Skip to content

Commit 2485471

Browse files
authored
Merge pull request #35 from bwitt/ubuntu-24.04
2 parents f69141b + 19934b5 commit 2485471

File tree

13 files changed

+1213
-29
lines changed

13 files changed

+1213
-29
lines changed

README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,7 @@ The code of this security hardening module is based on the following CIS Benchma
5959
| Ubuntu 20.04 | CIS Ubuntu Linux 20.04 LTS Benchmark | 2.0.1 | 06-29-2023 |
6060
| Ubuntu 20.04 | CIS Ubuntu Linux 20.04 LTS STIG Benchmark | 1.0.0 | 07-26-2021 |
6161
| Ubuntu 22.04 | CIS Ubuntu Linux 22.04 LTS Benchmark | 1.0.0 | 06-30-2022 |
62+
| Ubuntu 24.04 | CIS Ubuntu Linux 24.04 LTS Benchmark | 1.0.0 | 06-30-2024 |
6263
| Debian 10 | CIS Debian Linux 10 Benchmark | 1.0.0 | 02-13-2020 |
6364
| Debian 11 | CIS Debian Linux 11 Benchmark | 1.0.0 | 09-22-2022 |
6465
| Debian 12. | CIS Debian Linus 12 Benchmark | 1.0.1 | 04-15-2024 |
@@ -165,7 +166,7 @@ See [REFERENCE.md](https://github.com/tom-krieger/cis_security_hardening/blob/ma
165166

166167
## Limitations
167168

168-
Currently the module is tested with RedHat 7, 8, CentOS 7, 8, AlmaLinux 8, Rocky Linux 8, Suse SLES 12, Debian 10, Ubuntu 18.04 and Ubuntu 20.04. Other OSes may work but there's no guarantee.
169+
Currently the module is tested with RedHat 7, 8, 9, CentOS 7, 8, AlmaLinux 8, 9, Rocky Linux 8, 9, Suse SLES 12, 15, Debian 10, 11, 12, Ubuntu 18.04, 20.04, 22.04 and 24.04. Other OSes may work but there's no guarantee.
169170

170171
More testing is needed as for every supported OS there are different setups in the wild and some of them might not be covered.
171172

REFERENCE.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -277,6 +277,7 @@ audited
277277
* `cis_security_hardening::rules::opassword_perms`: Ensure permissions on /etc/security/opasswd are configured
278278
* `cis_security_hardening::rules::opensc_pkcs11`: Ensure the opensc-pcks11 is installed
279279
* `cis_security_hardening::rules::openssl_pkcs11`: Ensure the operating system has the packages required for multifactor authentication
280+
* `cis_security_hardening::rules::overlayfs`: Ensure overlayfs kernel module is not available
280281
* `cis_security_hardening::rules::pam_cached_auth`: Ensure PAM prohibits the use of cached authentications after one day
281282
* `cis_security_hardening::rules::pam_fail_delay`: Ensure logging delay after failed logon attempt
282283
* `cis_security_hardening::rules::pam_last_logon`: Ensure last successful account logon is displayed upon logon

