281 lines
7.3 KiB
YAML
281 lines
7.3 KiB
YAML
---
|
|
|
|
- name: "6.2.3.1 | PATCH | Ensure changes to system administration scope (sudoers) is collected"
|
|
when: ubtu24cis_rule_6_2_3_1
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.1
|
|
- NIST800-53R5_AU-3
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.2 | PATCH | Ensure actions as another user are always logged"
|
|
when: ubtu24cis_rule_6_2_3_2
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.2
|
|
- NIST800-53R5_AU-3
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.3 | PATCH | Ensure events that modify the sudo log file are collected"
|
|
when: ubtu24cis_rule_6_2_3_3
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.3
|
|
- NIST800-53R5_AU-3
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.4 | PATCH | Ensure events that modify date and time information are collected"
|
|
when: ubtu24cis_rule_6_2_3_4
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.4
|
|
- NIST800-53R5_AU-3
|
|
- NIST800-53R5_CM-6
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.5 | PATCH | Ensure events that modify the system's network environment are collected"
|
|
when: ubtu24cis_rule_6_2_3_5
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.5
|
|
- NIST800-53R5_AU-3
|
|
- NIST800-53R5_CM-6
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.6 | PATCH | Ensure use of privileged commands is collected"
|
|
when: ubtu24cis_rule_6_2_3_6
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.6
|
|
- NIST800-53R5_AU-3
|
|
- auditd
|
|
block:
|
|
- name: "6.2.3.6 | AUDIT | Ensure use of privileged commands is collected | Get list of privileged programs"
|
|
ansible.builtin.shell: for i in $(findmnt -n -l -k -it $(awk '/nodev/ { print $2 }' /proc/filesystems | paste -sd,) | grep -Pv "noexec|nosuid" | awk '{print $1}'); do find $i -xdev -type f -perm -4000 -o -type f -perm -2000 2>/dev/null; done
|
|
changed_when: false
|
|
check_mode: false
|
|
register: discovered_privilege_processes
|
|
|
|
- name: "6.2.3.6 | PATCH | Ensure use of privileged commands is collected | Set privileged rules"
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.7 | PATCH | Ensure unsuccessful file access attempts are collected"
|
|
when: ubtu24cis_rule_6_2_3_7
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.7
|
|
- NIST800-53R5_AU-3
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.8 | PATCH | Ensure events that modify user/group information are collected"
|
|
when: ubtu24cis_rule_6_2_3_8
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.8
|
|
- NIST800-53R5_AU-3
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.9 | PATCH | Ensure discretionary access control permission modification events are collected"
|
|
when: ubtu24cis_rule_6_2_3_9
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.9
|
|
- NIST800-53R5_AU-3
|
|
- NIST800-53R5_CM-6
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.10 | PATCH | Ensure successful file system mounts are collected"
|
|
when: ubtu24cis_rule_6_2_3_10
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.10
|
|
- NIST800-53R5_CM-6
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.11 | PATCH | Ensure session initiation information is collected"
|
|
when: ubtu24cis_rule_6_2_3_11
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.11
|
|
- NIST800-53R5_AU-3
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.12 | PATCH | Ensure login and logout events are collected"
|
|
when: ubtu24cis_rule_6_2_3_12
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.12
|
|
- NIST800-53R5_AU-3
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.13 | PATCH | Ensure file deletion events by users are collected"
|
|
when: ubtu24cis_rule_6_2_3_13
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.13
|
|
- NIST800-53R5_AU-12
|
|
- NIST800-53R5_SC-7
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.14 | PATCH | Ensure events that modify the system's Mandatory Access Controls are collected"
|
|
when: ubtu24cis_rule_6_2_3_14
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.14
|
|
- NIST800-53R5_AU-3
|
|
- NIST800-53R5_CM-6
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.15 | PATCH | Ensure successful and unsuccessful attempts to use the chcon command are recorded"
|
|
when: ubtu24cis_rule_6_2_3_15
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.15
|
|
- NIST800-53R5_AU-2
|
|
- NIST800-53R5_AU-12
|
|
- NIST800-53R5_SI-5
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.16 | PATCH | Ensure successful and unsuccessful attempts to use the setfacl command are recorded"
|
|
when: ubtu24cis_rule_6_2_3_16
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.16
|
|
- NIST800-53R5_AU-2
|
|
- NIST800-53R5_AU-12
|
|
- NIST800-53R5_SI-5
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.17 | PATCH | Ensure successful and unsuccessful attempts to use the chacl command are recorded"
|
|
when: ubtu24cis_rule_6_2_3_17
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.17
|
|
- NIST800-53R5_AU-2
|
|
- NIST800-53R5_AU-12
|
|
- NIST800-53R5_SI-5
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.18 | PATCH | Ensure successful and unsuccessful attempts to use the usermod command are recorded"
|
|
when: ubtu24cis_rule_6_2_3_18
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.18
|
|
- NIST800-53R5_AU-2
|
|
- NIST800-53R5_AU-12
|
|
- NIST800-53R5_SI-5
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.19 | PATCH | Ensure kernel module loading and unloading is collected"
|
|
when: ubtu24cis_rule_6_2_3_19
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.19
|
|
- NIST800-53R5_AU-3
|
|
- NIST800-53R5_CM-6
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.20 | PATCH | Ensure the audit configuration is immutable"
|
|
when: ubtu24cis_rule_6_2_3_20
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- patch
|
|
- rule_6.2.3.20
|
|
- NIST800-53R5_AC-3
|
|
- NIST800-53R5_AU-3
|
|
- NIST800-53R5_AU-12
|
|
- NIST800-53R5_MP-2
|
|
- auditd
|
|
ansible.builtin.set_fact:
|
|
update_audit_template: true
|
|
|
|
- name: "6.2.3.21 | PATCH | Ensure the running and on disk configuration is the same"
|
|
when: ubtu24cis_rule_6_2_3_21
|
|
tags:
|
|
- level2-server
|
|
- level2-workstation
|
|
- scored
|
|
- patch
|
|
- rule_6.2.3.21
|
|
- NIST800-53R5_AU-3
|
|
- auditd
|
|
ansible.builtin.command: augenrules --check
|
|
changed_when: false
|
|
register: discovered_augenrules_check
|