SCAP Security Guide release notes
Updated -
Table of Contents
The scap-security-guide package provides collections of security policies for Linux systems. The guidance consists of a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
0.1.78
- Profile updates in Red Hat Enterprise Linux 8:
- DISA STIG updated to V2R3
- Profile updates in Red Hat Enterprise Linux 9:
- Added a profile that aligns to the BSI (Germany Federal Office for Security Information) IT-Grundschutz Basic-Protection (sections 1.1 and 1.3)
- DISA STIG updated to V2R5
- Red Hat Enterprise Linux 8 notable bug fixes:
- The
service_rngd_enabledrule is now evaluated on RHEL 8.4 and later when not running in FIPS mode (RHEL-95188). - The default cipher order in the
configure_gnutls_tls_crypto_policyrule is used (RHEL-1821). - Profile Bash remediation scripts are reintroduced in the RPM package (RHEL-105501).
- The
- Red Hat Enterprise Linux 9 notable bug fixes:
- The coverage of section 1.2.1.2 of CIS profile has been improved by ensuring that GPG checks are never disabled (RHEL-102328).
- Rules allow white spaces around the equal sign in systemd configuration (RHEL-89714).
- Fixed errors in the
File_permissions_sudorule description, and theservice_cron_enabledrule now checks for the correct package (RHEL-89812). - The
polkit-pkla-compatpackage is installed if required (RHEL-87606). - The
auditd_freqrule correctly honors the XCCDF variable (RHEL-64013).
- Red Hat Enterprise Linux 10 notable bug fixes:
- Rules allow white spaces around the equal sign in systemd configuration (RHEL-93659).
- Added support for drop-in files to systemd coredump rules (RHEL-99973)
- SCE content is now available for rules that traverse file systems.
- See the Using Script Check Engine (SCE) in OpenSCAP for large filesystems Red Hat Knowledgebase article for details on how to configure your environment to use SCE content for rules that consume a lot of memory on large file systems.
0.1.77
- The STIG profiles were aligned with the latest DISA STIG policies:
- Red Hat Enterprise Linux 8 to V2R3
- Red Hat Enterprise Linux 9 to V2R4
- Red Hat Enterprise Linux 8 notable bug fixes:
- User namespaces are no longer disabled by the STIG profile (RHEL-76750).
- Red Hat Enterprise Linux 9 notable bug fixes:
- The
rsyslog_remote_loghostrule now supports RainerScript syntax (RHEL-62731). - The
networkmanager_dns_moderule now checks drop-in configuration files and has more resilient regular expression (RHEL-62843). - Improved checking of GRUB 2 superuser and password configuration (RHEL-58818)
- The
- Red Hat Enterprise Linux 10 content has been updated to reflect changes in RHEL 10 components.
0.1.76
- The STIG profiles were aligned with the latest DISA STIG policies:
- Red Hat Enterprise Linux 8 to V2R2
- Red Hat Enterprise Linux 9 to V2R3
- Added Red Hat Enterprise Linux 10 Vendor STIG
- Red Hat Enterprise Linux 8 notable bug fixes:
- The
require_singleuser_authrule now uses thesystemdoverride mechanism (RHEL-71936)
- The
- Red Hat Enterprise Linux 9 notable bug fixes:
- The
require_singleuser_authrule now usessystemdoverride mechanism (RHEL-71936) - The
sysctl_user_max_user_namespacesrule is now not scored and informational (RHEL-40120) - Aligned the check for approved SSH ciphers with the latest STIG policy (RHEL-65432)
- The
0.1.75
- The PCI-DSS profiles were updated to better align with PCI-DSS benchmark version 4.0.1 for the following products:
- Red Hat Enterprise Linux 8
- Red Hat Enterprise Linux 9
- The STIG profiles were aligned with the latest DISA STIG policies:
- Red Hat Enterprise Linux 8 with V2R1
- Red Hat Enterprise Linux 9 with V2R2
- Red Hat Enterprise Linux 8 notable bug fixes:
- Enhance GRUB2 kernel command line arguments detection to cover more use cases (RHEL-53365)
- Red Hat Enterprise Linux 9 notable bug fixes:
- Adjust rules related to
sshd, ensure constancy in checked values and ensure that drop-in configuration files are checked (RHEL-38206) - Adjust
mount_option_nodev_nonroot_local_partitionsto work in Image Builder environments (RHEL-45018) - Add a rule checking for presence of chrony to CIS profiles (RHEL-60005)
- Remove the rule
sshd_use_priv_separationfrom STIG profiles (RHEL-66057) - Remediation of NetworkManager DNS mode now remediates value
default(RHEL-53426)
- Adjust rules related to
0.1.74
- The CIS profiles were updated to v2.0.0 for Red Hat Enterprise Linux 9.
