pburkholder / inspec-stigs

inspec rules for STIGs

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Inspec Profile for STIGs

Based on Security Guides found at STIG

The Security Technical Implementation Guides (STIGs) and the NSA Guides are the configuration standards for DOD IA and IA-enabled devices/systems. Since 1998, DISA has played a critical role enhancing the security posture of DoD's security systems by providing the Security Technical Implementation Guides (STIGs). The STIGs contain technical guidance to "lock down" information systems/software that might otherwise be vulnerable to a malicious computer attack.

Develop Inspec checks:

I pulle down the stig json file and parsed it through a shitty script to generate the base inspec files and then wrote the checks. see read_stig_json.rb for generating inspec base from stig documentation.

Demo

$ vagrant up
...
...
$ vagrant ssh -c "time inspec exec /vagrant/rhel6 --format=progress
........FFFFFFFFF....F.........FFFFF..F......F.F.F......FF.FF.F..F............FF..F.....FFF.....FF.......*....F..F.F......FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF..F.......FF...FF..*..F.FFFF*F..F...F...F.F..F....[DEPRECATION] `passwd.count` is deprecated. Please use `passwd.entries.length` instead. It will be removed in version 1.0.0.
.*..F*FFFFFF..FF.....FF....F...F..F...F...F....F......F.FFFF.*F*.....F....F...FFFFF.........FF.FFF....FF.FFFFFF.FF*FFF.F...F..F.FFFFF.FF........................................*F.*F.........F....F.....FF.F....FFFFFF.

Pending: (Failures listed here are expected and do not affect your suite's status)

  1) Operating System Detection Skipped control due to only_if condition.
     # Not yet implemented
     #
...
...
Failures:

  1) SSH Configuration HostbasedAuthentication should eq "no"
     Failure/Error: DEFAULT_FAILURE_NOTIFIER = lambda { |failure, _opts| raise failure }

       expected: "no"
            got: nil

       (compared using ==)
     # /vagrant/rhel6/controls/V-38612.rb:41:in `block (3 levels) in load_with_context'
...
...
real    1m36.180s
user    0m12.392s
sys 1m6.712s

Windows Demo:

inspec exec path/to/inspec-stigs/win2012member/ -t winrm://username@host  \
  --password 'password' --format=progress

About

inspec rules for STIGs

License:Other


Languages

Language:Ruby 100.0%