800-53
This role endeavors to apply relevant NIST 800-53 controls to an Enterprise Linux host.
This is not a "scanner" per-se. If you wish to assess the application of this role to your host, check out the SCAP Security Guide and Open SCAP projects. Both of these will provide you tools with which you can scan your host.
All tasks are tagged with the applicable controls. To see which tasks are related to the "access control" category in the NIST 800-53 controls, execute the following.
$ ansible-playbook -i [inventory] --tags "AC" --list-tasks [playbook.yml]
Requirements
Per 800-53 Audit and Accountability requirements, you are recommended to have the following partitions:
/var
/var/log
/var/log/audit
/home
/tmp
These scripts will not create these partitions for you.
NOTE: This will make sweeping changes to your host. It is recommended you apply this role to a freshly provisioned host.
Role Variables
---
# vars file for 800-53
#The schedule for AIDE
aide_minute: 05
aide_hour: 03
aide_day_of_month: '*'
aide_month: '*'
aide_day_of_week: '*'
vpn_package: openswan
#Whether or not to run an SCAP scan
run_scap: true
#The profile to run
scap_profile_6:
- stig-rhel{{ ansible_distribution_major_version }}-server-upstream
scap_profile_7:
- stig-rhel{{ ansible_distribution_major_version }}-disa
#Where on your local host you wish to place the reports
scap_reports_dir: /tmp
Dependencies
ansible 2.2.0.0
Example Playbook
# file: 80053.yaml
---
- hosts: 80053_hosts
become: yes
vars:
scap_reports_dir: ~/scap_reports
roles:
- ansible-role-800-53
Example Inventory
[80053_hosts]
172.16.78.159
Example Run
ansible-playbook -u admin -i 80053_inventory 80053.yaml
License
Apache 2.0
Author Information
Ken Evensen is a Solutions Architect with Red Hat