- Red Hat Enterprise Linux 8 and 9 notable bug fixes:
- Ensure
authselectfeatures are preserved by theenable_authselectrule (RHEL-39383) - Fix checking for passwords last changed date (RHEL-47129)
- Remediations of Journald configuration files now create correct .ini file sections (RHEL-38531)
- Adjust service requirements for the CIS profiles (RHEL-23852)
- Update password hashing settings for the ANSSI profiles (RHEL-44983), (RHEL-54390)
- Improve Rsyslog rules to support the RainerScript syntax (RHEL-1816)
- Ensure
- Red Hat Enterprise Linux 8 notable changes:
- The
ssg-rhel8-ds-1.2.xmlandssg-firefox-ds-1.2.xmldata streams are no longer provided. They are replaced by symbolic links leading to the respective data streams (ssg-rhel8-ds.xmlorssg-firefox-ds.xml). - The Red Hat Enterprise Linux 7 content is no longer updated and remains in the state as provided in the 0.1.73 version.
- The
- Red Hat Enterprise Linux 9 notable changes:
- The STIG profiles are not upgraded to V2R1 in this release because this STIG update touches only CCI references.
0.1.73
- ANSSI profiles were updated to better align with latest policy version 2.0 and to increase the policy coverage for the following products:
- Red Hat Enterprise Linux 7
- Red Hat Enterprise Linux 8
- Red Hat Enterprise Linux 9
- STIG profiles were aligned with the latest DISA STIG policies:
- Red Hat Enterprise Linux 8 with V1R14
- Red Hat Enterprise Linux 9 with V1R3
- The
security_patches_up_to_daterule has been disabled, the result of evaluating this rule will benotchecked. Also, remediation for this rule is not part of the shipped content. - Red Hat Enterprise Linux 8 notable bug fixes:
- Change crypto policy used in the CUI profile to FIPS (RHEL-30346)
- Fix file path identification in Rsyslog configuration (RHEL-17202)
- Use a correct
chronyserver address in STIG profiles (RHEL-1814)
- Red Hat Enterprise Linux 9 notable bug fixes:
- Correctly parse
sudooptions even if they are not quoted (RHEL-31976) - Ensure that web links within kickstart files are valid (RHEL-30735)
- Align set of allowed SSH ciphers with STIG requirement (RHEL-29684)
- Add a rule that enables auditing of files within
/etc/sysconfig/network-scripts(RHEL-1093, RHEL-29308) - Remove a rule that restricts user namespaces from the STIG GUI profile (RHEL-10416)
- Correctly parse
0.1.72
- Update to CIS profiles aligning them with the latest benchmarks:
- CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0 - 12-21-2023
- CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0 - 10-30-2023 (related ticket is RHEL-1314)
- PCI DSS profiles were aligned to the PCI DSS policy version 4.0 for the following products:
- Red Hat Enterprise Linux 7
- Red Hat Enterprise Linux 8 (RHEL-1808)
- Red Hat Enterprise Linux 9
- STIG profiles were aligned with the latest DISA STIG policies:
- Red Hat Enterprise Linux 7 with V3R14
- Red Hat Enterprise Linux 8 with V1R13
- Red Hat Enterprise Linux 9 with V1R2
- Red Hat Enterprise Linux 7 notable bug fixes:
- Ensure that the rule
audit_rules_privileged_commandsdoes not report false positives caused by temporary files created by Dracut (RHEL-11938)
- Ensure that the rule
- Red Hat Enterprise Linux 8 notable bug fixes:
- Increase compatibility of the
accounts_tmoutrule with more shells includingksh(RHEL-16896 and RHEL-1811) - Add a rule to terminate idle user sessions after a defined amount of time (RHEL-1801)
- The rule
ensure_pam_wheel_group_emptyhas been optimized for better performance, and the reported rule result is now clearer (RHEL-1905) - Prevent remediation of the
display_login_attemptsrule from creating redundant configuration entries (RHEL-1809) - Other fixed bugs: RHEL-1313, RHEL-1817, RHEL-1819, RHEL-1820, RHEL-1904, RHEL-19127
- Increase compatibility of the
- Red Hat Enterprise Linux 9 notable bug fixes:
- Check drop-in files in the
/etc/systemd/journald.conf.d/directory (RHEL-14484) - Disable remediation for
/dev/shmmount options in offline mode (RHEL-16801) - Other fixed bugs: RHEL-1484, RHEL-1489, RHEL-17417, RHEL-17418
- Check drop-in files in the
0.1.69
- ANSSI profiles were updated to version 2.0.
