Uploaded image for project: 'Cloud Infrastructure Security & Compliance'
  1. Cloud Infrastructure Security & Compliance
  2. CMP-3553

SSH remediations are broadly applied for RHCOS4 profile rules

XMLWordPrintable

    • Quality / Stability / Reliability
    • False
    • Hide

      None

      Show
      None
    • False
    • +

      Description of problem:

          The Compliance Operator has rules that evaluate SSH settings on RHCOS hosts. Some of these rules fail, and the Compliance Operator supplies a very broad remediations that it uses for all SSH rules. This means any SSH failure, and fix through the Compliance Operator, can result in unintended configuration changes to SSH, even though they're all technically hardening recommendations. This can be confusing for users since they didn't intend to change some configs based on the context of the rule that failed.

      Version-Release number of selected component (if applicable):

          All versions of the Compliance Operator, but 1.7.0 in particular since that's the latest.

      How reproducible:

          100%

      Steps to Reproduce:

          1. Install the Compliance Operator
          2. Run the `rhcos4-high` or `rhcos4-moderate` scans, which contain ssh rules
          3. Observer some of the SSH rules failing
          4. Obtain a copy of the existing sshd_config
          5. Check for any SSH rules that have a remediation
          6. Apply the remediation
          7. Observe that the remediation was applied, but it also applied many other remediations and configuration changes for SSH
          

      Actual results:

          The actual result is that the Compliance Operator lays down a generic, hardened SSH configuration for all SSH remediations, instead of a specific remediation for the rule in question.

      Expected results:

          The Compliance Operator remediations should be specific to the rule they're addressing. This makes the rules orthogonal and less likely that rules will have conflicting remediation guidance.

      Additional info:

      This is the hardened SSH configuration that Compliance Operator uses for all SSH rules.

      https://github.com/ComplianceAsCode/content/blob/master/shared/macros/10-kubernetes.jinja#L1-L154

      I think the proper fix would be to break this up in to smaller macros that can be invoked specifically for each rule where appropriate, and each is saved into a separate file in the ssh.d/ configuration directory, so they don't step on each other.

              wsato@redhat.com Watson Sato
              lbragsta@redhat.com Lance Bragstad
              Xiaojie Yuan Xiaojie Yuan
              Maria Simon Marcos Maria Simon Marcos
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: