From 8ccc32a21cf0fff0b1b0e44b1bf20ca9ac4deae7 Mon Sep 17 00:00:00 2001 From: svet-se Date: Tue, 5 Nov 2024 16:08:10 +0200 Subject: [PATCH 1/6] Update SLE12 STIG to V3R1 --- products/sle12/profiles/stig.profile | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/products/sle12/profiles/stig.profile b/products/sle12/profiles/stig.profile index 2471dcbb6c8..56ea042d6fb 100644 --- a/products/sle12/profiles/stig.profile +++ b/products/sle12/profiles/stig.profile @@ -1,7 +1,7 @@ documentation_complete: true metadata: - version: V2R13 + version: V3R1 SMEs: - abergmann @@ -11,7 +11,7 @@ title: 'DISA STIG for SUSE Linux Enterprise 12' description: |- This profile contains configuration checks that align to the - DISA STIG for SUSE Linux Enterprise 12 V2R13. + DISA STIG for SUSE Linux Enterprise 12 V3R1. selections: - sshd_approved_macs=stig From a18573b76be1fa9a318585a9d0f426c9ebfcc08e Mon Sep 17 00:00:00 2001 From: svet-se Date: Tue, 5 Nov 2024 16:09:55 +0200 Subject: [PATCH 2/6] Update SLE12 DISA STIG manual to V3R1 --- ... => disa-stig-sle12-v3r1-xccdf-manual.xml} | 588 +++++++++--------- 1 file changed, 278 insertions(+), 310 deletions(-) rename shared/references/{disa-stig-sle12-v2r13-xccdf-manual.xml => disa-stig-sle12-v3r1-xccdf-manual.xml} (82%) diff --git a/shared/references/disa-stig-sle12-v2r13-xccdf-manual.xml b/shared/references/disa-stig-sle12-v3r1-xccdf-manual.xml similarity index 82% rename from shared/references/disa-stig-sle12-v2r13-xccdf-manual.xml rename to shared/references/disa-stig-sle12-v3r1-xccdf-manual.xml index 3985b3361bd..2af7feb6982 100644 --- a/shared/references/disa-stig-sle12-v2r13-xccdf-manual.xml +++ b/shared/references/disa-stig-sle12-v3r1-xccdf-manual.xml @@ -1,4 +1,4 @@ -acceptedSLES 12 Security Technical Implementation GuideThis Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.DISASTIG.DOD.MILRelease: 13 Benchmark Date: 24 Jan 20243.4.1.229161.10.02I - Mission Critical Classified<ProfileDescription></ProfileDescription>I - Mission Critical Public<ProfileDescription></ProfileDescription>I - Mission Critical Sensitive<ProfileDescription></ProfileDescription>II - Mission Support Classified<ProfileDescription></ProfileDescription>II - Mission Support Public<ProfileDescription></ProfileDescription>II - Mission Support Sensitive<ProfileDescription></ProfileDescription>III - Administrative Classified<ProfileDescription></ProfileDescription>III - Administrative Public<ProfileDescription></ProfileDescription>III - Administrative Sensitive<ProfileDescription></ProfileDescription>SRG-OS-000480-GPOS-00227<GroupDescription></GroupDescription>SLES-12-010000The SUSE operating system must be a vendor-supported release.<VulnDiscussion>A SUSE operating system release is considered "supported" if the vendor continues to provide security patches for the product. With an unsupported release, it will not be possible to resolve security issues discovered in the system software.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target SUSE Linux Enterprise Server 12DISADPMS TargetSUSE Linux Enterprise Server 124033V-77045SV-91741CCI-001230Upgrade the SUSE operating system to a version supported by the vendor. If the system is not registered with the SUSE Customer Center, register the system against the correct subscription. +acceptedSLES 12 Security Technical Implementation GuideThis Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.DISASTIG.DOD.MILRelease: 1 Benchmark Date: 24 Oct 20243.51.10.03I - Mission Critical Classified<ProfileDescription></ProfileDescription>I - Mission Critical Sensitive<ProfileDescription></ProfileDescription>II - Mission Support Public<ProfileDescription></ProfileDescription>III - Administrative Classified<ProfileDescription></ProfileDescription>III - Administrative Sensitive<ProfileDescription></ProfileDescription>