Project

General

Profile

Actions

Support #311

open

OAM - Security Hardening Auditing and Compliance

Added by Charles N about 2 months ago. Updated 7 days ago.

Status:
In Progress
Priority:
Normal
Assignee:
Start date:
08/05/2025
Due date:
09/30/2025 (Due in 36 days)
% Done:

20%

Estimated time:

Description

System Hardening (CIS Benchmarks/ Compliance as code (STIG/SCAP))

The goal of this ticket is to deliver the technology implementation piece of " Protecting Controlled Unclassified
Information in Nonfederal Systems and Organizations" (see attached PDF).

Also see https://www.cmmcaudit.org/

Separate tickets have been created for the policy/compliance piece.

General low hanging fruit/quick wins

We need to harden the base system image. A combination of CIS benchmarks and STIG/SCAP compliance.

We have already done a number of things to get more compliant with CIS benchmarks (in particular SSH config tweaks).

  • Action item: Finish tweaking SSH/auditd etc config to pass CIS benchmark checklist for Debian 12 in Wazuh dashboard .

I suspect that will help with scap/stig/lynis compliance.

  • Action item: finish tweaking system config to pass lynis audit

  • Action item: Atuin for root on all systems for centralized shell history

  • Action item: Move to SSH certificates instead of keys

STIG/SCAP

This is more involved.

From https://www.open-scap.org/security-policies/scap-security-guide/

apt install ssg-base ssg-debderived ssg-debian ssg-nondebian ssg-applications

And then we need to utilize ansible to run the relevant playbooks from :

2fa

Locking down the localuser account with 2fa is mandatory.

Webmin

Cockpit

SSH

LDAP Auth To Cloudron

No local non root accounts on the systems. All need to be from LDAP.

Cloudron is our IDP. It has an LDAP server. We need to utilize it for user authentication/group management etc.

Patch management

Unpatched vulns are the fastest way into a system. We need to keep the systems patched and be able to prove compliance.

This may be the one/done full enchilada:

Otherwise we may have to kit bash it together from pieces:

Audits

Once we have done all of the hardening, we need to audit the system to show compliance.

Lynis

This is an on system scanner (gvm may be able to fill that role instead/in-addition?)

Greenbone Vulnerability Manager

This will run from kali (with different configuration for vp-techops and dev)

https://std.rocks/security_kali_gvm.html

Core OAM

postalias: warning: /etc/aliases, line 1: need name:value pair
postalias: warning: /etc/aliases, line 2: need name:value pair
postalias: warning: /etc/aliases, line 3: need name:value pair
postalias: warning: /etc/aliases, line 4: need name:value pair
postalias: warning: /etc/aliases, line 5: need name:value pair
postalias: warning: /etc/aliases, line 6: need name:value pair
postalias: warning: /etc/aliases, line 7: need name:value pair
postalias: warning: /etc/aliases, line 8: need name:value pair
postalias: warning: /etc/aliases, line 9: need name:value pair
 Completed running global-systemServiceConfigurationFiles
 Now running global-postPackageConfiguration
Synchronizing state of auditd.service with SysV service script with /usr/lib/systemd/systemd-sysv-install.
Executing: /usr/lib/systemd/systemd-sysv-install enable auditd
postmap: warning: /etc/postfix/generic, line 2: expected format: key whitespace value
postmap: warning: /etc/postfix/generic, line 4: expected format: key whitespace value
postmap: warning: /etc/postfix/generic, line 7: expected format: key whitespace value
postmap: warning: /etc/postfix/generic, line 9: expected format: key whitespace value

Files

NIST.SP.800-171r3.pdf (1.52 MB) NIST.SP.800-171r3.pdf Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations Charles N, 07/31/2025 10:05 AM
NIST.SP.800-171r3.pdf

Related issues 1 (1 open0 closed)

Blocked by Known Element Enterprises - Technology & Facility Services - Feature #57: Internal CA deploymentIn ProgressCharles N08/05/202508/09/2025

Actions
Actions #1

Updated by Charles N about 2 months ago

  • Subject changed from KNEL - Security Hardening IAC to OAM - Security Hardening IAC
  • Description updated (diff)
Actions #2

Updated by Charles N about 2 months ago

  • Due date changed from 07/31/2025 to 07/12/2025
  • Start date changed from 07/01/2025 to 07/05/2025
Actions #3

Updated by Charles N about 1 month ago

  • Status changed from New to In Progress
Actions #4

Updated by Charles N about 1 month ago

  • Subject changed from OAM - Security Hardening IAC to OAM - Security Hardening
  • Description updated (diff)
Actions #5

Updated by Charles N about 1 month ago

  • Description updated (diff)
Actions #6

Updated by Charles N about 1 month ago

  • Description updated (diff)
Actions #7

Updated by Charles N about 1 month ago

  • Description updated (diff)
Actions #8

Updated by Charles N about 1 month ago

  • Subject changed from OAM - Security Hardening to OAM - Security Hardening Auditing and Compliance
  • Description updated (diff)
Actions #9

Updated by Charles N about 1 month ago

  • Description updated (diff)
Actions #10

Updated by Charles N about 1 month ago

  • Description updated (diff)
Actions #11

Updated by Charles N about 1 month ago

  • Description updated (diff)
Actions #12

Updated by Charles N about 1 month ago

  • Description updated (diff)
Actions #13

Updated by Charles N about 1 month ago

  • Due date changed from 07/12/2025 to 07/26/2025
  • Start date changed from 07/05/2025 to 07/21/2025
Actions #14

Updated by Charles N about 1 month ago

  • Description updated (diff)
Actions #15

Updated by Charles N about 1 month ago

  • Description updated (diff)
Actions #16

Updated by Charles N about 1 month ago

  • Due date changed from 07/26/2025 to 07/25/2025
Actions #17

Updated by Charles N about 1 month ago

  • Description updated (diff)
Actions #18

Updated by Charles N about 1 month ago

Actions #19

Updated by Charles N about 1 month ago

  • Due date changed from 07/25/2025 to 08/01/2025
Actions #20

Updated by Charles N about 1 month ago

  • Due date changed from 08/01/2025 to 08/03/2025
Actions #21

Updated by Charles N about 1 month ago

  • Start date changed from 07/21/2025 to 07/28/2025
Actions #22

Updated by Charles N about 1 month ago

  • Due date changed from 08/03/2025 to 08/09/2025
  • Start date changed from 07/28/2025 to 08/05/2025
Actions #23

Updated by Charles N 25 days ago

  • Description updated (diff)
Actions #25

Updated by Charles N 25 days ago

  • Description updated (diff)
  • Due date changed from 08/09/2025 to 08/31/2025
Actions #26

Updated by Charles N 25 days ago

  • Description updated (diff)
Actions #27

Updated by Charles N 7 days ago

  • Due date changed from 08/31/2025 to 09/30/2025
Actions

Also available in: Atom PDF