Overview of configuration options
Configuration options include top-level options, benchmark options, and Center for Internet Security (CIS)-specific options.
Find and set configuration options
config
variable receives a
hash, and the key values in the hash control the CEM variables in the configuration.CIS controls
5.4.1 - Ensure password creation requirements are configured
The
anatomy of a CIS control is as follows: - Parameters: Configuration options for a control, along with the data type and default value.
- Supported Levels: The supported levels for a CIS control.
-
Supported Profiles: The applicability of the control. For example, a
control with a profile of
server
is applicable to server components. - Hiera Configuration Example: Snippet of Hiera that can be used to configure a control.
-
Alternate Config IDs: The alternate config IDs for a control. Any of
these config IDs, along with the full control name, can be used as a key in
the
control_config
hash. - Resource: The name of the Puppet resource that enforces the control.
Guidelines for specifying CIS config IDs
You can specify CIS controls in the control_config
hash by
referencing the full control name, the control number, the normalized control name,
or the normalized control number. You cannot mix and match these forms and
must pick a single config ID form to use for your config. Full control names and
control numbers are copied verbatim from the benchmarks and are case-sensitive.
Normalized control names have lowercase letters and contain only alphanumeric
characters and underscores. Normalized control numbers are always prefixed with a
c
and contain only numeric characters separated by
underscores.
- Full control name:
(L1) Ensure 'Enforce password history' is set to '24 or more password(s)'
- Control number:
1.1.1
- Normalized control name:
ensure_enforce_password_history_is_set_to_24_or_more_passwords
- Normalized number:
c1_1_1
DISA STIG controls
You can view DISA STIG controls in the CEM Linux Reference on Puppet Forge. Each DISA STIG control is identified by its vulnerability ID, for example: V-204486. To learn about the purpose of a STIG control, go to the STIG Viewer and search for the operating system associated with the control, and then the control.
For example, if your nodes are running on RHEL 7, you can find relevant information in the Red Hat Enterprise Linux 7 Security Technical Implementation Guide. That webpage also provides a description of Control V-204486.
- Parameters: Configuration options, along with data types and default values.
-
Supported Levels: The level of required protection, specified in
terms of Mission Assurance Category levels (MACs):
-
mac-1
specifies protection for a critically important system. The loss of availability or integrity of MAC 1 systems is considered unacceptable. -
mac-2
specifies protection for a system that handles support for deployed or contingency forces. The loss of a MAC 2 system can be tolerated only briefly. -
mac-3
specifies protection for a system that handles information required for day-to-day operations. The loss of a MAC 3 system can be tolerated without largely impacting mission or operational readiness.
-
-
Supported Profiles: The supported profiles for the control, such as
public
,classified
, orsensitive
. - Hiera Configuration Example: Hiera code snippet that can be used to configure the control.
- Resource: The name of the Puppet resource that enforces the control.
Top-level configuration options
In Hiera, the top-level configuration options
are found directly under the cem_linux
namespace. If you
must customize CEM to meet your organization's
requirements, you can specify values for the top-level configuration options.
cem_linux:
. The following list describes the options:-
benchmark
-Enum['cis','stig']
- the compliance framework to use. CEM for Linux supports onlycis
andstig
. Default:cis
. -
config
-Optional[Hash]
- the location for all non-top-level configuration options. Default:undef
. -
allow_on_kubernetes_node
-Boolean
- Ifcem_linux
detects that it is running on a Kubernetes cluster node or host, CEM does not enforce controls, and it logs a warning. In this way, CEM helps to prevent the accidental enforcement of incorrect compliance settings that can render Kubernetes non-functional. Default:false
. -
manage_gnome
-Boolean
- When set totrue
, controls are enforced to secure a GNOME desktop environment. When set tofalse
, the controls are not enforced. Default:false
. -
disable_package_gpgcheck
–Boolean
– When set totrue
, GNU Privacy Guard (GPG) checks of downloaded packages are disabled. Disabling GPG checks can be helpful in rare cases if you enable more stringent system encryption standards, such as the Federal Information Processing Standards (FIPS). These tighter standards can introduce stricter criteria than are normally applied to GPG package signatures. If GPG and more stringent criteria are applied simultaneously, package downloads can fail. Specifydisable_package_gpgcheck=true
only when necessary because this setting can make your infrastructure less secure. Default:false
. -
regenerate_grub2_config
-Boolean
- Some configurations in CEM for Linux modify theGrub2
bootloader configuration. To regenerate theGrub2
configuration after applying a change, set this parameter totrue
. If you do not set this parameter totrue
, you must manually regenerate theGrub2
configuration. Default:false
. -
set_grub2_password
-Boolean
- Set the password for theGrub2
bootloader. If you set this value totrue
, you must also set thegrub2_superuser
andgrub2_superuser_password
parameters, or configure the specific bootloader password control by using thecontrol_configs
option. Default:false
. -
grub2_superuser
-Optional[String[1]]
- The superuser for theGrub2
bootloader if you set theset_grub2_password
parameter totrue
. Default:Undef
. -
grub2_superuser_password
-Optional[Sensitive[String]]
- The superuser password for theGrub2
bootloader if you set theset_grub2_password
parameter totrue
. This value is sensitive in terms of security and should be stored in aSensitive
data type. Default:Undef
.
Hiera example
Grub2
bootloader config on a node using the CIS
benchmark:cem_linux::benchmark: 'cis'
cem_linux::allow_on_kubernetes_node: false
cem_linux::regenerate_grub2_config: true
cem_linux::config:
...
Benchmark configuration options
Each Center for Internet Security (CIS) Benchmark and each Security Technical Implementation Guide (STIG) is associated with a set of configuration options. You can use Hiera to specify values for the benchmark configuration options.
cem_linux::config:
hash. The following options are available:-
only:
-Optional[Array[String]]
— takes an array of control class names (manifests/benchmarks/<benchmark>/controls/*.pp
). Classes specified here are included in the catalog. This option takes precedence overignore:
. Default:undef
. -
ignore:
-Optional[Array[String]]
— takes an array of control class names (manifests/benchmarks/<benchmark>/controls/*.pp
). The classes specified here are not included in the catalog. Ifonly:
is specified, this option does nothing. Default:undef
. -
control_configs
-Optional[Hash]
— where all rule-specific configurations live. Default:undef
.
CIS-specific configuration options
To meet your organization's requirements, you can specify CIS-specific configuration options, such as settings related to firewalls and log files. Use Hiera to specify these options.
cem_linux::config:
hash:-
profile:
-Optional[Enum['server', 'workstation']]
— the name of the benchmark profile. The only value supported by CEM isserver
. Default:server
. -
level:
-Optional[Enum['1', '2']]
— the name of the profile level. Default:1
. -
firewall_type:
-Optional[Enum['iptables', 'firewalld', 'unmanaged']]
— the preferred firewall provider. If set tounmanaged
, CEM will not enforce firewall-related rules. Default:firewalld
. -
enable_systemd_journal
-Optional[Boolean]
- Whether to enable thesystemd-journal
logging service. The default value isfalse
. If this option is enabled, thesystemd-journal-remote
package will be installed and thesystemd-journal-upload.service
service will be enabled. However, several configuration parameters are required to ensure that thesystemd-journal-upload.service
functions correctly:cem_linux::config: control_configs: 'ensure_systemd_journal_remote_is_configured': address: '<IP address or FQDN of the remote host>' server_key_file: '<path to the server key file>' server_certificate_file: '<path to the server certificate file>' trusted_certificate_file: '<path to the trusted certificate file>'