1
1
---
2
+ ##############################################################################
3
+ # RHEL 8 / Centos Stream 8 CIS Hardening Configuration
2
4
3
5
# NOTE: kayobe configures NTP. Do not clobber configuration.
4
6
rhel8cis_time_synchronization: skip
@@ -22,3 +24,82 @@ rhel8cis_crypto_policy: FIPS
22
24
# from being displayed.
23
25
rhel8cis_rule_1_8_1_1: false
24
26
rhel8cis_rule_1_8_1_4: false
27
+
28
+ ##############################################################################
29
+ # Ubuntu Jammy CIS Hardening Configuration
30
+
31
+ # Ubuntu 22 CIS configuration
32
+ # Disable changing routing rules
33
+ ubtu22cis_is_router: true
34
+
35
+ # Set Chrony as the time sync tool
36
+ ubtu22cis_time_sync_tool: "chrony"
37
+
38
+ # Disable CIS from configuring the firewall
39
+ ubtu22cis_firewall_package: "none"
40
+
41
+ # Stop CIS from installing Network Manager
42
+ ubtu22cis_install_network_manager: false
43
+
44
+ # Set syslog service to journald
45
+ ubtu22cis_syslog_service: journald
46
+
47
+ # Squashfs is compiled into the kernel
48
+ ubtu22cis_rule_1_1_1_2: false
49
+
50
+ # This updates the system. Let's do this explicitly.
51
+ ubtu22cis_rule_1_9: false
52
+
53
+ # Do not change Chrony Time servers
54
+ ubtu22cis_rule_2_1_2_1: false
55
+
56
+ # Disable CIS from touching sudoers
57
+ ubtu22cis_rule_5_3_4: false
58
+
59
+ # Add stack and kolla to allowed ssh users
60
+ ubtu22cis_sshd:
61
+ log_level: "INFO"
62
+ max_auth_tries: 4
63
+
64
+ macs: "
[email protected] ,
[email protected] ,hmac-sha2-512,hmac-sha2-256"
65
+ kex_algorithms: "curve25519-sha256,
[email protected] ,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256"
66
+ client_alive_interval: 300
67
+ client_alive_count_max: 3
68
+ login_grace_time: 60
69
+ max_sessions: 10
70
+ allow_users: "kolla stack ubuntu"
71
+ allow_groups: "kolla stack ubuntu"
72
+ # This variable, if specified, configures a list of USER name patterns, separated by spaces, to prevent SSH access
73
+ # for users whose user name matches one of the patterns. This is done
74
+ # by setting the value of `DenyUsers` option in `/etc/ssh/sshd_config` file.
75
+ # If an USER@HOST format will be used, the specified user will be restricted only on that particular host.
76
+ # The allow/deny directives process order: DenyUsers, AllowUsers, DenyGroups, AllowGroups.
77
+ # For more info, see https://linux.die.net/man/5/sshd_config
78
+ deny_users: ""
79
+ # This variable, if specified, configures a list of GROUP name patterns, separated by spaces, to prevent SSH access
80
+ # for users whose primary group or supplementary group list matches one of the patterns. This is done
81
+ # by setting the value of `DenyGroups` option in `/etc/ssh/sshd_config` file.
82
+ # The allow/deny directives process order: DenyUsers, AllowUsers, DenyGroups, AllowGroups.
83
+ # For more info, see https://linux.die.net/man/5/sshd_config
84
+ deny_groups: ""
85
+
86
+ # Do not change /var/lib/docker permissions
87
+ ubtu22cis_no_group_adjust: false
88
+ ubtu22cis_no_owner_adjust: false
89
+
90
+ # Enable collecting auditd logs
91
+ update_audit_template: true
92
+
93
+ # Configure log rotation to prevent audit logs from filling the disk
94
+ ubtu22cis_auditd:
95
+ action_mail_acct: root
96
+ space_left_action: syslog
97
+ admin_space_left_action: halt
98
+ max_log_file_action: rotate
99
+
100
+ # Disable grub bootloader password. Requires overriding
101
+ # ubtu22cis_bootloader_password_hash
102
+ ubtu22cis_rule_1_4_1: false
103
+ ubtu22cis_rule_1_4_3: false
104
+
105
+ ##############################################################################
0 commit comments