Sun Microsystems, Inc.  Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition
   Home | Current Systems | Former STK Products | EOL Systems | Components | General Info | Search | Feedback

Asset ID: 1-71-1461102.1
Update Date:2017-03-29
Keywords:

Solution Type  Technical Instruction Sure

Solution  1461102.1 :   STIG Implementation Script for Oracle Database Appliance  


Related Items
  • Oracle Database Appliance
  •  
  • Oracle Database Appliance Software
  •  
Related Categories
  • PLA-Support>Eng Systems>Exadata/ODA/SSC>Oracle Database Appliance>DB: ODA_EST
  •  
  • Proactive>Communications>Proactive.Communications
  •  


STIG -- (Security Technical Implementation Guidelines) script for the Oracle Database Appliance

Applies to:

Oracle Database Appliance - Version All Versions and later
Oracle Database Appliance Software - Version 2.2.0.0 and later
Linux x86-64

Goal

The Department of Defense(DoD) DISA Information Assurance Process includes Certification and Accreditation(C&A) including the Security Technical Implementation Guides(STIGs). These are guidelines and scripts that are run to advise on securing and locking down database, operating system, application servers, and other system components. Currently, DoD customers are running various Oracle products that go through the DoD C&A process including the STIG process. General STIG Information is available at: - http://iase.disa.mil/stigs/

The Oracle Database Appliance(ODA) is a fully integrated system of software, servers, storage, and networking in a single box that delivers high-availability database services. Oracle engineered Oracle Database Appliance for simplicity. Accordingly, Oracle aims to provide a more simplified configuration and patching process.

Because the DoD C&A STIG process requires vulnerability assessment and remediation, Oracle will make commercially reasonable efforts to work with the customer through the Oracle Support service request process to meet the DoD C&A STIG remediation requirement or to enable customers to make the necessary changes to the Oracle Database Appliance in order to do so, provided that the customer is officially supported by Oracle Database Appliance product development organization. If there is a problem with an Oracle Database Appliance patch due to the DoD C&A STIG Remediation then we ask customers to work with Oracle Support to determine the appropriate course of action to potentially rollback remediation steps, re-run the patch, and then re-apply DoD C&A STIG process and required remediation steps.

Please note that Oracle Database Appliance is an engineered system and is pre-configured for optimal usage. There are out-of-the-box configuration settings that may not be modified. For example, the Disk Group composition and configuration may not be altered beyond the recommended configurations. However, certain qualified and supported changes may be allowed after review. Oracle also allows various third party agents to run on the Oracle Database Appliance. These include, Anti-Virus software, HBSS software, SCAP Compliant agents, Retina Scan software etc.

Please note that if you are using the ODA-EM Plug-In, the root password must be welcome1 (default) during the discovery process. This is being reviewed.

For more information Please contact tammy.bednar@oracle.com

 

 

 

Solution

    • Download the latest STIG script>
      STIG script can be downloaded from the ATTACHMENT section to your Oracle Database Appliance and place it in the /opt/oracle/oak directory on each node. The script can be run on Bare Metal or the ODA Virtualized platform. On the ODA Virtualized Platform, the stig.py script must be run in ODA_BASE. You must run this script on both nodes of the Oracle Database Appliance to fix violations found on each server.
    • Supported OAK releases
      STIG script is supported on OAK release 2.2 and higher.    Hint: Use "oakcli show version" to check OAK version
    • Check the version of script to ensure it is the latest one available.
      /opt/oracle/oak/stig.py -version
      INFO: STIG Version is -> 12.1.2.10
    • Logging
      The output of all Checks and Fixes can be found /opt/oracle/oak/log/<HOSTNAME>/stig/stig.log. The log is appended to for each run of the check/fix/enable/disable commands. If you would like to have an individual log for each execution, then move the stig.log file to a new name. A new stig.log file will be created if it does not exist; otherwise the output is appended to the end. 

