3313 Red Hat Enterprise Linux 8, such as:
3314
3315 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
3316 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
3317 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
3318 8 image
3319
3320
3321 DISA STIG with GUI for Red Hat Enterprise Linux 8
3322
3323 Profile ID: xccdf_org.ssgproject.content_profile_stig_gui
3324
3325 This profile contains configuration checks that align to the
3326 DISA STIG with GUI for Red Hat Enterprise Linux 8 V1R11.
3327
3328 In addition to being applicable to Red Hat Enterprise Linux 8,
3329 DISA recognizes this configuration baseline as applicable to the
3330 operating system tier of Red Hat technologies that are based on
3331 Red Hat Enterprise Linux 8, such as:
3332
3333 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
3334 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
3335 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
3336 8 image
3337
3338 Warning: The installation and use of a Graphical User Interface
3339 (GUI) increases your attack vector and decreases your overall
3340 security posture. If your Information Systems Security Officer
3341 (ISSO) lacks a documented operational requirement for a graphi‐
3342 cal user interface, please consider using the standard DISA STIG
3343 for Red Hat Enterprise Linux 8 profile.
3344
3345
3346
3347
3348
3350 Source data stream: ssg-rhel9-ds.xml
3351
3352 The Guide to the Secure Configuration of Red Hat Enterprise Linux 9 is
3353 broken into 'profiles', groupings of security settings that correlate
3354 to a known policy. Available profiles are:
3355
3356
3357
3358 ANSSI-BP-028 (enhanced)
3359
3360 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
3361 hanced
3362
3363 This profile contains configurations that align to ANSSI-BP-028
3364 v2.0 at the enhanced hardening level.
3365
3366 ANSSI is the French National Information Security Agency, and
3367 stands for Agence nationale de la sécurité des systèmes d'infor‐
3368 mation. ANSSI-BP-028 is a configuration recommendation for
3369 GNU/Linux systems.
3370
3371 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
3372 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3373 securite-relatives-a-un-systeme-gnulinux/
3374
3375
3376 ANSSI-BP-028 (high)
3377
3378 Profile ID: xccdf_org.ssgproject.content_pro‐
3379 file_anssi_bp28_high
3380
3381 This profile contains configurations that align to ANSSI-BP-028
3382 v2.0 at the high hardening level.
3383
3384 ANSSI is the French National Information Security Agency, and
3385 stands for Agence nationale de la sécurité des systèmes d'infor‐
3386 mation. ANSSI-BP-028 is a configuration recommendation for
3387 GNU/Linux systems.
3388
3389 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
3390 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3391 securite-relatives-a-un-systeme-gnulinux/
3392
3393
3394 ANSSI-BP-028 (intermediary)
3395
3396 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
3397 termediary
3398
3399 This profile contains configurations that align to ANSSI-BP-028
3400 v2.0 at the intermediary hardening level.
3401
3402 ANSSI is the French National Information Security Agency, and
3403 stands for Agence nationale de la sécurité des systèmes d'infor‐
3404 mation. ANSSI-BP-028 is a configuration recommendation for
3405 GNU/Linux systems.
3406
3407 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
3408 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3409 securite-relatives-a-un-systeme-gnulinux/
3410
3411
3412 ANSSI-BP-028 (minimal)
3413
3414 Profile ID: xccdf_org.ssgproject.content_pro‐
3415 file_anssi_bp28_minimal
3416
3417 This profile contains configurations that align to ANSSI-BP-028
3418 v2.0 at the minimal hardening level.
3419
3420 ANSSI is the French National Information Security Agency, and
3421 stands for Agence nationale de la sécurité des systèmes d'infor‐
3422 mation. ANSSI-BP-028 is a configuration recommendation for
3423 GNU/Linux systems.
3424
3425 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
3426 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3427 securite-relatives-a-un-systeme-gnulinux/
3428
3429
3430 CCN Red Hat Enterprise Linux 9 - Advanced
3431
3432 Profile ID: xccdf_org.ssgproject.content_profile_ccn_advanced
3433
3434 This profile defines a baseline that aligns with the "Advanced"
3435 configuration of the CCN-STIC-610A22 Guide issued by the Na‐
3436 tional Cryptological Center of Spain in 2022-10.
3437
3438 The CCN-STIC-610A22 guide includes hardening settings for Red
3439 Hat Enterprise Linux 9 at basic, intermediate, and advanced lev‐
3440 els.
3441
3442
3443 CCN Red Hat Enterprise Linux 9 - Basic
3444
3445 Profile ID: xccdf_org.ssgproject.content_profile_ccn_basic
3446
3447 This profile defines a baseline that aligns with the "Basic"
3448 configuration of the CCN-STIC-610A22 Guide issued by the Na‐
3449 tional Cryptological Center of Spain in 2022-10.
3450
3451 The CCN-STIC-610A22 guide includes hardening settings for Red
3452 Hat Enterprise Linux 9 at basic, intermediate, and advanced lev‐
3453 els.
3454
3455
3456 CCN Red Hat Enterprise Linux 9 - Intermediate
3457
3458 Profile ID: xccdf_org.ssgproject.content_profile_ccn_intermedi‐
3459 ate
3460
3461 This profile defines a baseline that aligns with the "Intermedi‐
3462 ate" configuration of the CCN-STIC-610A22 Guide issued by the
3463 National Cryptological Center of Spain in 2022-10.
3464
3465 The CCN-STIC-610A22 guide includes hardening settings for Red
3466 Hat Enterprise Linux 9 at basic, intermediate, and advanced lev‐
3467 els.
3468
3469
3470 CIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Server
3471
3472 Profile ID: xccdf_org.ssgproject.content_profile_cis
3473
3474 This profile defines a baseline that aligns to the "Level 2 -
3475 Server" configuration from the Center for Internet Security® Red
3476 Hat Enterprise Linux 9 Benchmark™, v1.0.0, released 2022-11-28.
3477
3478 This profile includes Center for Internet Security® Red Hat En‐
3479 terprise Linux 9 CIS Benchmarks™ content.
3480
3481
3482 CIS Red Hat Enterprise Linux 9 Benchmark for Level 1 - Server
3483
3484 Profile ID: xccdf_org.ssgproject.content_profile_cis_server_l1
3485
3486 This profile defines a baseline that aligns to the "Level 1 -
3487 Server" configuration from the Center for Internet Security® Red
3488 Hat Enterprise Linux 9 Benchmark™, v1.0.0, released 2022-11-28.
3489
3490 This profile includes Center for Internet Security® Red Hat En‐
3491 terprise Linux 9 CIS Benchmarks™ content.
3492
3493
3494 CIS Red Hat Enterprise Linux 9 Benchmark for Level 1 - Workstation
3495
3496 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
3497 tion_l1
3498
3499 This profile defines a baseline that aligns to the "Level 1 -
3500 Workstation" configuration from the Center for Internet Secu‐
3501 rity® Red Hat Enterprise Linux 9 Benchmark™, v1.0.0, released
3502 2022-11-28.
3503
3504 This profile includes Center for Internet Security® Red Hat En‐
3505 terprise Linux 9 CIS Benchmarks™ content.
3506
3507
3508 CIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Workstation
3509
3510 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
3511 tion_l2
3512
3513 This profile defines a baseline that aligns to the "Level 2 -
3514 Workstation" configuration from the Center for Internet Secu‐
3515 rity® Red Hat Enterprise Linux 9 Benchmark™, v1.0.0, released
3516 2022-11-28.
3517
3518 This profile includes Center for Internet Security® Red Hat En‐
3519 terprise Linux 9 CIS Benchmarks™ content.
3520
3521
3522 DRAFT - Unclassified Information in Non-federal Information Systems and
3523 Organizations (NIST 800-171)
3524
3525 Profile ID: xccdf_org.ssgproject.content_profile_cui
3526
3527 From NIST 800-171, Section 2.2: Security requirements for pro‐
3528 tecting the confidentiality of CUI in nonfederal information
3529 systems and organizations have a well-defined structure that
3530 consists of:
3531
3532 (i) a basic security requirements section; (ii) a derived secu‐
3533 rity requirements section.
3534
3535 The basic security requirements are obtained from FIPS Publica‐
3536 tion 200, which provides the high-level and fundamental security
3537 requirements for federal information and information systems.
3538 The derived security requirements, which supplement the basic
3539 security requirements, are taken from the security controls in
3540 NIST Special Publication 800-53.
3541
3542 This profile configures Red Hat Enterprise Linux 9 to the NIST
3543 Special Publication 800-53 controls identified for securing Con‐
3544 trolled Unclassified Information (CUI)."
3545
3546
3547 Australian Cyber Security Centre (ACSC) Essential Eight
3548
3549 Profile ID: xccdf_org.ssgproject.content_profile_e8
3550
3551 This profile contains configuration checks for Red Hat Enter‐
3552 prise Linux 9 that align to the Australian Cyber Security Centre
3553 (ACSC) Essential Eight.
3554
3555 A copy of the Essential Eight in Linux Environments guide can be
3556 found at the ACSC website:
3557
3558 https://www.cyber.gov.au/acsc/view-all-content/publica‐
3559 tions/hardening-linux-workstations-and-servers
3560
3561
3562 Health Insurance Portability and Accountability Act (HIPAA)
3563
3564 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
3565
3566 The HIPAA Security Rule establishes U.S. national standards to
3567 protect individuals’ electronic personal health information that
3568 is created, received, used, or maintained by a covered entity.
3569 The Security Rule requires appropriate administrative, physical
3570 and technical safeguards to ensure the confidentiality, integ‐
3571 rity, and security of electronic protected health information.
3572
3573 This profile configures Red Hat Enterprise Linux 9 to the HIPAA
3574 Security Rule identified for securing of electronic protected
3575 health information. Use of this profile in no way guarantees or
3576 makes claims against legal compliance against the HIPAA Security
3577 Rule(s).
3578
3579
3580 Australian Cyber Security Centre (ACSC) ISM Official
3581
3582 Profile ID: xccdf_org.ssgproject.content_profile_ism_o
3583
3584 This profile contains configuration checks for Red Hat Enter‐
3585 prise Linux 9 that align to the Australian Cyber Security Centre
3586 (ACSC) Information Security Manual (ISM) with the applicability
3587 marking of OFFICIAL.
3588
3589 The ISM uses a risk-based approach to cyber security. This pro‐
3590 file provides a guide to aligning Red Hat Enterprise Linux secu‐
3591 rity controls with the ISM, which can be used to select controls
3592 specific to an organisation's security posture and risk profile.
3593
3594 A copy of the ISM can be found at the ACSC website:
3595
3596 https://www.cyber.gov.au/ism
3597
3598
3599 Protection Profile for General Purpose Operating Systems
3600
3601 Profile ID: xccdf_org.ssgproject.content_profile_ospp
3602
3603 This profile is part of Red Hat Enterprise Linux 9 Common Crite‐
3604 ria Guidance documentation for Target of Evaluation based on
3605 Protection Profile for General Purpose Operating Systems (OSPP)
3606 version 4.3 and Functional Package for SSH version 1.0.
3607
3608 Where appropriate, CNSSI 1253 or DoD-specific values are used
3609 for configuration, based on Configuration Annex to the OSPP.
3610
3611
3612 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 9
3613
3614 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
3615
3616 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
3617 plied.
3618
3619
3620 DRAFT - DISA STIG for Red Hat Enterprise Linux 9
3621
3622 Profile ID: xccdf_org.ssgproject.content_profile_stig
3623
3624 This is a draft profile based on its RHEL8 version for experi‐
3625 mental purposes. It is not based on the DISA STIG for RHEL9,
3626 because this one was not available at time of the release.
3627
3628 In addition to being applicable to Red Hat Enterprise Linux 9,
3629 DISA recognizes this configuration baseline as applicable to the
3630 operating system tier of Red Hat technologies that are based on
3631 Red Hat Enterprise Linux 9, such as:
3632
3633 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
3634 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
3635 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
3636 9 image
3637
3638
3639 DRAFT - DISA STIG with GUI for Red Hat Enterprise Linux 9
3640
3641 Profile ID: xccdf_org.ssgproject.content_profile_stig_gui
3642
3643 This is a draft profile based on its RHEL8 version for experi‐
3644 mental purposes. It is not based on the DISA STIG for RHEL9,
3645 because this one was not available at time of the release.
3646
3647 In addition to being applicable to Red Hat Enterprise Linux 9,
3648 DISA recognizes this configuration baseline as applicable to the
3649 operating system tier of Red Hat technologies that are based on
3650 Red Hat Enterprise Linux 9, such as:
3651
3652 - Red Hat Enterprise Linux Server - Red Hat Enterprise Linux
3653 Workstation and Desktop - Red Hat Enterprise Linux for HPC - Red
3654 Hat Storage - Red Hat Containers with a Red Hat Enterprise Linux
3655 9 image
3656
3657 Warning: The installation and use of a Graphical User Interface
3658 (GUI) increases your attack vector and decreases your overall
3659 security posture. If your Information Systems Security Officer
3660 (ISSO) lacks a documented operational requirement for a graphi‐
3661 cal user interface, please consider using the standard DISA STIG
3662 for Red Hat Enterprise Linux 9 profile.
3663
3664
3665
3666
3667
3669 Source data stream: ssg-rhv4-ds.xml
3670
3671 The Guide to the Secure Configuration of Red Hat Virtualization 4 is
3672 broken into 'profiles', groupings of security settings that correlate
3673 to a known policy. Available profiles are:
3674
3675
3676
3677 PCI-DSS v3.2.1 Control Baseline for Red Hat Virtualization Host (RHVH)
3678
3679 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
3680
3681 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
3682 plied.
3683
3684
3685 DRAFT - DISA STIG for Red Hat Virtualization Host (RHVH)
3686
3687 Profile ID: xccdf_org.ssgproject.content_profile_rhvh-stig
3688
3689 This *draft* profile contains configuration checks that align to
3690 the DISA STIG for Red Hat Virtualization Host (RHVH).
3691
3692
3693 VPP - Protection Profile for Virtualization v. 1.0 for Red Hat Virtual‐
3694 ization Host (RHVH)
3695
3696 Profile ID: xccdf_org.ssgproject.content_profile_rhvh-vpp
3697
3698 This compliance profile reflects the core set of security re‐
3699 lated configuration settings for deployment of Red Hat Virtual‐
3700 ization Host (RHVH) 4.x into U.S. Defense, Intelligence, and
3701 Civilian agencies. Development partners and sponsors include
3702 the U.S. National Institute of Standards and Technology (NIST),
3703 U.S. Department of Defense, the National Security Agency, and
3704 Red Hat.
3705
3706 This baseline implements configuration requirements from the
3707 following sources:
3708
3709 - Committee on National Security Systems Instruction No. 1253
3710 (CNSSI 1253) - NIST 800-53 control selections for MODERATE im‐
3711 pact systems (NIST 800-53) - U.S. Government Configuration Base‐
3712 line (USGCB) - NIAP Protection Profile for Virtualization v1.0
3713 (VPP v1.0)
3714
3715 For any differing configuration requirements, e.g. password
3716 lengths, the stricter security setting was chosen. Security Re‐
3717 quirement Traceability Guides (RTMs) and sample System Security
3718 Configuration Guides are provided via the scap-security-guide-
3719 docs package.
3720
3721 This profile reflects U.S. Government consensus content and is
3722 developed through the ComplianceAsCode project, championed by
3723 the National Security Agency. Except for differences in format‐
3724 ting to accommodate publishing processes, this profile mirrors
3725 ComplianceAsCode content as minor divergences, such as bugfixes,
3726 work through the consensus and release processes.
3727
3728
3729
3730
3731
3733 Source data stream: ssg-sl7-ds.xml
3734
3735 The Guide to the Secure Configuration of Red Hat Enterprise Linux 7 is
3736 broken into 'profiles', groupings of security settings that correlate
3737 to a known policy. Available profiles are:
3738
3739
3740
3741 PCI-DSS v3.2.1 Control Baseline for Red Hat Enterprise Linux 7
3742
3743 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
3744
3745 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
3746 plied.
3747
3748
3749 Standard System Security Profile for Red Hat Enterprise Linux 7
3750
3751 Profile ID: xccdf_org.ssgproject.content_profile_standard
3752
3753 This profile contains rules to ensure standard security baseline
3754 of a Red Hat Enterprise Linux 7 system. Regardless of your sys‐
3755 tem's workload all of these checks should pass.