data/cis/cis_Ubuntu_24.04_params.yaml

Lines changed: 589 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 299 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,299 @@
1+
---
2+
cis_security_hardening::benchmark::ubuntu::v24:
3+
bundles:
4+
filesystem_config:
5+
level1:
6+
- cramfs
7+
- freevxfs
8+
- hfs
9+
- hfsplus
10+
- jffs2
11+
- overlayfs
12+
- squashfs
13+
- udf
14+
- disable_usb_storage
15+
- tmp_filesystem
16+
- tmp_nodev
17+
- tmp_nosuid
18+
- tmp_noexec
19+
- var_nodev
20+
- var_nosuid
21+
- var_tmp_nodev
22+
- var_tmp_nosuid
23+
- var_tmp_noexec
24+
- var_log_nodev
25+
- var_log_noexec
26+
- var_log_nosuid
27+
- var_log_audit_nodev
28+
- var_log_audit_noexec
29+
- var_log_audit_nosuid
30+
- home_nodev
31+
- home_nosuid
32+
- dev_shm
33+
- dev_shm_nodev
34+
- dev_shm_nosuid
35+
- dev_shm_noexec
36+
- sticky_world_writeable_files
37+
- disable_automount
38+
filesystem_integrety:
39+
level1:
40+
- aide_installed
41+
- aide_regular_checks
42+
boot_settings:
43+
level1:
44+
- grub_bootloader_config
45+
- grub_password
46+
- single_user_mode
47+
process_hardening:
48+
level1:
49+
- enable_aslr
50+
- ptrace_scope
51+
- disable_prelink
52+
- restrict_core_dumps
53+
- automatic_error_reporting
54+
mandatory_access_control:
55+
level1:
56+
- apparmor
57+
- apparmor_bootloader
58+
- apparmor_profiles
59+
level2:
60+
- apparmor_profiles_enforcing
61+
warning_banners:
62+
level1:
63+
- issue_perms
64+
- issue_net_perms
65+
- motd_perms
66+
gnome_display_manager:
67+
level1:
68+
- gnome_gdm
69+
- gdm_auto_mount
70+
- gdm_lock_delay
71+
- gdm_lock_enabled
72+
- gdm_screensaver
73+
- xdmcp_config
74+
level2:
75+
- gnome_gdm_package
76+
special_purpose_services:
77+
level1:
78+
- systemd_timesyncd
79+
- chrony
80+
- ntpd
81+
- x11_installed
82+
- avahi
83+
- cups
84+
- dhcp
85+
- ldapd
86+
- nfs
87+
- bind
88+
- vsftp
89+
- httpd
90+
- dovecot
91+
- samba
92+
- squid
93+
- net_snmp
94+
- nis
95+
- mta_local
96+
- rsyncd
97+
- dnsmasq
98+
- tftp_server
99+
- xinetd
100+
service_clients:
101+
level1:
102+
- nis_client
103+
- rsh_client
104+
- talk_client
105+
- telnet_client
106+
- ldap_client
107+
- rpcbind
108+
- ftp
109+
- tftp_client
110+
unused_network_protocols:
111+
level1:
112+
- disable_bluetooth
113+
- disable_wireless
114+
level2:
115+
- disable_ipv6
116+
network_parameters_host:
117+
level1:
118+
- disable_packet_redirect
119+
- disable_ip_forwarding
120+
network_parameters_host_router:
121+
level1:
122+
- source_routed_packets
123+
- icmp_redirects
124+
- secure_icmp_redirects
125+
- log_suspicious_packets
126+
- ignore_icmp_broadcast
127+
- ignore_bogus_icmp_responses
128+
- enable_reverse_path_filtering
129+
- enable_tcp_syn_cookies
130+
- ipv6_router_advertisements
131+
uncommon_network_protocols:
132+
level2:
133+
- disable_dccp
134+
- disable_sctp
135+
- disable_rds
136+
- disable_tipc
137+
configure_ufw:
138+
level1:
139+
- ufw_install
140+
- ufw_service
141+
- ufw_loopback
142+
- ufw_outbound
143+
- ufw_open_ports
144+
- ufw_default_deny
145+
configure_nftables:
146+
level1:
147+
- nftables_install
148+
- nftables_flush_iptables
149+
- nftables_table
150+
- nftables_base_chains
151+
- nftables_loopback
152+
- nftables_outbound_established
153+
- nftables_default_deny
154+
- nftables_service
155+
- nftables_persistence
156+
configure_iptables:
157+
level1:
158+
- iptables_install
159+
