Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Hardening kernel parameters #520

Closed
wants to merge 1 commit into from

Conversation

syuu1228
Copy link
Contributor

Apply CIS recommendations for kernel parameters.

This will apply following CIS compliance rules:

  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_ra
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_source_route
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_forwarding
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_ra
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_source_route
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_log_martians
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects
  • xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward
  • xccdf_org.ssgproject.content_rule_sysctl_fs_suid_dumpable
  • xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space

Fixes scylladb/scylla-enterprise-machine-image#68
Related scylladb/scylla-pkg#2953

Apply CIS recommendations for kernel parameters.

This will apply following CIS compliance rules:
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_ra
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_source_route
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_forwarding
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_ra
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_redirects
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_default_accept_source_route
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_redirects
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_accept_source_route
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_log_martians
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_rp_filter
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_secure_redirects
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_source_route
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_log_martians
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_rp_filter
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_secure_redirects
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_echo_ignore_broadcasts
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_icmp_ignore_bogus_error_responses
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_tcp_syncookies
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_all_send_redirects
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_send_redirects
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_ip_forward
- xccdf_org.ssgproject.content_rule_sysctl_fs_suid_dumpable
- xccdf_org.ssgproject.content_rule_sysctl_kernel_randomize_va_space

Fixes scylladb/scylla-enterprise-machine-image#68
Related scylladb/scylla-pkg#2953
@yaronkaikov
Copy link
Collaborator

@syuu1228 Running https://jenkins.scylladb.com/job/scylla-master/job/releng-testing/job/next-machine-image/301/ to verify everything is working as expected

@yaronkaikov
Copy link
Collaborator

@syuu1228 Let's move this change to scylla-enterprise-machine-image, it should be enterprise only feature

@syuu1228
Copy link
Contributor Author

Need to move this to scylla-enterprise-machine-image, closing.

@syuu1228 syuu1228 closed this Apr 24, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants