-
Notifications
You must be signed in to change notification settings - Fork 765
Update CIS profiles to use control files #10833
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
/test |
|
@rhmdnd: The
Use
DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/test e2e-aws-ocp4-cis |
|
/test e2e-aws-ocp4-cis |
|
/test e2e-aws-ocp4-cis |
|
The OpenShift tests should work a bit better once #10841 lands |
57e8108 to
df639c0
Compare
|
Rebased to pick up the YAML fix in section 5. |
|
/test e2e-aws-ocp4-cis |
|
@rhmdnd can you rebase? |
|
/test e2e-aws-ocp4-cis |
|
The CIS tests are failing because we don't have any filtering in place for the node versus platform rules. Working on that now. |
|
/test e2e-aws-ocp4-cis |
|
/test e2e-aws-ocp4-cis |
|
Filtering worked for the CIS profile. Adding in filtering for the node profile now. |
|
/test e2e-aws-ocp4-cis |
|
cc: @xiaojiey for awareness that these changes are coming to the CIS profile for the next Compliance Operator release. |
|
OCP4 CIS testing passed. cc @jhrozek @Vincent056 @yuumasato |
Got it. Thanks for the notification. Does it mean cis 1.4.0 is available? |
|
@xiaojiey: The label(s) `/label qe-
DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Mostly. We've ported the existing rules and did some changes, but not all. We need to make a second pass to sync the upstream benchmark that we worked on with CIS to the rules, but I don't think there will be many changes. Some parts of CIS are not implementable with CIS yet (some permission issues) outside 4.14+. But for now this is mostly a different way of building the profile and the references should point to the right controls and sections in upstream CIS. |
|
It appears that we have either missed some rules or maybe these rules were deprecated: I'll check them out and send PRs for the obvious cases. We can discuss the rest. |
|
I think we can skip these rules: |
|
These were also removed: |
|
In this patch, please explicitly set the audit policy to WriteRequestBodies like we do e.g. in the STIG profile: https://github.com/ComplianceAsCode/content/blob/master/products/ocp4/profiles/stig.profile#L28 |
|
I will send some minor patches in a separate PR. |
jhrozek
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The audit policy needs to be set.
7041bac to
57cb3e0
Compare
It was set in a previous patch, but it wasn't commented under f7eeac7 (see line 34) |
|
/test e2e-aws-ocp4-cis |
Remove all the original rules and mappings we had for CIS version 1.1 and instead rely on the control files for CIS OpenShift 1.4.0 that we recently implemented.
|
/test e2e-aws-ocp4-cis |
|
Code Climate has analyzed commit 632d332 and detected 0 issues on this pull request. The test coverage on the diff in this pull request is 100.0% (50% is the threshold). This pull request will bring the total coverage in the repository to 53.2% (0.0% change). View more on Code Climate. |
jhrozek
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
Remove all the original rules and mappings we had for CIS version 1.1
and instead rely on the control files for CIS OpenShift 1.4.0 that we
recently implemented.