Features

      • Works on Oracle Database Appliance Bare Metal and Virtualized platform(Execution of the script from ODA_BASE only)
      • Works onX6-2 (all models), X5-2, X4-2, X3-2 & V1 platforms 

Usage 

      • Download the script and execute it as root. Sample usage scenarios are documented below
      • The script logs its actions in the "/opt/oracle/oak/log/<hostname>/stig/stig.log" file
      • The option -check is used to check the system for any violation of the guidelines
      • The option -force  is used to re-run the script even if there are no violations
      • The option -fix  is used to implement the guidelines
      • The enable and disable option can be used to enable or disable direct ssh logging as root. Direct ssh login as root is required for Patching and therefore before patching, the unlock needs to be executed.
      • Once a violation has been fixed, it cannot be automatically rolled back to a previous state.

Sample usage

#./stig.py -h    

Usage for STIG (Security Technical Implementation Guide):

------------------------------------------------------------------------------------------------------------------

STIG checks and corrects violations within Oracle Database Appliance

<First Parameter> : -h | -? | -help | -v | -V | -version | check | fix | enable | disable

<Second Parameter> : all | force | perm | conf | account | fs | access | grub | audit | rollback | restore_prev

Example : ./stig.py <First Parameter> <Second Parameter>

STIG script Parameter Information:
---------------------------------

-h : Provides information regarding STIG scripts

-v : Provides STIG script version information

enable : Enables direct ssh root login on the system

disable : Disables direct ssh root login on the system

check : Checks and lists the STIG violations on the system
check -h : Provides options help available with check

fix : Fixes or Corrects the STIG violations reported on the system
fix -h : Provides options help available with fix

------------------------------------------------------------------------------------------------------------------

More details on the parameters:

First Parameter

-h | -? | -help : Provides information regarding STIG scripts 

-v | -V | -version :  Version of the ODA STIG script

enable: Enables direct ssh root login on the system

disable: Disables direct ssh root login on the system

check: Checks and lists the STIG violations on the system

check -h: Provides options help available with check

fix: Fixes or Corrects the STIG violations reported on the system

fix -h  : Provides options help  available with fix

  

Second Parameter 

all : Check/Fix and informs the security vulnerability for all

perm    : Check/Fix and informs the security vulnerability for all permissions classification deployed 

conf    : Check/Fix and informs the security vulnerability for all configuration parameters classification deployed 

audit : Check/Fix and informs the security vulnerability for all auditing classifications deployed

account : Check/Fix and informs the security vulnerability for all accounts classification deployed

fs : Checks/Fix and informs the security vulnerability for all file systems classification deployed

grub    : Checks/Fix and informs the security vulnerability for enable/disable of grub password deployed

access : Checks/Fix and informs the security vulnerability for all access classifications deployed

force : Enables rerun of the script for security vulnerability fix for all classifications. This option must be exercised along with fix option only

rollback: Rollback of System files to ODA Imaged state prior to STIG script execution. This option must be exercised along with fix option only

restore_prev : Restore all previous system files state. This option must be exercised along with fix option only


 

./stig.py check all

 

INFO: Writing to STIG Log file /opt/oracle/oak/log/<hostname>/stig/stig.log 

INFO: Running STIG Script Version 12.1.2.10

INFO: Checking STIG Violations ........

 

2015-09-11-12:48:54  : [STIG ID : LNX00140]: [CHECK] : Password for grub not enabled [ LNX00140 ] 

2015-09-11-12:48:54  : [STIG ID : GEN000450]: [CHECK] : maxlogins parameter is not set to desired value [ GEN000450 ] 

2015-09-11-12:48:54  : [STIG ID : GEN004640]: [CHECK] : sendmail decode command is not commented in /etc/aliases [ GEN004640 ] 

2015-09-11-12:48:54  : [STIG ID : LNX00320]: [CHECK] : 'uucp' service is active [ LNX00320 ]

...
...

 

 


 

 

./stig.py fix audit

INFO: Writing to STIG Log file /opt/oracle/oak/log/<hostname>/stig/stig.log  

INFO: Running STIG Script Version 12.1.2.10

INFO: Fixing STIG Violations ........ 

 

2015-09-11-12:51:11  : [STIG ID : GEN000000-LNX00720]: [FIXED] : Enabling auditing at boot by setting the kernel parameter [ GEN000000-LNX00720 ]  SUCCESSFUL

Fix Violations completed : Fixed  STIG violations

 

 



Attachments
This solution has no attachment
  Copyright © 2018 Oracle, Inc.  All rights reserved.
 Feedback