Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mitre/google-chrome-stig-hardening
(WIP) Ansible role for the Google Chrome Windows Security Technical Implementation Guide
https://github.com/mitre/google-chrome-stig-hardening
ansible lockheed-martin mitre-corporation mitre-saf
Last synced: 10 days ago
JSON representation
(WIP) Ansible role for the Google Chrome Windows Security Technical Implementation Guide
- Host: GitHub
- URL: https://github.com/mitre/google-chrome-stig-hardening
- Owner: mitre
- License: other
- Created: 2022-06-29T18:42:26.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2022-10-04T18:07:21.000Z (about 2 years ago)
- Last Synced: 2024-04-14T19:41:20.148Z (7 months ago)
- Topics: ansible, lockheed-martin, mitre-corporation, mitre-saf
- Homepage:
- Size: 17.6 KB
- Stars: 3
- Watchers: 8
- Forks: 3
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
README
# google-chrome-stig-hardening
(WIP) Ansible role for the Google Chrome Windows Security Technical Implementation GuideSource Benchmark: [Google Chrome STIG - Ver 2, Rel 6](https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Google_Chrome_V2R6_STIG.zip).
Updating
--------Coming from a previous release.
As with all releases and updates, It is suggested to test and align controls.
This contains rewrites and ID reference changes as per STIG documentation.More information can be found in the [ChangeLog](./ChangeLog.md)
Auditing (new)
--------------This can be turned on or off within the defaults/main.yml file with the variable rhel7stig_run_audit. The value is false by default, please refer to the wiki for more details.
This is a much quicker, very lightweight, checking (where possible) config compliance and live/running settings.
A new form of auditing has been developed, by using a small (12MB) go binary called [goss](https://github.com/aelsabbahy/goss) along with the relevant configurations to check. Without the need for infrastructure or other tooling.
This audit will not only check the config has the correct setting but aims to capture if it is running with that configuration also trying to remove [false positives](https://www.mindpointgroup.com/blog/is-compliance-scanning-still-relevant/) in the process.Requirements
------------- Windows
- Google Chrome
- Access to download or add the goss binary and content to the system if using auditing. options are available on how to get the content to the system.**General:**
- Basic knowledge of Ansible, below are some links to the Ansible documentation to help get started if you are unfamiliar with Ansible
- [Main Ansible documentation page](https://docs.ansible.com)
- [Ansible Getting Started](https://docs.ansible.com/ansible/latest/user_guide/intro_getting_started.html)
- [Tower User Guide](https://docs.ansible.com/ansible-tower/latest/html/userguide/index.html)
- [Ansible Community Info](https://docs.ansible.com/ansible/latest/community/index.html)
- Functioning Ansible and/or Tower Installed, configured, and running. This includes all of the base Ansible/Tower configurations, needed packages installed, and infrastructure setup.
- Please read through the tasks in this role to gain an understanding of what each control is doing. Some of the tasks are disruptive and can have unintended consequences in a live production system. Also familiarize yourself with the variables in the defaults/main.yml file or the [Main Variables Wiki Page](https://github.com/ansible-lockdown/RHEL7-STIG/wiki/Main-Variables).
- While check_mode may work, This is not supported.Documentation
-------------- [Repo GitHub Page](https://ansible-lockdown.github.io/RHEL7-STIG/)
- [Getting Started](https://www.lockdownenterprise.com/docs/getting-started-with-lockdown)
- [Customizing Roles](https://www.lockdownenterprise.com/docs/customizing-lockdown-enterprise)
- [Per-Host Configuration](https://www.lockdownenterprise.com/docs/per-host-lockdown-enterprise-configuration)
- [Getting the Most Out of the Role](https://www.lockdownenterprise.com/docs/get-the-most-out-of-lockdown-enterprise)
- [Wiki](https://github.com/ansible-lockdown/RHEL7-STIG/wiki)Dependencies
------------- Python3 (preferred)
- Ansible 2.9+Ansible is set to run in a python3 environment.
Dependencies required for the playbook are installed on the endpoint if required.
Role Variables
--------------This role is designed that the end user should not have to edit the tasks themselves. All customizing should be done via the defaults/main.yml file or with extra vars within the project, job, workflow, etc. These variables can be found [here](https://github.com/ansible-lockdown/RHEL7-STIG/wiki/Main-Variables) in the Main Variables Wiki page. All variables are listed there along with descriptions.
Tags
----There are many tags available for added control precision. Each control has it's own set of tags noting the control number as well as what parts of the system that control addresses.
Below is an example of the tag section from a control within this role. Using this example if you set your run to skip all controls with the tag ssh, this task will be skipped. The
opposite can also happen where you run only controls tagged with ssh.```sh
tags:
- cat2
- medium
- V-221558
- audit
```Example Audit Summary
---------------------This is based on a vagrant image with selections enabled. e.g. No Gui or firewall.
Note: More tests are run during audit as we check config and running state.```sh
...
```Branches
-------- **devel** - This is the default branch and the working development branch. Community pull requests will pull into this branch
- **main** - This is the release branch
- **reports** - This is a protected branch for our scoring reports, no code should ever go here
- **gh_pages** - github pages
- **all other branches** - Individual community member branchesCommunity Contribution
----------------------We encourage you (the community) to contribute to this role. Please read the rules below.
- Your work is done in your own individual branch. Make sure to Signed-off and GPG sign all commits you intend to merge.
- All community Pull Requests are pulled into the devel branch
- Pull Requests into devel will confirm your commits have a GPG signature, Signed-off, and a functional test before being approved
- Once your changes are merged and a more detailed review is complete, an authorized member will merge your changes into the main branch for a new release.### NOTICE
© 2018-2022 The MITRE Corporation.
Approved for Public Release; Distribution Unlimited. Case Number 18-3678.
### NOTICE
MITRE hereby grants express written permission to use, reproduce, distribute, modify, and otherwise leverage this software to the extent permitted by the licensed terms provided in the LICENSE.md file included with this project.
### NOTICE
This software was produced for the U. S. Government under Contract Number HHSM-500-2012-00008I, and is subject to Federal Acquisition Regulation Clause 52.227-14, Rights in Data-General.
No other use other than that granted to the U. S. Government, or to those acting on behalf of the U. S. Government under that Clause is authorized without the express written permission of The MITRE Corporation.
For further information, please contact The MITRE Corporation, Contracts Management Office, 7515 Colshire Drive, McLean, VA 22102-7539, (703) 983-6000.
### NOTICE
DISA STIGs are published by DISA IASE, see: https://iase.disa.mil/Pages/privacy_policy.aspx