On Mon, Apr 6, 2009 at 11:53 AM, Larry Ludwig <la...@reductivelabs.com> wrote:
>
> Hi Alessandro, great start!
>
> I personally would make these changes to your modules.

Well the two things I missed were: A documentation outlining all the
steps being done, and that this is more of a hardening document. It
can't bring a system to EAL3/4/x because the hardware and other parts
need to be evaluated in toto by some 'authority'.  If the Dell
Optiplex 360 is the evaluated model and I use the same configurations
on an IBM Xserver... the system is not EAL4. The hardware would
require evaluation and the software interfacing with it would require
stuff.

I don't want to come across as a nitpicker, but the difference is
important for people who really need EAL-X. A common problem I have
seen is that someone will find something listed as EAL4 and then
finding out when the auditors show up they didn't have what they
expected.  I don't know the best solution to this, but labeling things
as hardening guidelines to help meet CAPP is probably better (and then
a pointer to the document that showed what that meant and what a
person would need to do to know if they comply with
CAPP/LSPP/WXYZ/etc.

> - The hardening module I would break out each of these services into
> separate modules, so it's more generic.  The hardening class itself I
> would consider a 'role' that would then include all of these modules
> (I have roles exist in the manifest folder and called by site.pp)
> - your logindefs class I would consider part of a shadow module that
> then has your specific security policy
> - your modules are very centos/RH specific any plans on making them
> apply to other OSes?
> - If you are removing packages I would suggest by default installing
> the package and then creating an ::absent class to remove or
> a ::disable to stop the service but have the module installed.  This
> also then allows for keeping the package current via that module.

Ah so thats the best practice for that.

> I'm not really familiar with EAL4+ CAPP can you tell me more about
> this?  How is something certified EAL4+ CAPP, and can something be
> certified?

CAPP is outlined here
http://www.niap-ccevs.org/cc-scheme/pp/PP_OS_CA_V1.D.cfm The saying is
that CAPP is the new C2 (Orange book) from the old DoD security
guidelines. In reality CAPP is a basic set of configurations that can
be evaluated (eg checkmarked against a known checklist). The other
common ones people use are LSPP and RBAC which are also at the CC
scheme page.

My favorite quote about CAPP is:

The CAPP provides for a level of protection, which is appropriate for
an assumed non-hostile and well-managed user community requiring
protection against threats of inadvertent or casual attempts to breach
the system security. The profile is not intended to be applicable to
circumstances in which protection is required against determined
attempts by hostile and well-funded attackers to breach system
security. The CAPP does not fully address the threats posed by
malicious system development or administrative personnel.
CAPP-conformant products are suitable for use in both commercial and
government environments.

Which can be interpreted as don't put this box on the internet... but
really means that the various evaluations were meant for a physically
controlled network and may not work in other items. From the newer
niap listings, I would expect that they would consider this 'Basic
Robustness'.



-- 
Stephen J Smoogen. -- BSD/GNU/Linux
How far that little candle throws his beams! So shines a good deed
in a naughty world. = Shakespeare. "The Merchant of Venice"

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to