3756
3757
3758
3759
3760
3762 Source data stream: ssg-sle12-ds.xml
3763
3764 The Guide to the Secure Configuration of SUSE Linux Enterprise 12 is
3765 broken into 'profiles', groupings of security settings that correlate
3766 to a known policy. Available profiles are:
3767
3768
3769
3770 ANSSI-BP-028 (enhanced)
3771
3772 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
3773 hanced
3774
3775 This profile contains configurations that align to ANSSI-BP-028
3776 v2.0 at the enhanced hardening level.
3777
3778 ANSSI is the French National Information Security Agency, and
3779 stands for Agence nationale de la sécurité des systèmes d'infor‐
3780 mation. ANSSI-BP-028 is a configuration recommendation for
3781 GNU/Linux systems.
3782
3783 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
3784 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3785 securite-relatives-a-un-systeme-gnulinux/
3786
3787 Only the components strictly necessary to the service provided
3788 by the system should be installed. Those whose presence can not
3789 be justified should be disabled, removed or deleted. Performing
3790 a minimal install is a good starting point, but doesn't provide
3791 any assurance over any package installed later. Manual review
3792 is required to assess if the installed services are minimal.
3793
3794
3795 ANSSI-BP-028 (high)
3796
3797 Profile ID: xccdf_org.ssgproject.content_pro‐
3798 file_anssi_bp28_high
3799
3800 This profile contains configurations that align to ANSSI-BP-028
3801 v2.0 at the high hardening level.
3802
3803 ANSSI is the French National Information Security Agency, and
3804 stands for Agence nationale de la sécurité des systèmes d'infor‐
3805 mation. ANSSI-BP-028 is a configuration recommendation for
3806 GNU/Linux systems.
3807
3808 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
3809 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3810 securite-relatives-a-un-systeme-gnulinux/
3811
3812 Only the components strictly necessary to the service provided
3813 by the system should be installed. Those whose presence can not
3814 be justified should be disabled, removed or deleted. Performing
3815 a minimal install is a good starting point, but doesn't provide
3816 any assurance over any package installed later. Manual review
3817 is required to assess if the installed services are minimal.
3818
3819
3820 ANSSI-BP-028 (intermediary)
3821
3822 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
3823 termediary
3824
3825 This profile contains configurations that align to ANSSI-BP-028
3826 v2.0 at the intermediary hardening level.
3827
3828 ANSSI is the French National Information Security Agency, and
3829 stands for Agence nationale de la sécurité des systèmes d'infor‐
3830 mation. ANSSI-BP-028 is a configuration recommendation for
3831 GNU/Linux systems.
3832
3833 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
3834 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3835 securite-relatives-a-un-systeme-gnulinux/
3836
3837 Only the components strictly necessary to the service provided
3838 by the system should be installed. Those whose presence can not
3839 be justified should be disabled, removed or deleted. Performing
3840 a minimal install is a good starting point, but doesn't provide
3841 any assurance over any package installed later. Manual review
3842 is required to assess if the installed services are minimal.
3843
3844
3845 ANSSI-BP-028 (minimal)
3846
3847 Profile ID: xccdf_org.ssgproject.content_pro‐
3848 file_anssi_bp28_minimal
3849
3850 This profile contains configurations that align to ANSSI-BP-028
3851 v2.0 at the minimal hardening level.
3852
3853 ANSSI is the French National Information Security Agency, and
3854 stands for Agence nationale de la sécurité des systèmes d'infor‐
3855 mation. ANSSI-BP-028 is a configuration recommendation for
3856 GNU/Linux systems.
3857
3858 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
3859 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3860 securite-relatives-a-un-systeme-gnulinux/
3861
3862 Only the components strictly necessary to the service provided
3863 by the system should be installed. Those whose presence can not
3864 be justified should be disabled, removed or deleted. Performing
3865 a minimal install is a good starting point, but doesn't provide
3866 any assurance over any package installed later. Manual review
3867 is required to assess if the installed services are minimal.
3868
3869
3870 CIS SUSE Linux Enterprise 12 Benchmark for Level 2 - Server
3871
3872 Profile ID: xccdf_org.ssgproject.content_profile_cis
3873
3874 This profile defines a baseline that aligns to the "Level 2 -
3875 Server" configuration from the Center for Internet Security®
3876 SUSE Linux Enterprise 12 Benchmark™, v3.1.0, released
3877 01-24-2022.
3878
3879 This profile includes Center for Internet Security® SUSE Linux
3880 Enterprise 12 CIS Benchmarks™ content.
3881
3882
3883 CIS SUSE Linux Enterprise 12 Benchmark for Level 1 - Server
3884
3885 Profile ID: xccdf_org.ssgproject.content_profile_cis_server_l1
3886
3887 This profile defines a baseline that aligns to the "Level 1 -
3888 Server" configuration from the Center for Internet Security®
3889 SUSE Linux Enterprise 12 Benchmark™, v3.1.0, released
3890 01-24-2022.
3891
3892 This profile includes Center for Internet Security® SUSE Linux
3893 Enterprise 12 CIS Benchmarks™ content.
3894
3895
3896 CIS SUSE Linux Enterprise 12 Benchmark for Level 1 - Workstation
3897
3898 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
3899 tion_l1
3900
3901 This profile defines a baseline that aligns to the "Level 1 -
3902 Workstation" configuration from the Center for Internet Secu‐
3903 rity® SUSE Linux Enterprise 12 Benchmark™, v3.1.0, released
3904 01-24-2022.
