![]() | Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition | ||
|
|
![]() |
||||||||||||
Solution Type Technical Instruction Sure Solution 1461102.1 : STIG Implementation Script for Oracle Database Appliance
STIG -- (Security Technical Implementation Guidelines) script for the Oracle Database Appliance Applies to:Oracle Database Appliance - Version All Versions and laterOracle Database Appliance Software - Version 2.2.0.0 and later Linux x86-64 GoalThe Department of Defense(DoD) DISA Information Assurance Process includes Certification and Accreditation(C&A) including the Security Technical Implementation Guides(STIGs). These are guidelines and scripts that are run to advise on securing and locking down database, operating system, application servers, and other system components. Currently, DoD customers are running various Oracle products that go through the DoD C&A process including the STIG process. General STIG Information is available at: - http://iase.disa.mil/stigs/ The Oracle Database Appliance(ODA) is a fully integrated system of software, servers, storage, and networking in a single box that delivers high-availability database services. Oracle engineered Oracle Database Appliance for simplicity. Accordingly, Oracle aims to provide a more simplified configuration and patching process. Because the DoD C&A STIG process requires vulnerability assessment and remediation, Oracle will make commercially reasonable efforts to work with the customer through the Oracle Support service request process to meet the DoD C&A STIG remediation requirement or to enable customers to make the necessary changes to the Oracle Database Appliance in order to do so, provided that the customer is officially supported by Oracle Database Appliance product development organization. If there is a problem with an Oracle Database Appliance patch due to the DoD C&A STIG Remediation then we ask customers to work with Oracle Support to determine the appropriate course of action to potentially rollback remediation steps, re-run the patch, and then re-apply DoD C&A STIG process and required remediation steps. Please note that Oracle Database Appliance is an engineered system and is pre-configured for optimal usage. There are out-of-the-box configuration settings that may not be modified. For example, the Disk Group composition and configuration may not be altered beyond the recommended configurations. However, certain qualified and supported changes may be allowed after review. Oracle also allows various third party agents to run on the Oracle Database Appliance. These include, Anti-Virus software, HBSS software, SCAP Compliant agents, Retina Scan software etc. Please note that if you are using the ODA-EM Plug-In, the root password must be welcome1 (default) during the discovery process. This is being reviewed. For more information Please contact tammy.bednar@oracle.com
Solution
Features
Usage
Sample usage#./stig.py -h Usage for STIG (Security Technical Implementation Guide): ------------------------------------------------------------------------------------------------------------------ STIG checks and corrects violations within Oracle Database Appliance <First Parameter> : -h | -? | -help | -v | -V | -version | check | fix | enable | disable <Second Parameter> : all | force | perm | conf | account | fs | access | grub | audit | rollback | restore_prev Example : ./stig.py <First Parameter> <Second Parameter> STIG script Parameter Information: -h : Provides information regarding STIG scripts -v : Provides STIG script version information enable : Enables direct ssh root login on the system disable : Disables direct ssh root login on the system check : Checks and lists the STIG violations on the system fix : Fixes or Corrects the STIG violations reported on the system ------------------------------------------------------------------------------------------------------------------ More details on the parameters: First Parameter -h | -? | -help : Provides information regarding STIG scripts -v | -V | -version : Version of the ODA STIG script enable: Enables direct ssh root login on the system disable: Disables direct ssh root login on the system check: Checks and lists the STIG violations on the system check -h: Provides options help available with check fix: Fixes or Corrects the STIG violations reported on the system fix -h : Provides options help available with fix
Second Parameter all : Check/Fix and informs the security vulnerability for all perm : Check/Fix and informs the security vulnerability for all permissions classification deployed conf : Check/Fix and informs the security vulnerability for all configuration parameters classification deployed audit : Check/Fix and informs the security vulnerability for all auditing classifications deployed account : Check/Fix and informs the security vulnerability for all accounts classification deployed fs : Checks/Fix and informs the security vulnerability for all file systems classification deployed grub : Checks/Fix and informs the security vulnerability for enable/disable of grub password deployed access : Checks/Fix and informs the security vulnerability for all access classifications deployed force : Enables rerun of the script for security vulnerability fix for all classifications. This option must be exercised along with fix option only rollback: Rollback of System files to ODA Imaged state prior to STIG script execution. This option must be exercised along with fix option only restore_prev : Restore all previous system files state. This option must be exercised along with fix option only
./stig.py check all
INFO: Writing to STIG Log file /opt/oracle/oak/log/<hostname>/stig/stig.log INFO: Running STIG Script Version 12.1.2.10 INFO: Checking STIG Violations ........
2015-09-11-12:48:54 : [STIG ID : LNX00140]: [CHECK] : Password for grub not enabled [ LNX00140 ] 2015-09-11-12:48:54 : [STIG ID : GEN000450]: [CHECK] : maxlogins parameter is not set to desired value [ GEN000450 ] 2015-09-11-12:48:54 : [STIG ID : GEN004640]: [CHECK] : sendmail decode command is not commented in /etc/aliases [ GEN004640 ] 2015-09-11-12:48:54 : [STIG ID : LNX00320]: [CHECK] : 'uucp' service is active [ LNX00320 ] ...
./stig.py fix audit INFO: Writing to STIG Log file /opt/oracle/oak/log/<hostname>/stig/stig.log INFO: Running STIG Script Version 12.1.2.10 INFO: Fixing STIG Violations ........
2015-09-11-12:51:11 : [STIG ID : GEN000000-LNX00720]: [FIXED] : Enabling auditing at boot by setting the kernel parameter [ GEN000000-LNX00720 ] SUCCESSFUL Fix Violations completed : Fixed STIG violations
Attachments This solution has no attachment |
||||||||||||
|