Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/simeononsecurity/oracle-jre-8-stig-script
Apply the JAVA STIG to a Windows System.
https://github.com/simeononsecurity/oracle-jre-8-stig-script
automation compliance java java-stig java-technotes jre jre8 oracle powershell stigs
Last synced: about 1 month ago
JSON representation
Apply the JAVA STIG to a Windows System.
- Host: GitHub
- URL: https://github.com/simeononsecurity/oracle-jre-8-stig-script
- Owner: simeononsecurity
- License: mit
- Created: 2020-08-06T02:11:42.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2024-07-26T23:05:17.000Z (5 months ago)
- Last Synced: 2024-08-03T23:17:58.623Z (5 months ago)
- Topics: automation, compliance, java, java-stig, java-technotes, jre, jre8, oracle, powershell, stigs
- Language: PowerShell
- Homepage: https://simeononsecurity.com/guides/enhance-oracle-jre-8-security
- Size: 56.6 KB
- Stars: 3
- Watchers: 2
- Forks: 2
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# Automate Oracle JRE 8 (JAVA) STIGS
[![Sponsor](https://img.shields.io/badge/Sponsor-Click%20Here-ff69b4)](https://github.com/sponsors/simeononsecurity) [![VirusTotal Scan](https://github.com/simeononsecurity/Oracle-JRE-8-STIG-Script/actions/workflows/virustotal.yml/badge.svg)](https://github.com/simeononsecurity/Oracle-JRE-8-STIG-Script/actions/workflows/virustotal.yml)
The following script is an automation process for installing Java deployment configurations using PowerShell. The script first elevates the privileges of the current process and sets the directory to the location of the script. It then checks if the "deployment.config" file is present in the default JRE installation directory and the Windows directory. If not, the script installs the "deployment.config" file in the Windows directory, and checks for the "deployment.properties" and "exception.sites" files. If these files are not present, the script installs them in the Windows directory. The status of the installations is displayed with appropriate messages.
## Notes:
This will bring you to 100% compliance on the applicable STIG and might break your JAVA applications. As with any STIG, testing should be done before a full roleout.
## Ansible:
We now offer a playbook collection for this script. Please see the following:
- [Github Repo](https://github.com/simeononsecurity/Windows_STIG_Ansible)
- [Ansible Galaxy](https://galaxy.ansible.com/simeononsecurity/windows_stigs)## STIGS/SRGs Applied:
- [Oracle JRE 8 V1R5](https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_JRE_8_Windows_V1R5_STIG.zip)
## Sources:
- [MyITGuy - deployment.properties](https://gist.github.com/MyITGuy/9628895)
- [cbu.edu - Java Technotes](http://stu.cbu.edu/java/docs/technotes/guides/deploy/properties.html)
- [Oracle - Java Technotes](https://docs.oracle.com/javase/7/docs/technotes/guides/jweb/security/exception_site_list.html)
## Download the files:
Download the required files from the [GitHub Repository](https://github.com/simeononsecurity/JAVA-STIG-Script)
## How to run the script:
**The script may be lauched from the extracted GitHub download like this:**
```
.\sos-install-java-config.ps1
```
Explore the World of Cybersecurity
### Links:
- #### [github.com/simeononsecurity](https://github.com/simeononsecurity)
- #### [simeononsecurity.ch](https://simeononsecurity.ch)