3905
3906 This profile includes Center for Internet Security® SUSE Linux
3907 Enterprise 12 CIS Benchmarks™ content.
3908
3909
3910 CIS SUSE Linux Enterprise 12 Benchmark Level 2 - Workstation
3911
3912 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
3913 tion_l2
3914
3915 This profile defines a baseline that aligns to the "Level 2 -
3916 Workstation" configuration from the Center for Internet Secu‐
3917 rity® SUSE Linux Enterprise 12 Benchmark™, v3.1.0, released
3918 01-24-2022.
3919
3920 This profile includes Center for Internet Security® SUSE Linux
3921 Enterprise 12 CIS Benchmarks™ content.
3922
3923
3924 PCI-DSS v4 Control Baseline for SUSE Linux enterprise 12
3925
3926 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss-4
3927
3928 Ensures PCI-DSS v4 security configuration settings are applied.
3929
3930
3931 PCI-DSS v3.2.1 Control Baseline for SUSE Linux enterprise 12
3932
3933 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
3934
3935 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
3936 plied.
3937
3938
3939 Standard System Security Profile for SUSE Linux Enterprise 12
3940
3941 Profile ID: xccdf_org.ssgproject.content_profile_standard
3942
3943 This profile contains rules to ensure standard security baseline
3944 of a SUSE Linux Enterprise 12 system. Regardless of your sys‐
3945 tem's workload all of these checks should pass.
3946
3947
3948 DISA STIG for SUSE Linux Enterprise 12
3949
3950 Profile ID: xccdf_org.ssgproject.content_profile_stig
3951
3952 This profile contains configuration checks that align to the
3953 DISA STIG for SUSE Linux Enterprise 12 V2R5.
3954
3955
3956
3957
3958
3960 Source data stream: ssg-sle15-ds.xml
3961
3962 The Guide to the Secure Configuration of SUSE Linux Enterprise 15 is
3963 broken into 'profiles', groupings of security settings that correlate
3964 to a known policy. Available profiles are:
3965
3966
3967
3968 ANSSI-BP-028 (enhanced)
3969
3970 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_en‐
3971 hanced
3972
3973 This profile contains configurations that align to ANSSI-BP-028
3974 v2.0 at the enhanced hardening level.
3975
3976 ANSSI is the French National Information Security Agency, and
3977 stands for Agence nationale de la sécurité des systèmes d'infor‐
3978 mation. ANSSI-BP-028 is a configuration recommendation for
3979 GNU/Linux systems.
3980
3981 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
3982 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
3983 securite-relatives-a-un-systeme-gnulinux/
3984
3985 Only the components strictly necessary to the service provided
3986 by the system should be installed. Those whose presence can not
3987 be justified should be disabled, removed or deleted. Performing
3988 a minimal install is a good starting point, but doesn't provide
3989 any assurance over any package installed later. Manual review
3990 is required to assess if the installed services are minimal.
3991
3992
3993 ANSSI-BP-028 (high)
3994
3995 Profile ID: xccdf_org.ssgproject.content_pro‐
3996 file_anssi_bp28_high
3997
3998 This profile contains configurations that align to ANSSI-BP-028
3999 v2.0 at the high hardening level.
4000
4001 ANSSI is the French National Information Security Agency, and
4002 stands for Agence nationale de la sécurité des systèmes d'infor‐
4003 mation. ANSSI-BP-028 is a configuration recommendation for
4004 GNU/Linux systems.
4005
4006 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
4007 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
4008 securite-relatives-a-un-systeme-gnulinux/
4009
4010 Only the components strictly necessary to the service provided
4011 by the system should be installed. Those whose presence can not
4012 be justified should be disabled, removed or deleted. Performing
4013 a minimal install is a good starting point, but doesn't provide
4014 any assurance over any package installed later. Manual review
4015 is required to assess if the installed services are minimal.
4016
4017
4018 ANSSI-BP-028 (intermediary)
4019
4020 Profile ID: xccdf_org.ssgproject.content_profile_anssi_bp28_in‐
4021 termediary
4022
4023 This profile contains configurations that align to ANSSI-BP-028
4024 v2.0 at the intermediary hardening level.
4025
4026 ANSSI is the French National Information Security Agency, and
4027 stands for Agence nationale de la sécurité des systèmes d'infor‐
4028 mation. ANSSI-BP-028 is a configuration recommendation for
4029 GNU/Linux systems.
4030
4031 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
4032 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
4033 securite-relatives-a-un-systeme-gnulinux/
4034
4035 Only the components strictly necessary to the service provided
4036 by the system should be installed. Those whose presence can not
4037 be justified should be disabled, removed or deleted. Performing
4038 a minimal install is a good starting point, but doesn't provide
4039 any assurance over any package installed later. Manual review
4040 is required to assess if the installed services are minimal.
4041
4042
4043 ANSSI-BP-028 (minimal)
4044
4045 Profile ID: xccdf_org.ssgproject.content_pro‐
4046 file_anssi_bp28_minimal
4047
4048 This profile contains configurations that align to ANSSI-BP-028
4049 v2.0 at the minimal hardening level.
