Skip to content

Commit 13df827

Browse files
committed
Update of the rule encrypt_partitions to support SLEM
1 parent 6a1c4f6 commit 13df827

File tree

3 files changed

+57
-7
lines changed

3 files changed

+57
-7
lines changed

controls/stig_slmicro5.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -197,8 +197,9 @@ controls:
197197
All SLEM 5 persistent disk partitions must implement cryptographic mechanisms
198198
to prevent unauthorized disclosure or modification of all information that requires
199199
at-rest protection.
200-
rules: []
201-
status: pending
200+
rules:
201+
- encrypt_partitions
202+
status: automated
202203

203204
- id: SLEM-05-231045
204205
levels:

linux_os/guide/system/software/disk_partitioning/encrypt_partitions/rule.yml

Lines changed: 54 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ description: |-
1313
option is selected the system will prompt for a passphrase to use in
1414
decrypting the partition. The passphrase will subsequently need to be entered manually
1515
every time the system boots.
16-
{{% if product not in ["sle12", "sle15", "ubuntu2004", "ubuntu2204"] %}}
16+
{{% if product not in ["sle12", "sle15", "slmicro5", "ubuntu2004", "ubuntu2204"] %}}
1717
<br /><br />
1818
For automated/unattended installations, it is possible to use Kickstart by adding
1919
the <tt>--encrypted</tt> and <tt>--passphrase=</tt> options to the definition of each partition to be
@@ -36,8 +36,12 @@ description: |-
3636
{{{ weblink(link="https://docs.oracle.com/en/operating-systems/oracle-linux/8/install/install-InstallingOracleLinuxManually.html#system-options") }}}
3737
{{% elif product == "ol9" %}}
3838
{{{ weblink(link="https://docs.oracle.com/en/operating-systems/oracle-linux/9/install/install-InstallingOracleLinuxManually.html#system-options") }}}
39-
{{% elif product in ["sle12", "sle15"] %}}
40-
{{{ weblink(link="https://www.suse.com/documentation/sled-12/book_security/data/sec_security_cryptofs_y2.html") }}}
39+
{{% elif product == "sle12" %}}
40+
{{{ weblink(link="https://documentation.suse.com/sles/12-SP5/html/SLES-all/cha-security-cryptofs.html") }}}
41+
{{% elif product == "sle15" %}}
42+
{{{ weblink(link="https://documentation.suse.com/sles/15-SP2/html/SLES-all/cha-security-cryptofs.html") }}}
43+
{{% elif product == "slmicro5" %}}
44+
{{{ weblink(link="https://documentation.suse.com/sles/15-SP3/html/SLES-all/cha-security-cryptofs.html") }}}
4145
{{% elif 'ubuntu' in product %}}
4246
{{{ weblink(link="https://help.ubuntu.com/community/Full_Disk_Encryption_Howto_2019") }}}
4347
{{% elif product == "fedora" %}}
@@ -59,6 +63,7 @@ identifiers:
5963
cce@rhel10: CCE-89165-5
6064
cce@sle12: CCE-83046-3
6165
cce@sle15: CCE-85719-3
66+
cce@slmicro5: CCE-93760-7
6267

6368
references:
6469
cis-csc: 13,14
@@ -104,6 +109,22 @@ fixtext: |-
104109
Encrypting a partition in an already installed system is more difficult, because existing partitions will need to be resized and changed.
105110
To encrypt an entire partition, dedicate a partition for encryption in the partition layout.
106111
112+
{{% if "slmicro" in product %}}
113+
The standard partitioning proposal as suggested by YaST (installation and configuration tool for Linux) does not include an encrypted
114+
partition by default. Add it manually in the partitioning dialog.
115+
116+
The following set of commands will switch {{{ full_name }}} to work in FIPS mode:
117+
<pre>$ sudo transactional-update pkg install -t pattern microos-fips</pre>
118+
<pre>$ sudo reboot</pre>
119+
120+
Add of modify the following line in the "/etc/default/grub" file to include "fips=1":
121+
<pre>GRUB_CMDLINE_LINUX_DEFAULT="splash=silent swapaccount=1 apparmor=0 mitigations=auto quiet crashkernel=195M,high crashkernel=72M,low fips=1"</pre>
122+
<pre>$ sudo transactional-update grub.cfg</pre>
123+
<pre>$ sudo reboot</pre>
124+
125+
{{% endif %}}
126+
127+
107128
srg_requirement: |-
108129
{{{ full_name }}} local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.
109130
@@ -112,7 +133,36 @@ checktext: |-
112133
113134
If there is a documented and approved reason for not having data-at-rest encryption, this requirement is Not Applicable.
114135
115-
{{% if 'ubuntu' in product -%}}
136+
{{% if "slmicro" in product %}}
137+
Verify that the system partitions are all encrypted with the following commands:
138+
<pre>$ sudo blkid</pre>
139+
<br /><br />
140+
Output will be similar to:
141+
/dev/sda1: "UUID=26d4a101-7f48-4394-b730-56dc00e65f64" TYPE="crypto_LUKS"
142+
/dev/sda2: "UUID=f5b8a790-14cb-4b82-882d-707d52f27765" TYPE="crypto_LUKS"
143+
/dev/sda3: "UUID=f2d86128-f975-478d-a5b0-25806c900eac" TYPE="crypto_LUKS"
144+
145+
Every persistent disk partition present must be of type "crypto_LUKS".
146+
If any partitions other than the boot partition or pseudo file systems (such as /proc or /sys) or temporary file systems (that are tmpfs)
147+
are not type "crypto_LUKS", ask the administrator to indicate how the partitions are encrypted.
148+
If there is no evidence that these partitions are encrypted, this is a finding.
149+
150+
<pre>$ sudo more /etc/cryptab</pre>
151+
<br /><br />
152+
Output will be similar to:
153+
cr_root UUID=26d4a101-7f48-4394-b730-56dc00e65f64
154+
cr_home UUID=f5b8a790-14cb-4b82-882d-707d52f27765
155+
cr_swap UUID=f2d86128-f975-478d-a5b0-25806c900eac
156+
157+
Every persistent disk partition present on the system must have an entry in the /etc/crypttab file.
158+
If any partitions other than pseudo file systems (such as /proc or /sys) are not listed or "/etc/crypttab" does not exist, this is a finding.
159+
160+
Verify the system works in FIPS mode with the following command:
161+
<pre>sudo sysctl - a | grep fips</pre>
162+
<br /><br />
163+
crypto.fips_enabled = 1
164+
165+
{{% elif 'ubuntu' in product %}}
116166
Determine the partition layout for the system with the following command:
117167
<pre>$ sudo fdisk -l</pre>
118168

shared/references/cce-slmicro5-avail.txt

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,6 @@ CCE-93722-7
2121
CCE-93726-8
2222
CCE-93743-3
2323
CCE-93757-3
24-
CCE-93760-7
2524
CCE-93762-3
2625
CCE-93763-1
2726
CCE-93764-9

0 commit comments

Comments
 (0)