|
| 1 | +documentation_complete: true |
| 2 | + |
| 3 | +title: 'ANSSI-BP-028 (enhanced)' |
| 4 | + |
| 5 | +description: |- |
| 6 | + This profile contains configurations that align to ANSSI-BP-028 v2.0 at the enhanced hardening level. |
| 7 | + |
| 8 | + ANSSI is the French National Information Security Agency, and stands for Agence nationale de la sécurité des systèmes d'information. |
| 9 | + ANSSI-BP-028 is a configuration recommendation for GNU/Linux systems. |
| 10 | + |
| 11 | + A copy of the ANSSI-BP-028 can be found at the ANSSI website: |
| 12 | + https://www.ssi.gouv.fr/administration/guide/recommandations-de-securite-relatives-a-un-systeme-gnulinux/ |
| 13 | + |
| 14 | +selections: |
| 15 | + - anssi:all:enhanced |
| 16 | + - 'package_rsyslog_installed' |
| 17 | + - 'service_rsyslog_enabled' |
| 18 | + # PASS_MIN_LEN is handled by PAM on debian systems. |
| 19 | + - '!accounts_password_minlen_login_defs' |
| 20 | + # ANSSI BP 28 suggest using libpam_pwquality, which isn't deployed by default |
| 21 | + - 'package_pam_pwquality_installed' |
| 22 | + # PAM honour login.defs file for algorithm |
| 23 | + - 'set_password_hashing_algorithm_logindefs' |
| 24 | + # Debian uses apparmor |
| 25 | + - '!selinux_state' |
| 26 | + - '!audit_rules_mac_modification' |
| 27 | + - '!selinux_policytype' |
| 28 | + - '!sebool_selinuxuser_execheap' |
| 29 | + - '!sebool_deny_execmem' |
| 30 | + - '!sebool_selinuxuser_execstack' |
| 31 | + - '!sebool_secure_mode_insmod' |
| 32 | + - '!sebool_ssh_sysadm_login' |
| 33 | + |
| 34 | + # this rule is incompatible with R38 |
| 35 | + - '!file_groupownership_system_commands_dirs' |
| 36 | + |
| 37 | + |
| 38 | + # The following are MLS related rules (not part of ANSSI-BP-028) |
| 39 | + - '!accounts_polyinstantiated_tmp' |
| 40 | + - '!accounts_polyinstantiated_var_tmp' |
| 41 | + - '!enable_pam_namespace' |
| 42 | + # there is no tmp.mount unit on Debian 12. |
| 43 | + - '!systemd_tmp_mount_enabled' |
| 44 | + # this rule cannot handle /etc/chrony/chrony.conf path properly. |
| 45 | + # chronyd_specify_remote_server still report wether chrony is configured. |
| 46 | + - '!chronyd_configure_pool_and_server' |
| 47 | + |
| 48 | + # Following rules once had a prodtype incompatible with the debian13 product |
| 49 | + - '!accounts_passwords_pam_tally2_deny_root' |
| 50 | + - '!ensure_redhat_gpgkey_installed' |
| 51 | + - '!set_password_hashing_algorithm_systemauth' |
| 52 | + - '!package_dnf-automatic_installed' |
| 53 | + - '!accounts_passwords_pam_faillock_deny_root' |
| 54 | + - '!dnf-automatic_security_updates_only' |
| 55 | + - '!cracklib_accounts_password_pam_lcredit' |
| 56 | + - '!dnf-automatic_apply_updates' |
| 57 | + - '!cracklib_accounts_password_pam_ocredit' |
| 58 | + - '!accounts_password_pam_unix_rounds_system_auth' |
| 59 | + - '!timer_dnf-automatic_enabled' |
| 60 | + - '!accounts_passwords_pam_tally2' |
| 61 | + - '!cracklib_accounts_password_pam_ucredit' |
| 62 | + - '!file_permissions_unauthorized_sgid' |
| 63 | + - '!ensure_gpgcheck_local_packages' |
| 64 | + - '!accounts_passwords_pam_tally2_unlock_time' |
| 65 | + - '!enable_authselect' |
| 66 | + - '!cracklib_accounts_password_pam_minlen' |
| 67 | + - '!cracklib_accounts_password_pam_dcredit' |
| 68 | + - '!ensure_gpgcheck_globally_activated' |
| 69 | + - '!file_permissions_unauthorized_suid' |
| 70 | + - '!ensure_gpgcheck_never_disabled' |
| 71 | + - '!ensure_oracle_gpgkey_installed' |
| 72 | + - '!ensure_almalinux_gpgkey_installed' |
| 73 | + - '!package_dracut-fips-aesni_installed' |
| 74 | + - '!audit_rules_file_deletion_events_renameat2' |
| 75 | + - '!audit_rules_dac_modification_fchmodat2' |
0 commit comments