4050
4051 ANSSI is the French National Information Security Agency, and
4052 stands for Agence nationale de la sécurité des systèmes d'infor‐
4053 mation. ANSSI-BP-028 is a configuration recommendation for
4054 GNU/Linux systems.
4055
4056 A copy of the ANSSI-BP-028 can be found at the ANSSI website:
4057 https://www.ssi.gouv.fr/administration/guide/recommandations-de-
4058 securite-relatives-a-un-systeme-gnulinux/
4059
4060 Only the components strictly necessary to the service provided
4061 by the system should be installed. Those whose presence can not
4062 be justified should be disabled, removed or deleted. Performing
4063 a minimal install is a good starting point, but doesn't provide
4064 any assurance over any package installed later. Manual review
4065 is required to assess if the installed services are minimal.
4066
4067
4068 CIS SUSE Linux Enterprise 15 Benchmark for Level 2 - Server
4069
4070 Profile ID: xccdf_org.ssgproject.content_profile_cis
4071
4072 This profile defines a baseline that aligns to the "Level 2 -
4073 Server" configuration from the Center for Internet Security®
4074 SUSE Linux Enterprise 15 Benchmark™, v1.1.1, released
4075 01-24-2022.
4076
4077 This profile includes Center for Internet Security® SUSE Linux
4078 Enterprise 15 CIS Benchmarks™ content.
4079
4080
4081 CIS SUSE Linux Enterprise 15 Benchmark for Level 1 - Server
4082
4083 Profile ID: xccdf_org.ssgproject.content_profile_cis_server_l1
4084
4085 This profile defines a baseline that aligns to the "Level 1 -
4086 Server" configuration from the Center for Internet Security®
4087 SUSE Linux Enterprise 15 Benchmark™, v1.1.1, released
4088 01-24-2022.
4089
4090 This profile includes Center for Internet Security® SUSE Linux
4091 Enterprise 15 CIS Benchmarks™ content.
4092
4093
4094 CIS SUSE Linux Enterprise 15 Benchmark for Level 1 - Workstation
4095
4096 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
4097 tion_l1
4098
4099 This profile defines a baseline that aligns to the "Level 1 -
4100 Workstation" configuration from the Center for Internet Secu‐
4101 rity® SUSE Linux Enterprise 15 Benchmark™, v1.1.1, released
4102 01-24-2022.
4103
4104 This profile includes Center for Internet Security® SUSE Linux
4105 Enterprise 15 CIS Benchmarks™ content.
4106
4107
4108 CIS SUSE Linux Enterprise 15 Benchmark Level 2 - Workstation
4109
4110 Profile ID: xccdf_org.ssgproject.content_profile_cis_worksta‐
4111 tion_l2
4112
4113 This profile defines a baseline that aligns to the "Level 2 -
4114 Workstation" configuration from the Center for Internet Secu‐
4115 rity® SUSE Linux Enterprise 15 Benchmark™, v1.1.1, released
4116 01-24-2022.
4117
4118 This profile includes Center for Internet Security® SUSE Linux
4119 Enterprise 15 CIS Benchmarks™ content.
4120
4121
4122 Health Insurance Portability and Accountability Act (HIPAA)
4123
4124 Profile ID: xccdf_org.ssgproject.content_profile_hipaa
4125
4126 The HIPAA Security Rule establishes U.S. national standards to
4127 protect individuals’ electronic personal health information that
4128 is created, received, used, or maintained by a covered entity.
4129 The Security Rule requires appropriate administrative, physical
4130 and technical safeguards to ensure the confidentiality, integ‐
4131 rity, and security of electronic protected health information.
4132
4133 This profile contains configuration checks that align to the
4134 HIPPA Security Rule for SUSE Linux Enterprise 15 V1R3.
4135
4136
4137 PCI-DSS v4 Control Baseline for SUSE Linux enterprise 15
4138
4139 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss-4
4140
4141 Ensures PCI-DSS v4 security configuration settings are applied.
4142
4143
4144 PCI-DSS v3.2.1 Control Baseline for SUSE Linux enterprise 15
4145
4146 Profile ID: xccdf_org.ssgproject.content_profile_pci-dss
4147
4148 Ensures PCI-DSS v3.2.1 security configuration settings are ap‐
4149 plied.
4150
4151
4152 Hardening for Public Cloud Image of SUSE Linux Enterprise Server (SLES)
4153 for SAP Applications 15
4154
4155 Profile ID: xccdf_org.ssgproject.content_profile_pcs-hardening-
4156 sap
4157
4158 This profile contains configuration rules to be used to harden
4159 the images of SUSE Linux Enterprise Server (SLES) for SAP Appli‐
4160 cations 15 including all Service Packs, for Public Cloud
4161 providers, currently AWS, Microsoft Azure, and Google Cloud.
4162
4163
4164 Public Cloud Hardening for SUSE Linux Enterprise 15
4165
4166 Profile ID: xccdf_org.ssgproject.content_profile_pcs-hardening
4167
4168 This profile contains configuration checks to be used to harden
4169 SUSE Linux Enterprise 15 for use with public cloud providers.
4170
4171
4172 Standard System Security Profile for SUSE Linux Enterprise 15
4173
4174 Profile ID: xccdf_org.ssgproject.content_profile_standard
4175
4176 This profile contains rules to ensure standard security baseline
4177 of a SUSE Linux Enterprise 15 system based off of the SUSE Hard‐
4178 ening Guide. Regardless of your system's workload all of these
4179 checks should pass.
4180
4181
4182 DISA STIG for SUSE Linux Enterprise 15
4183
4184 Profile ID: xccdf_org.ssgproject.content_profile_stig
4185
4186 This profile contains configuration checks that align to the
4187 DISA STIG for SUSE Linux Enterprise 15 V1R4.
4188
4189
4190
4191
4192
4194 Source data stream: ssg-ubuntu1604-ds.xml
4195
4196 The Guide to the Secure Configuration of Ubuntu 16.04 is broken into
4197 'profiles', groupings of security settings that correlate to a known
4198 policy. Available profiles are:
4199
4200
4201
4202 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
4203
4204 Profile ID: xccdf_org.ssgproject.content_pro‐
4205 file_anssi_np_nt28_average
4206
4207 This profile contains items for GNU/Linux installations already
4208 protected by multiple higher level security stacks.
4209
4210
4211 Profile for ANSSI DAT-NT28 High (Enforced) Level
4212
4213 Profile ID: xccdf_org.ssgproject.content_pro‐
4214 file_anssi_np_nt28_high
4215
4216 This profile contains items for GNU/Linux installations storing
4217 sensitive information that can be accessible from unauthenti‐
4218 cated or uncontroled networks.
4219
4220
4221 Profile for ANSSI DAT-NT28 Minimal Level
4222
4223 Profile ID: xccdf_org.ssgproject.content_pro‐
4224 file_anssi_np_nt28_minimal
4225
4226 This profile contains items to be applied systematically.
4227
4228
4229 Profile for ANSSI DAT-NT28 Restrictive Level
4230
4231 Profile ID: xccdf_org.ssgproject.content_pro‐
4232 file_anssi_np_nt28_restrictive
4233
4234 This profile contains items for GNU/Linux installations exposed
4235 to unauthenticated flows or multiple sources.
4236
4237
4238 Standard System Security Profile for Ubuntu 16.04
4239
4240 Profile ID: xccdf_org.ssgproject.content_profile_standard
4241
4242 This profile contains rules to ensure standard security baseline
4243 of an Ubuntu 16.04 system. Regardless of your system's workload
4244 all of these checks should pass.
4245
4246
4247
4248
4249
4251 Source data stream: ssg-ubuntu1804-ds.xml
4252
4253 The Guide to the Secure Configuration of Ubuntu 18.04 is broken into
4254 'profiles', groupings of security settings that correlate to a known
4255 policy. Available profiles are:
4256
4257
4258
4259 Profile for ANSSI DAT-NT28 Average (Intermediate) Level
4260
4261 Profile ID: xccdf_org.ssgproject.content_pro‐
4262 file_anssi_np_nt28_average
4263
4264 This profile contains items for GNU/Linux installations already
4265 protected by multiple higher level security stacks.
4266
4267
4268 Profile for ANSSI DAT-NT28 High (Enforced) Level
4269
4270 Profile ID: xccdf_org.ssgproject.content_pro‐
4271 file_anssi_np_nt28_high
4272
4273 This profile contains items for GNU/Linux installations storing
4274 sensitive information that can be accessible from unauthenti‐
4275 cated or uncontroled networks.
4276
4277
4278 Profile for ANSSI DAT-NT28 Minimal Level
4279
4280 Profile ID: xccdf_org.ssgproject.content_pro‐
4281 file_anssi_np_nt28_minimal
4282
4283 This profile contains items to be applied systematically.
4284
4285
4286 Profile for ANSSI DAT-NT28 Restrictive Level
4287
4288 Profile ID: xccdf_org.ssgproject.content_pro‐
4289 file_anssi_np_nt28_restrictive
4290
4291 This profile contains items for GNU/Linux installations exposed
4292 to unauthenticated flows or multiple sources.
4293
4294
4295 CIS Ubuntu 18.04 LTS Benchmark
4296
4297 Profile ID: xccdf_org.ssgproject.content_profile_cis
4298
4299 This baseline aligns to the Center for Internet Security Ubuntu
4300 18.04 LTS Benchmark, v1.0.0, released 08-13-2018.
4301
4302
4303 Standard System Security Profile for Ubuntu 18.04
4304
4305 Profile ID: xccdf_org.ssgproject.content_profile_standard
4306
4307 This profile contains rules to ensure standard security baseline
4308 of an Ubuntu 18.04 system. Regardless of your system's workload
4309 all of these checks should pass.
4310
4311
4312
4313
4314
4316 Source data stream: ssg-ubuntu2004-ds.xml
4317
4318 The Guide to the Secure Configuration of Ubuntu 20.04 is broken into
4319 'profiles', groupings of security settings that correlate to a known
4320 policy. Available profiles are:
4321
4322
4323
4324 CIS Ubuntu 20.04 Level 1 Server Benchmark
4325
4326 Profile ID: xccdf_org.ssgproject.content_pro‐
4327 file_cis_level1_server
4328
4329 This baseline aligns to the Center for Internet Security Ubuntu
4330 20.04 LTS Benchmark, v1.0.0, released 07-21-2020.
4331
4332
4333 CIS Ubuntu 20.04 Level 1 Workstation Benchmark
4334
4335 Profile ID: xccdf_org.ssgproject.content_pro‐
4336 file_cis_level1_workstation
4337
4338 This baseline aligns to the Center for Internet Security Ubuntu
4339 20.04 LTS Benchmark, v1.0.0, released 07-21-2020.
4340
4341
4342 CIS Ubuntu 20.04 Level 2 Server Benchmark
4343
4344 Profile ID: xccdf_org.ssgproject.content_pro‐
4345 file_cis_level2_server
4346
4347 This baseline aligns to the Center for Internet Security Ubuntu
4348 20.04 LTS Benchmark, v1.0.0, released 07-21-2020.
4349
4350
4351 CIS Ubuntu 20.04 Level 2 Workstation Benchmark
4352
4353 Profile ID: xccdf_org.ssgproject.content_pro‐
4354 file_cis_level2_workstation
4355
4356 This baseline aligns to the Center for Internet Security Ubuntu
4357 20.04 LTS Benchmark, v1.0.0, released 07-21-2020.
4358
4359
4360 Standard System Security Profile for Ubuntu 20.04
4361
4362 Profile ID: xccdf_org.ssgproject.content_profile_standard
4363
4364 This profile contains rules to ensure standard security baseline
4365 of an Ubuntu 20.04 system. Regardless of your system's workload
4366 all of these checks should pass.
4367
4368
4369 Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
4370 (STIG) V1R9
4371
4372 Profile ID: xccdf_org.ssgproject.content_profile_stig
4373
4374 This Security Technical Implementation Guide is published as a
4375 tool to improve the security of Department of Defense (DoD) in‐
4376 formation systems. The requirements are derived from the Na‐
4377 tional Institute of Standards and Technology (NIST) 800-53 and
4378 related documents.
4379
4380
4381
4382
4383
4385 Source data stream: ssg-ubuntu2204-ds.xml
4386
4387 The Guide to the Secure Configuration of Ubuntu 22.04 is broken into
4388 'profiles', groupings of security settings that correlate to a known
4389 policy. Available profiles are:
4390
4391
4392
4393 CIS Ubuntu 22.04 Level 1 Server Benchmark
4394
4395 Profile ID: xccdf_org.ssgproject.content_pro‐
4396 file_cis_level1_server
4397
4398 This baseline aligns to the Center for Internet Security Ubuntu
4399 22.04 LTS Benchmark, v1.0.0, released 08-30-2022.
4400
4401
4402 CIS Ubuntu 22.04 Level 1 Workstation Benchmark
4403
4404 Profile ID: xccdf_org.ssgproject.content_pro‐
4405 file_cis_level1_workstation
4406
4407 This baseline aligns to the Center for Internet Security Ubuntu
4408 22.04 LTS Benchmark, v1.0.0, released 08-30-2022.
4409
4410
4411 CIS Ubuntu 22.04 Level 2 Server Benchmark
4412
4413 Profile ID: xccdf_org.ssgproject.content_pro‐
4414 file_cis_level2_server
4415
4416 This baseline aligns to the Center for Internet Security Ubuntu
4417 22.04 LTS Benchmark, v1.0.0, released 08-30-2022.
4418
4419
4420 CIS Ubuntu 22.04 Level 2 Workstation Benchmark
4421
4422 Profile ID: xccdf_org.ssgproject.content_pro‐
4423 file_cis_level2_workstation
4424
4425 This baseline aligns to the Center for Internet Security Ubuntu
4426 22.04 LTS Benchmark, v1.0.0, released 08-30-2022.
4427
4428
4429 Standard System Security Profile for Ubuntu 22.04
4430
4431 Profile ID: xccdf_org.ssgproject.content_profile_standard
4432
4433 This profile contains rules to ensure standard security baseline
4434 of an Ubuntu 22.04 system. Regardless of your system's workload
4435 all of these checks should pass.
4436
4437
4438
4439
4440
4442 Source data stream: ssg-uos20-ds.xml
4443
4444 The Guide to the Secure Configuration of UnionTech OS Server 20 is bro‐
4445 ken into 'profiles', groupings of security settings that correlate to a
4446 known policy. Available profiles are:
4447
4448
4449
4450 Standard System Security Profile for UnionTech OS Server 20
4451
4452 Profile ID: xccdf_org.ssgproject.content_profile_standard
4453
4454 This profile contains rules to ensure standard security baseline
4455 of a UnionTech OS Server 20 system. Regardless of your system's
4456 workload all of these checks should pass.
4457
4458
4459
4460
4461
4462
4464 To scan your system utilizing the OpenSCAP utility against the ospp
4465 profile:
4466
4467 oscap xccdf eval --profile ospp --results-arf /tmp/`hostname`-ssg-re‐
4468 sults.xml --report /tmp/`hostname`-ssg-results.html
4469 /usr/share/xml/scap/ssg/content/ssg-{product}-xccdf.xml
4470
4471 Additional details can be found on the following websites:
4472
4473 https://www.github.com/ComplianceAsCode/content
4474 The project's Github page.
4475
4476 https://complianceascode.readthedocs.io
4477 The project's ReadTheDocs page.
4478
4479 https://app.gitter.im/#/room/#Compliance-As-Code-The_content:gitter.im
4480 The project's Gitter IM space
4481
4482
4484 /usr/share/xml/scap/ssg/content
4485 Houses SCAP content utilizing the following naming conventions:
4486
4487 SCAP Source data streams: ssg-{product}-ds.xml
4488
4489
4490
4491
4492
4493 /usr/share/scap-security-guide/ansible/
4494 Contains Ansible Playbooks for SSG profiles.
4495
4496
4497
4498
4499
4500
4501
4502
4503 /usr/share/scap-security-guide/kickstart/
4504 Contains example kickstarts that install systems hardened
4505 against a particular profile.
4506
4507
4508 /usr/share/scap-security-guide/tailoring/
4509 Contains tailoring files that enable rules that are not covered
4510 by third-party SCAP content and disables rules that are covered
4511 by the content shipped in scap-security-guide.
4512
4513
4514
4516 oscap(8)
4517
4518
4519
4521 Please direct all questions to the SSG mailing list: https://lists.fe‐
4522 dorahosted.org/mailman/listinfo/scap-security-guide
4523
4524
4525
4526version 1 26 Jan 2013 scap-security-guide(8)