File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (83 lines) | stat: -rw-r--r-- 3,549 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
documentation_complete: true


title: 'Ensure gpgcheck Enabled In Main {{{ pkg_manager }}} Configuration'

description: |-
    The <tt>gpgcheck</tt> option controls whether
    RPM packages' signatures are always checked prior to installation.
    To configure {{{ pkg_manager }}} to check package signatures before installing
    them, ensure the following line appears in <tt>{{{ pkg_manager_config_file }}}</tt> in
    the <tt>[main]</tt> section:
    <pre>gpgcheck=1</pre>

rationale: |-
    Changes to any software components can have significant effects on the
    overall security of the operating system. This requirement ensures the
    software has not been tampered with and that it has been provided by a
    trusted vendor.
    <br />
    Accordingly, patches, service packs, device drivers, or operating system
    components must be signed with a certificate recognized and approved by the
    organization.
    <br />Verifying the authenticity of the software prior to installation
    validates the integrity of the patch or upgrade received from a vendor.
    This ensures the software has not been tampered with and that it has been
    provided by a trusted vendor. Self-signed certificates are disallowed by
    this requirement. Certificates used to verify the software must be from an
    approved Certificate Authority (CA).

severity: high

identifiers:
    cce@rhel8: CCE-80790-9
    cce@rhel9: CCE-83457-2
    cce@rhel10: CCE-88404-9
    cce@sle12: CCE-83068-7
    cce@sle15: CCE-83290-7
    cce@slmicro5: CCE-93712-8
    cce@slmicro6: CCE-94715-0

references:
    cis-csc: 11,2,3,9
    cis@sle12: 1.2.3
    cis@sle15: 1.2.3
    cjis: 5.10.4.1
    cobit5: APO01.06,BAI03.05,BAI06.01,BAI10.01,BAI10.02,BAI10.03,BAI10.05,DSS06.02
    cui: 3.4.8
    hipaa: 164.308(a)(1)(ii)(D),164.312(b),164.312(c)(1),164.312(c)(2),164.312(e)(2)(i)
    isa-62443-2009: 4.3.4.3.2,4.3.4.3.3,4.3.4.4.4
    isa-62443-2013: 'SR 3.1,SR 3.3,SR 3.4,SR 3.8,SR 7.6'
    iso27001-2013: A.11.2.4,A.12.1.2,A.12.2.1,A.12.5.1,A.12.6.2,A.14.1.2,A.14.1.3,A.14.2.2,A.14.2.3,A.14.2.4
    nist: CM-5(3),SI-7,SC-12,SC-12(3),CM-6(a),SA-12,SA-12(10),CM-11(a),CM-11(b)
    nist-csf: PR.DS-6,PR.DS-8,PR.IP-1
    ospp: FPT_TUD_EXT.1,FPT_TUD_EXT.2
    pcidss: Req-6.2
    srg: SRG-OS-000366-GPOS-00153
    stigid@ol7: OL07-00-020050
    stigid@ol8: OL08-00-010370
    stigid@sle12: SLES-12-010550
    stigid@sle15: SLES-15-010430

ocil_clause: 'there is no process to validate certificates that is approved by the organization'

ocil: |-
    Verify that {{{ pkg_manager }}} verifies the signature of packages from a repository prior to install with the following command:

    <pre>$ grep gpgcheck {{{ pkg_manager_config_file }}}</pre>

    <pre>gpgcheck=1</pre>

    If "gpgcheck" is not set to "1", or if the option is missing or commented out, ask the System Administrator how the certificates for patches and other operating system components are verified.

platform: package[{{{ pkg_manager }}}]

fixtext: |-
    Configure {{{ full_name }}} to always check package signatures before installation.

    Add or update the following line in [main] section of the {{{ pkg_manager_config_file }}} file:

    gpgcheck=1

srg_requirement: |-
    {{{ full_name }}} must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.