LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-17-2021, 06:13 PM   #1
scottieH
Member
 
Registered: Mar 2021
Posts: 58

Rep: Reputation: Disabled
Do STIGs force implementation?


I'm running RHEL 7.9. Here's an example of what I'm asking:
RHEL-07-020040 V-71975
https://www.stigviewer.com/stig/red_...inding/V-71975

Designated personnel must be notified if baseline configurations are changed in an unauthorized manner.

Basically, this is saying that any aide findings need to be emailed to "designated personnel"
Code:
AIDE does not have a configuration that will send a notification, so the cron job uses the mail application on the system to email the results of the file integrity run as in the following example:

# more /etc/cron.daily/aide
0 0 * * * /usr/sbin/aide --check | /bin/mail -s "$HOSTNAME - Daily aide integrity check run" root@sysname.mil

If the file integrity application does not notify designated personnel of changes, this is a finding.
I am running aide. My cron job does not run /usr/sbin/aide. Instead, it runs a script (~root/cron/aide). If there are any findings, the script will e-mail the "authorized poersonnel".

I do not pipe the output of aid to the mail program.

My question:
Is this a legitmate finding (because I am not implementing aide as documented in the STIG), or is it a False Finding, because I am meeting the requirement?
 
Old 05-18-2021, 08:13 PM   #2
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,679
Blog Entries: 4

Rep: Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947
One very-simple thing that I do ... although I'm not looking for malicious acts, is to: "turn the directory into a git repository!"

This creates a hidden .git directory in the target location, and it immediately confers the full benefit of version control upon all of the files within the target directory and all subdirectories. Obviously, a determined intruder could guess that I had done this and could probably tamper with it, but "it sure has saved my bacon," a great many times, when it comes to ordinary system management tasks.
 
Old 05-18-2021, 08:42 PM   #3
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,347

Rep: Reputation: Disabled
Quote:
Originally Posted by scottieH View Post
Is this a legitmate finding (because I am not implementing aide as documented in the STIG), or is it a False Finding, because I am meeting the requirement?
The important sentence in STIG V-71975 is "If the file integrity application does not notify designated personnel of changes, this is a finding."

V-71975 suggest using AIDE, but this is not mandatory:
Quote:
Originally Posted by STIG V-71975
If AIDE is not installed, ask the SA how file integrity checks are performed on the system.
The cron job in the document is also just an example.

In other words, you are not bound to use AIDE or even cron, as long as some sort of file integrity check is done at regular intervals, and the results are mailed to "designated personnel."

Whether or not your solution meets the requirement, depends on the contents of your script. You say you're not piping the output from AIDE to the mail program, but are you including it in the alert e-mail by some other means? If the answer is yes, then I'm pretty confident it's a false finding.

Last edited by Ser Olmy; 05-18-2021 at 08:47 PM.
 
Old 05-19-2021, 12:16 PM   #4
scottieH
Member
 
Registered: Mar 2021
Posts: 58

Original Poster
Rep: Reputation: Disabled
I agree, but ...

Quote:
Originally Posted by Ser Olmy View Post
In other words, you are not bound to use AIDE or even cron, as long as some sort of file integrity check is done at regular intervals, and the results are mailed to "designated personnel."

Whether or not your solution meets the requirement, depends on the contents of your script. You say you're not piping the output from AIDE to the mail program, but are you including it in the alert e-mail by some other means? If the answer is yes, then I'm pretty confident it's a false finding.
I'm inclined to agree with you. However, I need some kind of documentation that says what you say. Some of the "Muckity-Mucks" need actual proof.

Can you point me to an official document that says this?
TIA
 
  


Reply

Tags
aide, linux, stig



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
RHEL8/STIGs/aide.conf OwnerMode entry errors JohnBoyNC Linux - Security 7 05-18-2021 11:28 AM
DISA STIGs Michaell1 Linux - Newbie 1 03-15-2021 03:01 PM
[SOLVED] No force feedback in wine game from a Logitech Driving Force GT ethoms Slackware 11 05-17-2014 09:23 AM
SUSE 10 and DISA STIGS question CDAWG Linux - Security 1 09-24-2010 05:10 PM
Is this a secure implementation of telnet? system Linux - Security 6 12-19-2001 08:37 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 07:53 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration