Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feature to override relevance check #1983

Open
nimbius opened this issue Jun 16, 2023 · 2 comments
Open

feature to override relevance check #1983

nimbius opened this issue Jun 16, 2023 · 2 comments
Labels
content Issues related to security content

Comments

@nimbius
Copy link

nimbius commented Jun 16, 2023

Description of Problem:

in the SCC Scanner developed by NIWC there is a feature to "override" relevance/applicability in the OVAL for a specific OS and just run the OVAL anyway. Can this feature be implemented in oscap?

@evgenyz
Copy link
Contributor

evgenyz commented Jun 16, 2023

The scanner itself does not define applicability of rules in XCCDF. The content itself contains all applicability checks, and easily amendable (one can either remove platforms conditions from rules, or change the OVALs on which these platforms are based). Usually it is only required to change the platform check of the Benchmark.

@evgenyz evgenyz added the content Issues related to security content label Jun 16, 2023
@nimbius
Copy link
Author

nimbius commented Jun 16, 2023

correct, but overrides are sometimes necessary and editing scap content is cumbersome (ive certainly done it.) A few conditions ive encountered where an override may be beneficial are embedded vendors that offer a repackaged Ubuntu or Redhat, or Redhat Enterprise Linux 9 which only has a draft stig. in the latter case its preferable to audit on the RHEL 8 baseline but harden to the draft OVAL during installation on kickstart.

hacking into the scaps also reduces confidence from the control assessor during ATO and worst case can lead to a ton of POAM work to justify why we deviate from the upstream on SIPRNet.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
content Issues related to security content
Projects
None yet
Development

No branches or pull requests

2 participants