Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

 

Table of Contents
outlinetrue

...

  • Releases typically occur every 6 months.
  • A release will use the last TSC approved security requirements that were approved at least 6 month prior to the release.
  • Exceptions must be submitted a minimum of 21 days prior to release
  • Note: Critical vulnerabilities/security items, as categorized by the Akraino Security Sub-Committee, must be fixed even if found inside lock out window.

Image Removed

Maturity Review:  Security Requirements Criteria

...


...

Release 4 (Target Date November 30, 2020) Incubation Requirements:

  • Vuls PASS/FAIL Criteria, v1.0
  • Lynis PASS/FAIL Criteria, v1.0
  • Kube-Hunter PASS/FAIL Criteria, v1.0
Month6/20207/20208/20209/202010/202011/202012/20201/2021
Release




Rel. 4

Security Requirement

Update

v. 1.0






Minimum Security

Requirement






v. 1.0

Maximum Security

Requirement






v. 1.0




Release 4 Minimum Security Requirement

Lock Out Window





Image Added

Maturity Review:  Security Requirements Criteria

  • Exception granted in cases of non-applicability.
  • Exception granted in cases where another security mechanism specified in the blueprint and implemented mitigates the risk.
  • Exceptions requested for cases above must be approved by the security sub-committee.
  • Exceptions require a maximum of 21 days to review.
  • The formal email date received, requesting a maturity review would be the Maturity Request date and this would define the set of security requirements that apply.
  • Note: Critical vulnerabilities/security items, as categorized by the Akraino Security Sub-Committee, must be fixed even if found inside lock out window.


Current Maturity Requirements:

  • Vuls PASS/FAIL Criteria, v1.0
  • Lynis PASS/FAIL Criteria, v1.0
  • Kube-Hunter PASS/FAIL Criteria, v1.0
Month6/20207/20208/20209/202010/202011/202012/20201/2021
Maturity Request







Security Requirement

Update

v. 1.0






Minimum Security

Requirement


v. 1.0v. 1.0v. 1.0v. 1.0v. 1.0v. 1.0

Maximum Security

Requirement


v. 1.0v. 1.0v. 1.0v. 1.0v. 1.0v. 1.0



Release 4 Minimum Security Requirement

Lock Out Window




Vuls

Vuls will be integrated with Blueprint Validation Framework (Bluval User Guide)

...

  • Install go-cve-dictionary, run "docker pull vuls/go-cve-dictionary"
  • Install goval-dictionary, run "docker pull vuls/goval-dictionary"
  • Install gost, run "docker pull vuls/gost"
  • Install vuls, run "docker pull vuls/vuls"

...

Detailed instruction can be found at https://vuls.io/docs/en/tutorial-docker.html

  • Prepare log dir

$ cd /path/to/working/dir

$ mkdir go-cve-dictionary-log goval-dictionary-log gost-log

  • Fetch NVD

$ for i in `seq 2002 $(date +"%Y")`; do \ docker run --rm -it \ -v $PWD:/vuls \ -v $PWD/go-cve-dictionary-log:/var/log/vuls \ vuls/go-cve-dictionary fetchnvd -years $i; \ done

  • Fetch OVAL
    • if you are using redhat/fedora

$ docker run --rm -it \ -v $PWD:/vuls \ -v $PWD/goval-dictionary-log:/var/log/vuls \ vuls/goval-dictionary fetch-redhat 5 6 7 8

if you are using ubuntu/debian

docker run --rm -it \ -v $PWD:/vuls \ -v $PWD/goval-dictionary-log:/var/log/vuls \ vuls/goval-dictionary fetch-ubuntu 16 17 18 19

  • Fetch gost

$ docker run --rm -i \ -v $PWD:/vuls \ -v $PWD/goval-log:/var/log/gost \ vuls/gost fetch redhat

Or 

docker run --rm -i \ -v $PWD:/vuls \ -v $PWD/goval-log:/var/log/gost \ vuls/gost fetch ubuntu

  • Config the SUT, configuration will be stored in config.toml
    • SSH key generation & distribution: As Vuls connects to target server through SSH, and Vuls has to use SSH key-based authentication. There needs to be a way to generate SSH key pair, save the private key for Vuls container and dispatch the public key to target server. We probably don’t want to store the private key with the container image if the container image is public accessible.

[servers]

[servers.c74]

host = "54.249.93.16"

port = "22"

user = "vuls-user"

keyPath = "/root/.ssh/id_rsa" # path to ssh private key in docker

...

After running, detailed test logs are stored in  /var/log/lynis.log, information for each test includes:

  • Time of an action/event
  • Reason(s) why a test failed or was skipped
  • Output of (internal) tests
  • Suggestions about configuration options or how to fix/improve things
  • Threat/impact score

In addition to log file, Lynis also creates a report and stores it in /var/log/lynis-report.dat. The report file contains the following information:

  • Remarks = #<remark>
  • Section = [<section name>]
  • Option/value = <option name>=<value of option>

...