- iptables_deny_policy
160+
- iptables_loopback
161+
- iptables_outbound_established
162+
- iptables_open_ports
163+
configure_ip6tables:
164+
level1:
165+
- ip6tables_deny_policy
166+
- ip6tables_loopback
167+
- ip6tables_outbound_established
168+
- ip6tables_open_ports
169+
configure_accounting:
170+
level1:
171+
- auditd_init
172+
- auditd_log_perms
173+
- auditd_log_dir_perms
174+
- auditd_conf_perms
175+
- auditd_tools_perms
176+
- aide_audit_integrity
177+
level2:
178+
- auditd_package
179+
- auditd_service
180+
- auditd_process
181+
- auditd_backlog_limit
182+
- auditd_max_log_file
183+
- auditd_max_log_file_action
184+
- auditd_when_disk_full
185+
- auditd_scope
186+
- auditd_user_emulation
187+
- auditd_actions
188+
- auditd_time_change
189+
- auditd_system_locale
190+
- auditd_identity
191+
- auditd_privileged_commands
192+
- auditd_access
193+
- auditd_mac_policy
194+
- auditd_logins
195+
- auditd_session_logins
196+
- auditd_perm_mod
197+
- auditd_chcon_use
198+
- auditd_setfacl_use
199+
- auditd_chacl_use
200+
- auditd_usermod_use
201+
- auditd_kernel_modules
202+
- auditd_mounts
203+
- auditd_delete
204+
- auditd_actions
205+
- auditd_modules
206+
- auditd_immutable
207+
configure_logging:
208+
level1:
209+
- systemd_journal_remote
210+
- systemd_journal_remote_config
211+
- systemd_journal_remote_service
212+
- systemd_journal_remote_receive
213+
- systemd_journald_service
214+
- journald_rsyslog
215+
- journald_compress
216+
- journald_persistent
217+
- rsyslog_installed
218+
- rsyslog_service
219+
- rsyslog_default_file_perms
220+
- rsyslog_logging
221+
- rsyslog_remote_logs
222+
- rsyslog_remote_syslog
223+
- logfile_permissions
224+
- logrotate
225+
- logrotate_configuration
226+
configure_job_schedulers:
227+
level1:
228+
- crond_service
229+
- crontab
230+
- cron_hourly
231+
- cron_daily
232+
- cron_weekly
233+
- cron_monthly
234+
- etc_crond
235+
- cron_restrict
236+
- at_restrict
237+
configure_ssh:
238+
level1:
239+
- sshd_config_permissions
240+
- sshd_private_keys
241+
- sshd_public_keys
242+
- sshd_limit_access
243+
- sshd_loglevel
244+
- sshd_x11_forward
245+
- sshd_max_auth_tries
246+
- sshd_ignore_rhosts
247+
- sshd_hostbased_authentication
248+
- sshd_root_login
249+
- sshd_empty_passwords
250+
- sshd_user_environment
251+
- sshd_ciphers
252+
- sshd_macs
253+
- sshd_kex
254+
- sshd_timeouts
255+
- sshd_login_gracetime
256+
- sshd_banner
257+
- sshd_use_pam
258+
- sshd_tcp_forwarding
259+
- sshd_gssapi
260+
- sshd_max_startups
261+
- sshd_max_sessions
262+
sudo_config:
263+
level1:
264+
- sudo_installed
265+
- sudo_use_pty
266+
- sudo_log
267+
- sudo_timeout
268+
- restrict_su
269+
configure_pam:
270+
level1:
271+
- pam_pw_requirements
272+
- pam_lockout
273+
- pam_old_passwords
274+
- pam_passwd_sha512
275+
- pam_libpwquality
276+
configure_user_accounts:
277+
level1:
278+
- passwd_min_days
279+
- passwd_expiration
280+
- passwd_warn_days
281+
- passwd_inactive_days
282+
- shell_nologin
283+
- root_gid
284+
- umask_setting
285+
- timeout_setting
286+
- lock_root
287+
system_file_permissions:
288+
level1:
289+
- passwd_perms
290+
- passwd_bak_perms
291+
- group_perms
292+
- group_bak_perms
293+
- shadow_perms
294+
- shadow_bak_perms
295+
- gshadow_perms
296+
- gshadow_bak_perms
297+
configure_user_groups:
298+
level1:
299+
- shadowed_passwords

0 commit comments

Comments
 (0)