From 4503960b583ea5b868dd00a4bb004bf43f5fff33 Mon Sep 17 00:00:00 2001 From: svet-se Date: Tue, 6 Aug 2024 10:19:28 +0300 Subject: [PATCH 1/6] Update SLE15 STIG to V2R1 --- products/sle15/profiles/stig.profile | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/products/sle15/profiles/stig.profile b/products/sle15/profiles/stig.profile index 700a04ab618..bedac2bf248 100644 --- a/products/sle15/profiles/stig.profile +++ b/products/sle15/profiles/stig.profile @@ -1,7 +1,7 @@ documentation_complete: true metadata: - version: V1R13 + version: V2R1 SMEs: - abergmann @@ -11,7 +11,7 @@ title: 'DISA STIG for SUSE Linux Enterprise 15' description: |- This profile contains configuration checks that align to the - DISA STIG for SUSE Linux Enterprise 15 V1R13. + DISA STIG for SUSE Linux Enterprise 15 V2R1. selections: From b032df0fded4f82abce26c4b369de8fbcde9d2e8 Mon Sep 17 00:00:00 2001 From: svet-se Date: Tue, 6 Aug 2024 10:22:50 +0300 Subject: [PATCH 2/6] Update DISA STIG manual for SLE15 V2R1 --- ... => disa-stig-sle15-v2r1-xccdf-manual.xml} | 580 +++++++++--------- 1 file changed, 273 insertions(+), 307 deletions(-) rename shared/references/{disa-stig-sle15-v1r13-xccdf-manual.xml => disa-stig-sle15-v2r1-xccdf-manual.xml} (84%) diff --git a/shared/references/disa-stig-sle15-v1r13-xccdf-manual.xml b/shared/references/disa-stig-sle15-v2r1-xccdf-manual.xml similarity index 84% rename from shared/references/disa-stig-sle15-v1r13-xccdf-manual.xml rename to shared/references/disa-stig-sle15-v2r1-xccdf-manual.xml index cff8edd9725..21787df0faf 100644 --- a/shared/references/disa-stig-sle15-v1r13-xccdf-manual.xml +++ b/shared/references/disa-stig-sle15-v2r1-xccdf-manual.xml @@ -1,4 +1,4 @@ -acceptedSUSE Linux Enterprise Server 15 Security Technical Implementation GuideThis Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.DISASTIG.DOD.MILRelease: 13 Benchmark Date: 24 Apr 20243.4.1.229161.10.01I - Mission Critical Classified<ProfileDescription></ProfileDescription>I - Mission Critical Public<ProfileDescription></ProfileDescription>I - Mission Critical Sensitive<ProfileDescription></ProfileDescription>II - Mission Support Classified<ProfileDescription></ProfileDescription>II - Mission Support Public<ProfileDescription></ProfileDescription>II - Mission Support Sensitive<ProfileDescription></ProfileDescription>III - Administrative Classified<ProfileDescription></ProfileDescription>III - Administrative Public<ProfileDescription></ProfileDescription>III - Administrative Sensitive<ProfileDescription></ProfileDescription>SRG-OS-000480-GPOS-00227<GroupDescription></GroupDescription>SLES-15-010000The SUSE operating system must be a vendor-supported release.<VulnDiscussion>A SUSE operating system release is considered "supported" if the vendor continues to provide security patches for the product. With an unsupported release, it will not be possible to resolve security issues discovered in the system software.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target SUSE Linux Enterprise Server 15DISADPMS TargetSUSE Linux Enterprise Server 155274CCI-001230Upgrade the SUSE operating system to a version supported by the vendor. If the system is not registered with the SUSE Customer Center, register the system against the correct subscription. +acceptedSUSE Linux Enterprise Server 15 Security Technical Implementation GuideThis Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.DISASTIG.DOD.MILRelease: 1 Benchmark Date: 24 Jul 20243.51.10.02I - Mission Critical Classified<ProfileDescription></ProfileDescription>I - Mission Critical Sensitive<ProfileDescription></ProfileDescription>II - Mission Support Public<ProfileDescription></ProfileDescription>III - Administrative Classified<ProfileDescription></ProfileDescription>III - Administrative Sensitive<ProfileDescription></ProfileDescription>