@@ -13,7 +13,7 @@ description: |-
1313 option is selected the system will prompt for a passphrase to use in
1414 decrypting the partition. The passphrase will subsequently need to be entered manually
1515 every time the system boots.
16- {{% if product not in ["sle12", "sle15", "ubuntu2004", "ubuntu2204"] %}}
16+ {{% if product not in ["sle12", "sle15", "slmicro5", " ubuntu2004", "ubuntu2204"] %}}
1717 <br /><br />
1818 For automated/unattended installations, it is possible to use Kickstart by adding
1919 the <tt>--encrypted</tt> and <tt>--passphrase=</tt> options to the definition of each partition to be
@@ -36,8 +36,12 @@ description: |-
3636 {{{ weblink(link="https://docs.oracle.com/en/operating-systems/oracle-linux/8/install/install-InstallingOracleLinuxManually.html#system-options") }}}
3737 {{% elif product == "ol9" %}}
3838 {{{ weblink(link="https://docs.oracle.com/en/operating-systems/oracle-linux/9/install/install-InstallingOracleLinuxManually.html#system-options") }}}
39- {{% elif product in ["sle12", "sle15"] %}}
40- {{{ weblink(link="https://www.suse.com/documentation/sled-12/book_security/data/sec_security_cryptofs_y2.html") }}}
39+ {{% elif product == "sle12" %}}
40+ {{{ weblink(link="https://documentation.suse.com/sles/12-SP5/html/SLES-all/cha-security-cryptofs.html") }}}
41+ {{% elif product == "sle15" %}}
42+ {{{ weblink(link="https://documentation.suse.com/sles/15-SP2/html/SLES-all/cha-security-cryptofs.html") }}}
43+ {{% elif product == "slmicro5" %}}
44+ {{{ weblink(link="https://documentation.suse.com/sles/15-SP3/html/SLES-all/cha-security-cryptofs.html") }}}
4145 {{% elif 'ubuntu' in product %}}
4246 {{{ weblink(link="https://help.ubuntu.com/community/Full_Disk_Encryption_Howto_2019") }}}
4347 {{% elif product == "fedora" %}}
@@ -59,6 +63,7 @@ identifiers:
5963 cce@rhel10 : CCE-89165-5
6064 cce@sle12 : CCE-83046-3
6165 cce@sle15 : CCE-85719-3
66+ cce@slmicro5 : CCE-93760-7
6267
6368references :
6469 cis-csc : 13,14
@@ -104,6 +109,22 @@ fixtext: |-
104109 Encrypting a partition in an already installed system is more difficult, because existing partitions will need to be resized and changed.
105110 To encrypt an entire partition, dedicate a partition for encryption in the partition layout.
106111
112+ {{% if "slmicro" in product %}}
113+ The standard partitioning proposal as suggested by YaST (installation and configuration tool for Linux) does not include an encrypted
114+ partition by default. Add it manually in the partitioning dialog.
115+
116+ The following set of commands will switch {{{ full_name }}} to work in FIPS mode:
117+ <pre>$ sudo transactional-update pkg install -t pattern microos-fips</pre>
118+ <pre>$ sudo reboot</pre>
119+
120+ Add of modify the following line in the "/etc/default/grub" file to include "fips=1":
121+ <pre>GRUB_CMDLINE_LINUX_DEFAULT="splash=silent swapaccount=1 apparmor=0 mitigations=auto quiet crashkernel=195M,high crashkernel=72M,low fips=1"</pre>
122+ <pre>$ sudo transactional-update grub.cfg</pre>
123+ <pre>$ sudo reboot</pre>
124+
125+ {{% endif %}}
126+
127+
107128srg_requirement : |-
108129 {{{ full_name }}} local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.
109130
@@ -112,7 +133,36 @@ checktext: |-
112133
113134 If there is a documented and approved reason for not having data-at-rest encryption, this requirement is Not Applicable.
114135
115- {{% if 'ubuntu' in product -%}}
136+ {{% if "slmicro" in product %}}
137+ Verify that the system partitions are all encrypted with the following commands:
138+ <pre>$ sudo blkid</pre>
139+ <br /><br />
140+ Output will be similar to:
141+ /dev/sda1: "UUID=26d4a101-7f48-4394-b730-56dc00e65f64" TYPE="crypto_LUKS"
142+ /dev/sda2: "UUID=f5b8a790-14cb-4b82-882d-707d52f27765" TYPE="crypto_LUKS"
143+ /dev/sda3: "UUID=f2d86128-f975-478d-a5b0-25806c900eac" TYPE="crypto_LUKS"
144+
145+ Every persistent disk partition present must be of type "crypto_LUKS".
146+ If any partitions other than the boot partition or pseudo file systems (such as /proc or /sys) or temporary file systems (that are tmpfs)
147+ are not type "crypto_LUKS", ask the administrator to indicate how the partitions are encrypted.
148+ If there is no evidence that these partitions are encrypted, this is a finding.
149+
150+ <pre>$ sudo more /etc/cryptab</pre>
151+ <br /><br />
152+ Output will be similar to:
153+ cr_root UUID=26d4a101-7f48-4394-b730-56dc00e65f64
154+ cr_home UUID=f5b8a790-14cb-4b82-882d-707d52f27765
155+ cr_swap UUID=f2d86128-f975-478d-a5b0-25806c900eac
156+
157+ Every persistent disk partition present on the system must have an entry in the /etc/crypttab file.
158+ If any partitions other than pseudo file systems (such as /proc or /sys) are not listed or "/etc/crypttab" does not exist, this is a finding.
159+
160+ Verify the system works in FIPS mode with the following command:
161+ <pre>sudo sysctl - a | grep fips</pre>
162+ <br /><br />
163+ crypto.fips_enabled = 1
164+
165+ {{% elif 'ubuntu' in product %}}
116166 Determine the partition layout for the system with the following command:
117167 <pre>$ sudo fdisk -l</pre>
118168
0 commit comments