1
1
---
2
+ ##############################################################################
3
+ # Common CIS Hardening Configuration
4
+
5
+ # Enable collecting auditd logs
6
+ update_audit_template: true
7
+
8
+ ##############################################################################
9
+ # RHEL 8 / Centos Stream 8 CIS Hardening Configuration
2
10
3
11
# NOTE: kayobe configures NTP. Do not clobber configuration.
4
12
rhel8cis_time_synchronization: skip
@@ -22,3 +30,121 @@ rhel8cis_crypto_policy: FIPS
22
30
# from being displayed.
23
31
rhel8cis_rule_1_8_1_1: false
24
32
rhel8cis_rule_1_8_1_4: false
33
+
34
+ ##############################################################################
35
+ # Rocky 9 CIS Hardening Configuration
36
+
37
+ # Allow IP forwarding
38
+ rhel9cis_is_router: true
39
+
40
+ # Skip configuration of chrony
41
+ rhel9cis_rule_2_1_1: false
42
+ rhel9cis_rule_2_1_2: false
43
+
44
+ # Skip configuration of the firewall
45
+ rhel9cis_firewall: None
46
+ rhel9cis_rule_3_4_1_2: false
47
+
48
+ # Don't configure selinux
49
+ rhel9cis_selinux_disable: true
50
+
51
+ # NOTE: FUTURE breaks wazuh agent repo metadata download
52
+ rhel9cis_crypto_policy: FIPS
53
+
54
+ # Skip package updates
55
+ rhel9cis_rule_1_9: false
56
+
57
+ # Disable requirement for password when using sudo
58
+ rhel9cis_rule_5_3_4: false
59
+
60
+ # Disable check for root password being set, we should be locking root passwords instead.
61
+ # Please double-check yourself with: sudo passwd -S root
62
+ rhel9cis_rule_5_6_6: false
63
+
64
+ # Configure log rotation to prevent audit logs from filling the disk
65
+ rhel9cis_auditd:
66
+ space_left_action: syslog
67
+ action_mail_acct: root
68
+ admin_space_left_action: halt
69
+ max_log_file_action: rotate
70
+
71
+ # Max size of audit logs (MB)
72
+ rhel9cis_max_log_file_size: 1024
73
+
74
+ ##############################################################################
75
+ # Ubuntu Jammy CIS Hardening Configuration
76
+
77
+ # Ubuntu 22 CIS configuration
78
+ # Disable changing routing rules
79
+ ubtu22cis_is_router: true
80
+
81
+ # Set Chrony as the time sync tool
82
+ ubtu22cis_time_sync_tool: "chrony"
83
+
84
+ # Disable CIS from configuring the firewall
85
+ ubtu22cis_firewall_package: "none"
86
+
87
+ # Stop CIS from installing Network Manager
88
+ ubtu22cis_install_network_manager: false
89
+
90
+ # Set syslog service to journald
91
+ ubtu22cis_syslog_service: journald
92
+
93
+ # Squashfs is compiled into the kernel
94
+ ubtu22cis_rule_1_1_1_2: false
95
+
96
+ # This updates the system. Let's do this explicitly.
97
+ ubtu22cis_rule_1_9: false
98
+
99
+ # Do not change Chrony Time servers
100
+ ubtu22cis_rule_2_1_2_1: false
101
+
102
+ # Disable CIS from touching sudoers
103
+ ubtu22cis_rule_5_3_4: false
104
+
105
+ # Add stack and kolla to allowed ssh users
106
+ ubtu22cis_sshd:
107
+ log_level: "INFO"
108
+ max_auth_tries: 4
109
+
110
+ macs: "
[email protected] ,
[email protected] ,hmac-sha2-512,hmac-sha2-256"
111
+ kex_algorithms: "curve25519-sha256,
[email protected] ,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256"
112
+ client_alive_interval: 300
113
+ client_alive_count_max: 3
114
+ login_grace_time: 60
115
+ max_sessions: 10
116
+ allow_users: "kolla stack ubuntu"
117
+ allow_groups: "kolla stack ubuntu"
118
+ # This variable, if specified, configures a list of USER name patterns, separated by spaces, to prevent SSH access
119
+ # for users whose user name matches one of the patterns. This is done
120
+ # by setting the value of `DenyUsers` option in `/etc/ssh/sshd_config` file.
121
+ # If an USER@HOST format will be used, the specified user will be restricted only on that particular host.
122
+ # The allow/deny directives process order: DenyUsers, AllowUsers, DenyGroups, AllowGroups.
123
+ # For more info, see https://linux.die.net/man/5/sshd_config
124
+ deny_users: ""
125
+ # This variable, if specified, configures a list of GROUP name patterns, separated by spaces, to prevent SSH access
126
+ # for users whose primary group or supplementary group list matches one of the patterns. This is done
127
+ # by setting the value of `DenyGroups` option in `/etc/ssh/sshd_config` file.
128
+ # The allow/deny directives process order: DenyUsers, AllowUsers, DenyGroups, AllowGroups.
129
+ # For more info, see https://linux.die.net/man/5/sshd_config
130
+ deny_groups: ""
131
+
132
+ # Do not change /var/lib/docker permissions
133
+ ubtu22cis_no_group_adjust: false
134
+ ubtu22cis_no_owner_adjust: false
135
+
136
+ # Configure log rotation to prevent audit logs from filling the disk
137
+ ubtu22cis_auditd:
138
+ action_mail_acct: root
139
+ space_left_action: syslog
140
+ admin_space_left_action: halt
141
+ max_log_file_action: rotate
142
+
143
+ # Max size of audit logs (MB)
144
+ ubtu22cis_max_log_file_size: 1024
145
+
146
+ # Disable grub bootloader password. Requires overriding
147
+ # ubtu22cis_bootloader_password_hash
148
+ ubtu22cis_rule_1_4_1: false
149
+ ubtu22cis_rule_1_4_3: false
150
+ ##############################################################################
0 commit comments