linux_armour
Ansible Role: osm_linux_armour
This Ansible roles deals with auditing of Ubuntu according to CIS benchmark.
S. No. | Services | Checks covered |
---|---|---|
1. | Special Purpose Services | Ensure Avahi, DHCP, LDAP Server is not enabled |
2. | Service Client | Ensure rsh, telnet, LDAP client is not installed |
3. | inetd Services | Ensure telnet server, discarded services,rsh server is not installed |
4. | Logging and Auditing | auditd is installed and enabled, audit log storage size, system is disabled when audit logs are full, audit logs are not automatically deleted, login and logout events are collected, session initiation information is collected |
5. | Filesystem Configuration | Disable unused filesystems, Ensures sticky bit is set on all world-writable directories (Use an argument executable: /bin/bash in case of an error), Disable Automounting. |
6. | System File Permissions | Ensure passwd, passwd-, group, group-, shadow, shadow-, gshadow, gshadow- are configured |
7. | Filesystem Integrity Check | Ensure filesystem integrity is regularly checked |
8. | Additional Process Hardening | Ensure core dumps are restricted and prelink is disabled |
9. | Network Configuration Host | Ensure IP forwarding, packet redirect sending are disabled and suspicious packets are logged |
10. | Network Configuration Host and Router | Ensure bogus ICMP responses are ignored, Reverse Path Filtering is enabled, TCP SYN Cookies is enabled |
11. | TCP Wrapper | Ensure permissions on /etc/hosts.allow and /etc/hosts.deny are configured |
12. | Uncommon Network Protocols | Ensure DCCP and SCTP are disabled |
13. | Secure Boot Settings | Ensure permissions on bootloader config are configured and authentication required for single user mode |
14. | Mandatory Access Control | Checks the state and ensures SETroubleshoot is not installed if enabled |
Version History
Date | Version | Description | Changed By |
---|---|---|---|
Feb 27 | v0.0.1 | To harden OS(ubuntu) based on important(scored) CIS benchmarks | Anjali Singh |
Aug 08 | v0.0.2 | Added support for Centos | Anjali Singh |
Salient Features
- This role will configure the OS on the basis of the essential CIS benchmark.
Supported OS
- Ubuntu:bionic
- Centos:8
Dependencies
- Python should be on present on testing server.
Role Variables
There are two types of variables i.e Mandatory and optional. Mandatory variables are those which should be configured as per CIS benchmark and Optional variables depends upon the service one is using. It can be enable or disable depending upon the requirements.
Mandatory Variables
Variables | Default Values | Description |
---|---|---|
System_File_Permissions | host.conf, hostname, hosts, hosts.allow, hosts.deny, passwd, passwd-, shadow, shadow-, gshadow, gshadow-, group, group- | Special files whose permissions will change. |
os_packages_clean | true | deprecated packages are removed |
os_packages_list | xinetd, inetd, ypserv, telnet-server, telnet-client, rsh-server, rsh-client, prelink, openldap-clients, openldap2-client, ldap-utils | Disbale these sevices if not required |
audit_package | auditd | This is used to keep record of every logs |
Optional Variables
Variables | Optional Values | Description |
---|---|---|
os_services_name | avahi-daemon, dhcpd, slapd, named | Special purpose services which can be stop if not required |
audit_max_log_file | 5 | Number of log files one needs to keep |
os_audit_max_log_file_action | keep_logs | To save logs |
Inventory
An inventory should look like this:
[osconfig]
192.168.1.198 ansible_user=ubuntu
Example Playbook
- Here is an example playbook :-
---
- name: OS audit
hosts: osconfig
become: true
roles:
- role: osm_linux_armour
Future Proposed Changes
Will be updated as per 2020 cis benchmarks.
References
Author Information
Install
ansible-galaxy install OT-OSM/linux_armour
License
Unknown
Downloads
318
Owner