Skip to content

Commit 04b3394

Browse files
authored
Merge pull request #13571 from a-skr/debian13-20250612
Add Debian 13 profile for ANSSI BP 28 (enhanced)
2 parents c9aa1af + 8cc6345 commit 04b3394

File tree

6 files changed

+81
-0
lines changed

6 files changed

+81
-0
lines changed

linux_os/guide/services/ntp/service_chronyd_enabled/rule.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,4 +55,5 @@ template:
5555
servicename: chronyd
5656
servicename@ubuntu2204: chrony
5757
servicename@debian12: chrony
58+
servicename@debian13: chrony
5859
{{%- endif %}}

linux_os/guide/services/ntp/service_ntpd_enabled/rule.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,9 @@ template:
4444
name: service_enabled
4545
vars:
4646
servicename: ntpd
47+
servicename@debian13: ntpsec
4748
packagename: ntp
49+
packagename@debian13: ntpsec
4850

4951
platform: package[ntp]
5052

linux_os/guide/system/apparmor/package_pam_apparmor_installed/rule.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,3 +34,4 @@ template:
3434
vars:
3535
pkgname: pam_apparmor
3636
pkgname@debian12: libpam-apparmor
37+
pkgname@debian13: libpam-apparmor

linux_os/guide/system/permissions/files/permissions_important_account_files/file_permissions_etc_gshadow/rule.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,5 +57,6 @@ template:
5757
filemode: '0000'
5858
filemode@debian11: '0640'
5959
filemode@debian12: '0640'
60+
filemode@debian13: '0640'
6061
filemode@ubuntu2204: '0640'
6162
filemode@ubuntu2404: '0640'

linux_os/guide/system/permissions/files/permissions_important_account_files/file_permissions_etc_shadow/rule.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,7 @@ template:
6666
filemode: '0000'
6767
filemode@debian11: '0640'
6868
filemode@debian12: '0640'
69+
filemode@debian13: '0640'
6970
filemode@sle12: '0640'
7071
filemode@sle15: '0640'
7172
filemode@ubuntu2204: '0640'
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
documentation_complete: true
2+
3+
title: 'ANSSI-BP-028 (enhanced)'
4+
5+
description: |-
6+
This profile contains configurations that align to ANSSI-BP-028 v2.0 at the enhanced hardening level.
7+
8+
ANSSI is the French National Information Security Agency, and stands for Agence nationale de la sécurité des systèmes d'information.
9+
ANSSI-BP-028 is a configuration recommendation for GNU/Linux systems.
10+
11+
A copy of the ANSSI-BP-028 can be found at the ANSSI website:
12+
https://www.ssi.gouv.fr/administration/guide/recommandations-de-securite-relatives-a-un-systeme-gnulinux/
13+
14+
selections:
15+
- anssi:all:enhanced
16+
- 'package_rsyslog_installed'
17+
- 'service_rsyslog_enabled'
18+
# PASS_MIN_LEN is handled by PAM on debian systems.
19+
- '!accounts_password_minlen_login_defs'
20+
# ANSSI BP 28 suggest using libpam_pwquality, which isn't deployed by default
21+
- 'package_pam_pwquality_installed'
22+
# PAM honour login.defs file for algorithm
23+
- 'set_password_hashing_algorithm_logindefs'
24+
# Debian uses apparmor
25+
- '!selinux_state'
26+
- '!audit_rules_mac_modification'
27+
- '!selinux_policytype'
28+
- '!sebool_selinuxuser_execheap'
29+
- '!sebool_deny_execmem'
30+
- '!sebool_selinuxuser_execstack'
31+
- '!sebool_secure_mode_insmod'
32+
- '!sebool_ssh_sysadm_login'
33+
34+
# this rule is incompatible with R38
35+
- '!file_groupownership_system_commands_dirs'
36+
37+
38+
# The following are MLS related rules (not part of ANSSI-BP-028)
39+
- '!accounts_polyinstantiated_tmp'
40+
- '!accounts_polyinstantiated_var_tmp'
41+
- '!enable_pam_namespace'
42+
# there is no tmp.mount unit on Debian 12.
43+
- '!systemd_tmp_mount_enabled'
44+
# this rule cannot handle /etc/chrony/chrony.conf path properly.
45+
# chronyd_specify_remote_server still report wether chrony is configured.
46+
- '!chronyd_configure_pool_and_server'
47+
48+
# Following rules once had a prodtype incompatible with the debian13 product
49+
- '!accounts_passwords_pam_tally2_deny_root'
50+
- '!ensure_redhat_gpgkey_installed'
51+
- '!set_password_hashing_algorithm_systemauth'
52+
- '!package_dnf-automatic_installed'
53+
- '!accounts_passwords_pam_faillock_deny_root'
54+
- '!dnf-automatic_security_updates_only'
55+
- '!cracklib_accounts_password_pam_lcredit'
56+
- '!dnf-automatic_apply_updates'
57+
- '!cracklib_accounts_password_pam_ocredit'
58+
- '!accounts_password_pam_unix_rounds_system_auth'
59+
- '!timer_dnf-automatic_enabled'
60+
- '!accounts_passwords_pam_tally2'
61+
- '!cracklib_accounts_password_pam_ucredit'
62+
- '!file_permissions_unauthorized_sgid'
63+
- '!ensure_gpgcheck_local_packages'
64+
- '!accounts_passwords_pam_tally2_unlock_time'
65+
- '!enable_authselect'
66+
- '!cracklib_accounts_password_pam_minlen'
67+
- '!cracklib_accounts_password_pam_dcredit'
68+
- '!ensure_gpgcheck_globally_activated'
69+
- '!file_permissions_unauthorized_suid'
70+
- '!ensure_gpgcheck_never_disabled'
71+
- '!ensure_oracle_gpgkey_installed'
72+
- '!ensure_almalinux_gpgkey_installed'
73+
- '!package_dracut-fips-aesni_installed'
74+
- '!audit_rules_file_deletion_events_renameat2'
75+
- '!audit_rules_dac_modification_fchmodat2'

0 commit comments

Comments
 (0)