- Three new SCAP profiles were added for RHEL 9 aligned with the CCN-STIC-610A22 Guide:
| Profile name | Profile ID | Policy version |
|---|---|---|
| CCN Red Hat Enterprise Linux 9 - Advanced | xccdf_org.ssgproject.content_profile_ccn_advanced |
2022-10 |
| CCN Red Hat Enterprise Linux 9 - Basic | xccdf_org.ssgproject.content_profile_ccn_basic |
2022-10 |
| CCN Red Hat Enterprise Linux 9 - Intermediate | xccdf_org.ssgproject.content_profile_ccn_intermediate |
2022-10 |
- 0.1.69-3 update - available for RHEL 9.0.Z.EUS, RHEL 9.2.Z.EUS, and RHEL 9.3.Z
- Align the RHEL 9 STIG profile with DISA STIG RHEL-1807
0.1.66
- Updated RHEL 8 STIG profiles
- Deprecated rule
account_passwords_pam_faillock_auditin favor ofaccounts_passwords_pam_faillock_audit
0.1.63
- New compliance rules for
sysctl,grub2,pam_pwquality, and build time kernel configuration were added. - Rules hardening the PAM stack now use
authselectas the configuration tool. Note: With this change the rules hardening the PAM stack will not be applied if the PAM stack was edited by other means.
0.1.60
- Rules hardening the PAM stack now use
authselectas the configuration tool. - Tailoring files that define profiles which represent the differences between DISA STIG automated SCAP content and SCAP automated content (delta tailoring) are now supported.
- The rule
xccdf_org.ssgproject.content_enable_fips_modenow checks only whether the FIPS mode has been enabled properly. It does not guarantee that system components have undergone FIPS certification.
0.1.54
- The Operating System Protection Profile (OSPP) has been updated in accordance with the Protection Profile for General Purpose Operating Systems for Red Hat Enterprise Linux 8.4.
- The ANSSI family of profiles based on the ANSSI BP-028 recommendations from the French National Security Agency (ANSSI), has been introduced. The content contains profiles implementing rules of the Minimum, Intermediary and Enhanced hardening levels.
- The Security Technical Implementation Guide (STIG) security profile has been updated, and it implements rules from the recently-released version V1R1.
0.1.50
- Ansible content has been improved: numerous rules contain Ansible remediations for the first time and other rules have been updated to address bug fixes.
- Fixes and improvements to the
scap-security-guidecontent for scanning RHEL7 systems, including:- The
scap-security-guidepackages now provide a profile aligned with the CIS RHEL 7 Benchmark v2.2.0.
Note that therpm_verify_permissionsrule in the CIS profile does not work correctly; see the BZ-1843913 -rpm_verify_permissionsfails in the CIS profile known issue. - The SCAP Security Guide profiles now correctly disable and mask services that should not be started.
- The
audit_rules_privileged_commandsrule in thescap-security-guidepackages now works correctly for privileged commands. - Remediation of the
dconf_gnome_login_banner_textrule in thescap-security-guidepackages no longer incorrectly fails.
- The
Comments