File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (77 lines) | stat: -rw-r--r-- 2,845 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
documentation_complete: true

{{%- if product in ["sle12", "sle15", "slmicro5"] %}}
  {{%- set pkg_manager_repos="/etc/zypp/repos.d" %}}
{{%- else %}}
  {{%- set pkg_manager_repos="/etc/yum.repos.d" %}}
{{%- endif %}}

title: 'Ensure gpgcheck Enabled for All {{{ pkg_manager }}} Package Repositories'

description: |-
    To ensure signature checking is not disabled for
    any repos, remove any lines from files in <tt>{{{ pkg_manager_repos }}}</tt> of the form:
    <pre>gpgcheck=0</pre>

rationale: |-
    Verifying the authenticity of the software prior to installation validates
    the integrity of the patch or upgrade received from a vendor. This ensures
    the software has not been tampered with and that it has been provided by a
    trusted vendor. Self-signed certificates are disallowed by this
    requirement. Certificates used to verify the software must be from an
    approved Certificate Authority (CA)."

severity: high

identifiers:
    cce@rhel8: CCE-80792-5
    cce@rhel9: CCE-83464-8
    cce@rhel10: CCE-88176-3
    cce@sle12: CCE-83258-4
    cce@sle15: CCE-85797-9
    cce@slmicro5: CCE-94070-0

references:
    cis-csc: 11,2,3,9
    cis@sle12: 1.2.3
    cis@sle15: 1.2.3
    cjis: 5.10.4.1
    cobit5: APO01.06,BAI03.05,BAI06.01,BAI10.01,BAI10.02,BAI10.03,BAI10.05,DSS06.02
    cui: 3.4.8
    hipaa: 164.308(a)(1)(ii)(D),164.312(b),164.312(c)(1),164.312(c)(2),164.312(e)(2)(i)
    isa-62443-2009: 4.3.4.3.2,4.3.4.3.3,4.3.4.4.4
    isa-62443-2013: 'SR 3.1,SR 3.3,SR 3.4,SR 3.8,SR 7.6'
    iso27001-2013: A.11.2.4,A.12.1.2,A.12.2.1,A.12.5.1,A.12.6.2,A.14.1.2,A.14.1.3,A.14.2.2,A.14.2.3,A.14.2.4
    nist: CM-5(3),SI-7,SC-12,SC-12(3),CM-6(a),SA-12,SA-12(10),CM-11(a),CM-11(b)
    nist-csf: PR.DS-6,PR.DS-8,PR.IP-1
    ospp: FPT_TUD_EXT.1,FPT_TUD_EXT.2
    pcidss: Req-6.2
    srg: SRG-OS-000366-GPOS-00153
    stigid@ol8: OL08-00-010370

ocil_clause: 'GPG checking is disabled'

ocil: |-
    To determine whether <tt>{{{ pkg_manager }}}</tt> has been configured to disable
    <tt>gpgcheck</tt> for any repos,  inspect all files in
    <tt>{{{ pkg_manager_repos }}}</tt> and ensure the following does not appear in any
    sections:
    <pre>gpgcheck=0</pre>
    A value of <tt>0</tt> indicates that <tt>gpgcheck</tt> has been disabled for that repo.

fixtext: |-
    Ensure signature checking is enabled for all package repositories with the command:

    $ sudo sed -i 's/gpgcheck\s*=.*/gpgcheck=1/g' {{{ pkg_manager_repos }}}/*

srg_requirement: |-
    {{{ full_name }}} must have gpgcheck enabled for all repositories.

checktext: |-
    Verify that {{{ pkg_manager }}} has not been configured to disable gpgcheck for any repos with the following command:

    $ grep gpgcheck {{{ pkg_manager_repos }}}/*.repo | more

    gpgcheck = 1

    If "gpgcheck" is not set to "1" for all returned lines, this is a finding.