-
Bug
-
Resolution: Unresolved
-
Critical
-
None
-
6.17.0
-
False
-
sat-endeavour
-
None
-
None
-
None
-
None
Description of problem:
Running OpenSCAP scans through Red Hat Satellite using the default SCAP security profile with no tailoring file applied. The resulting scan report shows 54 rules marked as failed, many of which appear to be incorrect or false positives upon manual verification.
How reproducible:
Consistently reproducible using the default SCAP profile via Red Hat Satellite, without any tailoring file.
Is this issue a regression from an earlier version:
Steps to Reproduce:
- In Red Hat Satellite, create a new SCAP policy using the following:
- Profile: CIS Red Hat Enterprise Linux 8 Benchmark for Level 1 - Server
- SCAP Content: Red Hat rhel8 default content
- Assign the policy to a registered host (no tailoring file applied).
- Run the OpenSCAP scan from Satellite.
- Review the scan results — observe that 54 rules are marked as failed.
- Manually verify system configuration for some of the failed rules (e.g., “Set SSH Client Alive Count
Actual behavior:
- OpenSCAP reports 54 failed rules when using the default SCAP profile with no tailoring file.
- Many of these failed rules do not accurately reflect the system’s configuration.
- For example, the rule “Set SSH Client Alive Count Max” was marked as failed, despite the correct configuration being present on the system.
- Results appear to include false positives, leading to inaccurate compliance reporting.
Expected behavior:
- The scan should accurately reflect the compliance state of the system.
- Rules should only be marked as failed when there is a genuine non-compliance.
Business Impact / Additional info:
- Inaccurate scan results reduce confidence in Satellite-generated compliance reports.
- Manual verification is required, impacting audit readiness and compliance planning.
- Centralized scanning through Satellite becomes unreliable without accurate rule evaluation.