HYCU Protege Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Supporting documents 4 PDFs
Bundled by DISA alongside this STIG release: overview, revision history, and readme files. Download the full archive or open an individual PDF.
- RMF Control
- Severity
- M
- CCI
- CCI-004922
- Version
- HYCU-ND-000440
- Vuln IDs
-
- V-268216
- Rule IDs
-
- SV-268216r1038348_rule
Checks: C-72237r1038346_chk
Verify the "chronyd" service is up and running, execute the following command: systemctl status chronyd If service is not active (running), this is a finding. To verify chronyd has synced time and can reach the servers execute the following command: chronyc sources If there are not two NTP servers listed, this is a finding. If the "Reach" value is lower than "377" for the source with S column marked with "*" this is a finding.
Fix: F-72140r1038347_fix
Start the time synchronization by logging on to the HYCU console and executing the following command: sudo systemctl restart chronyd Additional assistance can be found at: https://support.hycu.com/hc/en-us/articles/115005424345-HYCU-system-time
- RMF Control
- Severity
- M
- CCI
- CCI-004061
- Version
- HYCU-ND-000600
- Vuln IDs
-
- V-268217
- Rule IDs
-
- SV-268217r1038727_rule
Checks: C-72238r1038725_chk
Log in to the HYCU VM console with the default vendor credentials. If the login to the console is successful with the default credentials, this is a finding. Log in to the HYCU Web UI with the default vendor credentials. If the login to the HYCU Web UI is successful with the default credentials, this is a finding.
Fix: F-72141r1038726_fix
Log in to the HYCU VM console with the default username and password. Run the passwd command to change the default password. Log in to the HYCU Web UI with the default password and change the password by selecting the "Admin" account in the upper-right corner and changing the password. This logs off the admin account and prompts the user to log in with the updated credentials.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- HYCU-ND-000010
- Vuln IDs
-
- V-268219
- Rule IDs
-
- SV-268219r1038638_rule
Checks: C-72240r1038637_chk
In the HYCU Web UI, only one login can be used at a time. If the user is still logged into the HYCU Web UI upon logging in to the Web UI again, in a different browser tab, with the same credentials, this is a finding. Log in to the HYCU VM console. To check the number of allowed concurrent session connections, grep file "/etc/security/limits.conf" by executing the following command: grep maxlogins /etc/security/limits.conf Verify the following line exists: hycu hard maxlogins 1 If the "maxlogins" value is not set to 1 or is missing, this is a finding.
Fix: F-72143r1038356_fix
The Web UI will only always allow one user session at a time. For CLI, configure the operating system to limit the max number of concurrent sessions to 1 by adding the following line to "/etc/security/limits.conf": hycu hard maxlogins 1
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- HYCU-ND-000040
- Vuln IDs
-
- V-268222
- Rule IDs
-
- SV-268222r1038366_rule
Checks: C-72243r1038364_chk
Review the Self-Service menu within HYCU to view accounts and user roles (Administrator, Backup Operator, Restore Operator, Backup and Restore Operator, or Viewer). User roles have a predefined and nonchangeable set of user privileges. To check exact set of privileges of each user, navigate to Self-Service context in the HYCU UI. Click on the question mark in the upper-right corner, followed by "Help with This Page". Scroll down to the "User Roles" section. If users can perform more functions than those specified for their role, this is a finding.
Fix: F-72146r1038365_fix
Apply the appropriate user role to the required user from one of the predefined and nonchangeable roles: Administrator, Backup Operator, Restore Operator, Backup and Restore Operator, or Viewer.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002169
- Version
- HYCU-ND-000050
- Vuln IDs
-
- V-268223
- Rule IDs
-
- SV-268223r1038369_rule
Checks: C-72244r1038367_chk
HYCU offers the capability to leverage RBAC controls within the Web UI's Self-Service menu. The organization would need to generate and document its own specific requirements around using RBAC in HYCU. For the HYCU VM console, administrators should only allow access to anyone else deemed to be qualified as a server administrator for the system. Review the groups and accounts within Web UI's Self-Service menu. If any RBAC setting does not meet the organization's guidelines, this is a finding.
Fix: F-72147r1038368_fix
Ensure the correct RBAC controls and access are applied properly within the HYCU Web UI's Self-Service menu. Avoid granting too much access to any particular user or group. For the HYCU VM console, administrators should only allow access to anyone else deemed to be qualified as a server administrator for the system. To check for any unauthorized users, run the following command within the HYCU Web console: cat /etc/passwd Use the "userdel" command to remove any unauthorized users.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- HYCU-ND-000070
- Vuln IDs
-
- V-268225
- Rule IDs
-
- SV-268225r1038375_rule
Checks: C-72246r1038373_chk
Verify the firewall is running by executing the following command: sudo firewall-cmd --state If service is not running, this is a finding. Determine which services and ports are open by executing the following command: sudo firewall-cmd --list-all Output should show the following two lines: 'services: cockpit dhcpv6-client iscsi-target samba ssh' 'ports: 8443/tcp' If more services than those listed above are open, this is a finding.
Fix: F-72149r1038374_fix
Enable the firewall by executing the following commands: sudo systemctl enable firewalld sudo systemctl start firewalld
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- HYCU-ND-000080
- Vuln IDs
-
- V-268226
- Rule IDs
-
- SV-268226r1038378_rule
Checks: C-72247r1038376_chk
Check the contents of the "/var/log/audit/audit.log" file. HYCU also maintains Event (Audit) information in the HYCU Web UI Events menu. Verify the audit log contains records showing when the execution of privileged functions occurred. If the audit log is not configured or does not have the required contents, this is a finding.
Fix: F-72150r1038377_fix
Configure HYCU to audit the execution of the "execve" system call. Add or update the following file system rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k execpriv Reboot the appliance to take effect.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- HYCU-ND-000090
- Vuln IDs
-
- V-268227
- Rule IDs
-
- SV-268227r1038750_rule
Checks: C-72248r1038639_chk
Log in to the HYCU VM console and go to the "/etc/pam.d/" folder. Verify that "password-auth" and "system-auth" contain the following three lines, and the values for deny and unlock_time are as shown. Commands: sudo grep pam_faillock.so /etc/pam.d/password-auth sudo grep pam_faillock.so /etc/pam.d/system-auth Both should displays the following three lines: auth required pam_faillock.so preauth silent audit deny=3 even_deny_root fail_interval=60 unlock_time=900 auth required pam_faillock.so authfail audit unlock_time=900 account required pam_faillock.so If the required content is not present, this is a finding.
Fix: F-72151r1038749_fix
Log in to the server virtual console and navigate to the "/etc/pam.d/" folder. Move the current configuration and make new copies to be edited by executing the following commands: sudo cp password-auth password-auth-as sudo cp system-auth system-auth-as Edit the files "password-auth" and "system-auth". Add the lines: auth required pam_faillock.so preauth silent audit deny=3 even_deny_root fail_interval=60 unlock_time=900 after line auth required pam_env.so Add: auth required pam_faillock.so authfail audit unlock_time=900 after auth sufficient pam_unix.so nullok Add: account required pam_faillock.so before account required pam_unix.so The files "system-auth" and "password-auth" are identical, so the procedure can be done on one of the files and copied to the second one. Restart sssd service: sudo systemctl restart sssd.service
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- HYCU-ND-000100
- Vuln IDs
-
- V-268228
- Rule IDs
-
- SV-268228r1038752_rule
Checks: C-72249r1038641_chk
Log in to the HYCU VM console and verify the banner setting is in use in the "/etc/ssh/sshd_config" file by executing the following command: grep Banner /etc/ssh/sshd_config If the banner is not set to "/etc/issue", this is a finding. Verify "/etc/issue" contains valid DOD notice text by executing the following command: sudo cat /etc/issue If the DOD notice is not present in the "/etc/issue" file, this is a finding. Open the HYCU Web UI login page and verify the mandatory notice is present on the welcome page. If the mandatory notice is not present at the HYCU Web UI welcome page, this is a finding.
Fix: F-72152r1038751_fix
The GUI login page welcome message and look of the console/ssh login can be changed by following the procedure below: 1. Open a remote session to the HYCU backup controller: ssh hycu@<HYCUBackupControllerIPAddress> 2. Create the /hycudata/var/branding folder by executing: sudo mkdir -p /hycudata/var/branding 3. Make the following files available in /hycudata/var/branding: loginImage.PNG/ JPG - Login screen background (1574?×?1920) console.txt - Pre-login banner for text-based console sshd.txt - Pre-login banner for SSH access 3. Update the branding configuration by running the following command: sudo /opt/grizzly/bin/hycu-branding.sh 4. Perform a hard reload of the HYCU Web UI page in the web browser.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- HYCU-ND-000110
- Vuln IDs
-
- V-268229
- Rule IDs
-
- SV-268229r1038748_rule
Checks: C-72250r1038644_chk
Log in to the HYCU VM console and verify the banner setting is in use in the "/etc/ssh/sshd_config" file by executing the following command: grep Banner /etc/ssh/sshd_config If the banner is not set to "/etc/issue", this is a finding. Verify "/etc/issue" contains valid DOD notice text by executing the following command: sudo cat /etc/issue If DOD Notice is not present in the "/etc/issue" file, this is a finding. Open the HYCU Web UI login page and verify the mandatory notice is present on the Welcome page. If the mandatory notice is not present at HYCU Web UI Welcome page, this is a finding.
Fix: F-72153r1038748_fix
Change the GUI login page welcome message and look of the console/ssh login by following the procedure below: 1. Open a remote session to the HYCU backup controller: ssh hycu@<HYCUBackupControllerIPAddress> 2. Create the /hycudata/var/branding folder by executing: sudo mkdir -p /hycudata/var/branding 3. Make the following files available in /hycudata/var/branding: loginImage.PNG/ JPG - Login screen background (1920 x 1440) console.txt - Pre-login banner for text-based console sshd.txt - Pre-login banner for SSH access 4. Update the branding configuration by running the following command: sudo /opt/grizzly/bin/hycu-branding.sh 5. Perform a hard reload of the HYCU Web UI page in the web browser.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- HYCU-ND-000130
- Vuln IDs
-
- V-268231
- Rule IDs
-
- SV-268231r1038648_rule
Checks: C-72252r1038391_chk
Verify the operating system must generate audit records for all account creations events. Check the auditing rules in "/etc/audit/audit.rules" with the following command: # grep -E "/etc/passwd|/etc/gshadow|/etc/shadow|/etc/security/opasswd|/etc/group|/etc/sudoers|/etc/sudoers.d/" /etc/audit/audit.rules -w /etc/passwd -p wa -k identity -w /etc/gshadow -p wa -k identity -w /etc/shadow -p wa -k identity -w /etc/security/opasswd -p wa -k identity -w /etc/group -p wa -k identity -w /etc/sudoers -p wa -k identity -w /etc/sudoers.d/ -p wa -k identity If the command does not return all the lines above, or one or more of the lines are commented out, this is a finding.
Fix: F-72155r1038647_fix
Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- HYCU-ND-000140
- Vuln IDs
-
- V-268232
- Rule IDs
-
- SV-268232r1038650_rule
Checks: C-72253r1038394_chk
Verify the operating system must generate audit records for all account modification events. Check the auditing rules in "/etc/audit/audit.rules" with the following command: # grep -E "/etc/passwd|/etc/gshadow|/etc/shadow|/etc/security/opasswd|/etc/group|/etc/sudoers|/etc/sudoers.d/" /etc/audit/audit.rules -w /etc/passwd -p wa -k identity -w /etc/gshadow -p wa -k identity -w /etc/shadow -p wa -k identity -w /etc/security/opasswd -p wa -k identity -w /etc/group -p wa -k identity -w /etc/sudoers -p wa -k identity -w /etc/sudoers.d/ -p wa -k identity If the command does not return all the lines above, or one or more of the lines are commented out, this is a finding.
Fix: F-72156r1038649_fix
Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- HYCU-ND-000150
- Vuln IDs
-
- V-268233
- Rule IDs
-
- SV-268233r1038652_rule
Checks: C-72254r1038397_chk
Verify the operating system must generate audit records for all account disabling events. Check the auditing rules in "/etc/audit/audit.rules" with the following command: # grep -E "/etc/passwd|/etc/gshadow|/etc/shadow|/etc/security/opasswd|/etc/group|/etc/sudoers|/etc/sudoers.d/" /etc/audit/audit.rules -w /etc/passwd -p wa -k identity -w /etc/gshadow -p wa -k identity -w /etc/shadow -p wa -k identity -w /etc/security/opasswd -p wa -k identity -w /etc/group -p wa -k identity -w /etc/sudoers -p wa -k identity -w /etc/sudoers.d/ -p wa -k identity If the command does not return all the lines above, or one or more of the lines are commented out, this is a finding.
Fix: F-72157r1038651_fix
Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- HYCU-ND-000160
- Vuln IDs
-
- V-268234
- Rule IDs
-
- SV-268234r1038654_rule
Checks: C-72255r1038400_chk
Verify the operating system generates audit records for all account removal events. Check the auditing rules in "/etc/audit/audit.rules" with the following command: # grep -E "/etc/passwd|/etc/gshadow|/etc/shadow|/etc/security/opasswd|/etc/group|/etc/sudoers|/etc/sudoers.d/" /etc/audit/audit.rules -w /etc/passwd -p wa -k identity -w /etc/gshadow -p wa -k identity -w /etc/shadow -p wa -k identity -w /etc/security/opasswd -p wa -k identity -w /etc/group -p wa -k identity -w /etc/sudoers -p wa -k identity -w /etc/sudoers.d/ -p wa -k identity If the command does not return all the lines above, or one or more of the lines are commented out, this is a finding.
Fix: F-72158r1038653_fix
Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000185
- Version
- HYCU-ND-000180
- Vuln IDs
-
- V-268235
- Rule IDs
-
- SV-268235r1038742_rule
Checks: C-72256r1038655_chk
Log in to the HYCU console and execute the following command: sudo cat /opt/grizzly/config.properties | grep cert.path.revocation.checking.enabled=true If the variable is not set to true, this is a finding.
Fix: F-72159r1038404_fix
OCSP revocation applies to all SSL communication done from HYCU Java application, including SMTP in SSL mode, LDAPS, and any HTTPS interaction (platform API servers, cloud targets, webhooks, etc.). To enable OCSP revocation, log in to the HYCU console and edit the config file by executing the following command: sudo vi /opt/grizzly/config.properties and add the following line: cert.path.revocation.checking.enabled=true
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000370
- Version
- HYCU-ND-000190
- Vuln IDs
-
- V-268236
- Rule IDs
-
- SV-268236r1038659_rule
Checks: C-72257r1038657_chk
Log in to the HYCU Web UI, select the gear menu, and then choose the Identity Providers option. Verify that two authentication servers are configured. If no authentication server is configured or only a single server is configured, this is a finding.
Fix: F-72160r1038658_fix
Log in to the HYCU Web UI, select the gear menu, and then choose the Identity Providers option. Click "New" to add an authentication server. Configure two authentication servers on the Web UI.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000765
- Version
- HYCU-ND-000210
- Vuln IDs
-
- V-268237
- Rule IDs
-
- SV-268237r1038754_rule
Checks: C-72258r1038660_chk
Log in to the HYCU Web UI, select the gear menu, and then choose the Identity Providers option. Verify that at least one Identity Provider authentication server is configured. If no Identity Provider is configured, this is a finding. When using certificate authentication using client certificate or smart card (CAC authentication), verify "Enable Certificate Authentication" is enabled. If "Enable Certification Authentication" is not enabled, this is a finding.
Fix: F-72161r1038753_fix
Configure Identity Provider authentication by adding one or more Identity Providers as authentication sources in HYCU. This allows users to log in to the HYCU web user interface with their Identity Provider accounts or, if certificate authentication is enabled, with a client certificate or a smart card (CAC authentication). Log in to the HYCU Web UI, select the gear menu, and choose the "Identity Providers" option. Configure Identity Provider by specifying the required setting. For example, if configuring Active Directory IDP, provide the domain and required LDAP URL to allow HYCU to use AD users and groups for access to the Web UI. When using certificate authentication using client certificate or smart card (CAC authentication), ensure "Service Account" is specified in the Active Directory configuration and "Enable Certificate Authentication" is enabled.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HYCU-ND-000220
- Vuln IDs
-
- V-268238
- Rule IDs
-
- SV-268238r1038665_rule
Checks: C-72259r1038663_chk
HYCU Web UI user access accounts cannot be edited, only removed and readded from/to user groups in the Web UI Self-Service menu. After adding a user to a group, log in to the HYCU Web UI, navigate into Events context, and search for message of category "USER_GROUP" and text "Successfully added user to group". If the message is not in Events, this is a finding. Log in to the VM console and run the following command: chkconfig auditd If the Audit Service is not in a running state, this is a finding. Check the contents of the "/var/log/audit/audit.log" file. Verify the operating system generates audit records when successful/unsuccessful attempts to access privileges occur. If the audit log is not configured or does not have required contents, this is a finding.
Fix: F-72162r1038664_fix
Configure the operating system to generate audit records when successful/unsuccessful attempts to access privileges occur. Log in to the HYCU VM console and run the following command: chkconfig auditd on Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. sudo cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. sudo augenrules --load
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HYCU-ND-000230
- Vuln IDs
-
- V-268239
- Rule IDs
-
- SV-268239r1038771_rule
Checks: C-72260r1038415_chk
Check the contents of the "/var/log/audit/audit.log" file. HYCU also maintains Event (Audit) information in the "HYCU Web UI Events" menu. Verify the audit log contains records showing successful/unsuccessful attempts to modify or delete administrator privileges. If the audit log is not configured or does not have required contents, this is a finding.
Fix: F-72163r1038666_fix
Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HYCU-ND-000240
- Vuln IDs
-
- V-268240
- Rule IDs
-
- SV-268240r1038772_rule
Checks: C-72261r1038418_chk
Check the contents of the "/var/log/audit/audit.log" file. HYCU also maintains Event (Audit) information in the "HYCU Web UI Events" menu. Verify the audit log contains records showing successful/unsuccessful attempts to modify or delete administrator privileges. If the audit log is not configured or does not have required contents, this is a finding.
Fix: F-72164r1038668_fix
Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HYCU-ND-000250
- Vuln IDs
-
- V-268241
- Rule IDs
-
- SV-268241r1038672_rule
Checks: C-72262r1038670_chk
Check the contents of the "/var/log/audit/audit.log" file. Verify the audit log contains records showing when successful/unsuccessful login attempts occur. If the audit log is not configured or does not have required contents, this is a finding. HYCU also maintains Event (Audit) information in the "HYCU Web UI Events" menu. Log in with correct and incorrect credentials and check the HYCU Events. If the HYCU events of category "SECURITY" are not logged for each of the attempts, status is not "Success" for the correct credentials and status is not "Warning" for the incorrect credentials, this is a finding.
Fix: F-72165r1038671_fix
Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HYCU-ND-000260
- Vuln IDs
-
- V-268242
- Rule IDs
-
- SV-268242r1038675_rule
Checks: C-72263r1038673_chk
Log in to the VM console and run the following command: chkconfig auditd If the Audit Service is not in a running state, this is a finding. Also, if no logs are present in the "/var/log/secure" file, this is a finding.
Fix: F-72166r1038674_fix
Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following command: chkconfig auditd on Use the following command to review the logs: cat /var/log/secure | less Use the "/" character to search the log or timeframe for any undesired/unapproved changes.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- HYCU-ND-000280
- Vuln IDs
-
- V-268244
- Rule IDs
-
- SV-268244r1038775_rule
Checks: C-72265r1038773_chk
Log in to the HYCU VM console. Review the /etc/audit/auditd.conf file and verify the settings are in accordance with a locally developed list of auditable events. If it is not configured in accordance with organizational policies, this is a finding. Check for the value of the "max_log_file_action" option in "/etc/audit/auditd.conf" with the following command: sudo grep max_log_file_action /etc/audit/auditd.conf If the "max_log_file_action" value is not set to "ROTATION", this is a finding.
Fix: F-72168r1038774_fix
Configure the operating system to use a locally developed list of auditable events by editing "/etc/audit/auditd.conf" files using the following command: sudo vi /etc/audit/auditd.conf Add or modify lines to have the required values for the organization.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- HYCU-ND-000290
- Vuln IDs
-
- V-268245
- Rule IDs
-
- SV-268245r1038756_rule
Checks: C-72266r1038755_chk
Check the contents of the "/var/log/audit/audit.log" file. HYCU also maintains Event (Audit) information in the "HYCU Web UI Events" menu. Verify the audit log contains records for: - When (date and time) events occurred. - Where events occurred. - The source of the event(s). - The outcome of the event(s). - The identity of any individual or process associated with the event(s). If the audit log is not configured or does not have required contents, this is a finding.
Fix: F-72169r1038680_fix
Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- HYCU-ND-000340
- Vuln IDs
-
- V-268246
- Rule IDs
-
- SV-268246r1038438_rule
Checks: C-72267r1038436_chk
Check if HYCU is configured to audit the execution of the "execve" system call, by running the following command: $ sudo grep execve /etc/audit/audit.rules -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k execpriv If the command does not return all lines, or the lines are commented out, this is a finding.
Fix: F-72170r1038437_fix
Configure HYCU to audit the execution of the "execve" system call. Add or update the following file system rules to "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k execpriv -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k execpriv -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k execpriv Reboot the appliance to take effect.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- HYCU-ND-000350
- Vuln IDs
-
- V-268247
- Rule IDs
-
- SV-268247r1038776_rule
Checks: C-72268r1038682_chk
Log in to the VM console and run the following command: chkconfig auditd If the Audit Service is not in a running state, this is a finding. Check the contents of the "/var/log/audit/audit.log" file. If the audit log does not have the required contents, this is a finding.
Fix: F-72171r1038683_fix
Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following command: chkconfig auditd on Use the following command to review the logs: cat /var/log/secure | less Use the "/" character to search the log or timeframe for any undesired/unapproved changes. Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. sudo cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. sudo augenrules --load
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- HYCU-ND-000360
- Vuln IDs
-
- V-268248
- Rule IDs
-
- SV-268248r1038777_rule
Checks: C-72269r1038685_chk
Log in to the VM console and run the following command: chkconfig auditd If the Audit Service is not in a running state, this is a finding. Check the contents of the "/var/log/audit/audit.log" file. If the audit log does not have the required contents, this is a finding.
Fix: F-72172r1038686_fix
Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following command: chkconfig auditd on Use the following command to review the logs: cat /var/log/secure | less Use the "/" character to search the log or timeframe for any undesired/unapproved changes. Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. sudo cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. sudo augenrules --load
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- HYCU-ND-000370
- Vuln IDs
-
- V-268249
- Rule IDs
-
- SV-268249r1038778_rule
Checks: C-72270r1038688_chk
Log in to the VM console and run the following command: chkconfig auditd If the Audit Service is not in a running state, this is a finding. Check the contents of the "/var/log/audit/audit.log" file. If the audit log does not have the required contents, this is a finding.
Fix: F-72173r1038689_fix
Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following command: chkconfig auditd on Use the following command to review the logs: cat /var/log/secure | less Use the "/" character to search the log or timeframe for any undesired/unapproved changes. Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. sudo cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. sudo augenrules --load
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HYCU-ND-000380
- Vuln IDs
-
- V-268250
- Rule IDs
-
- SV-268250r1038779_rule
Checks: C-72271r1038691_chk
Log in to the VM console and run the following command: chkconfig auditd If the Audit Service is not enabled, this is a finding. Check the contents of the "/var/log/audit/audit.log" file. If the audit log does not have the required contents, this is a finding.
Fix: F-72174r1038692_fix
Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following commands: chkconfig auditd on systemctl start auditd Use the following command to review the logs: cat /var/log/secure | less Use the "/" character to search the log or timeframe for any undesired/unapproved changes. Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. sudo cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. sudo augenrules --load
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- HYCU-ND-000390
- Vuln IDs
-
- V-268251
- Rule IDs
-
- SV-268251r1038695_rule
Checks: C-72272r1038694_chk
Log in to the HYCU VM console. Review the /etc/audit/auditd.conf file and verify that the settings are in accordance with organizational policies. If it is not configured in accordance with organizational policies, this is a finding. Check for the value of the "max_log_file_action" option in "/etc/audit/auditd.conf" with the following command: sudo grep max_log_file_action /etc/audit/auditd.conf If the "max_log_file_action" value is not set to "ROTATION", this is a finding.
Fix: F-72175r1038452_fix
Configure the operating system to enforce log rotation and restrict log file size to an organization-defined value by editing "/etc/audit/auditd.conf" files using the following command: sudo vi /etc/audit/auditd.conf Add or modify the following lines to have the required value for the organization. Refer to the sample below: max_log_file_action = ROTATION max_log_file = 6
- RMF Control
- CP-9
- Severity
- M
- CCI
- CCI-000539
- Version
- HYCU-ND-000400
- Vuln IDs
-
- V-268252
- Rule IDs
-
- SV-268252r1038698_rule
Checks: C-72273r1038696_chk
Verify that HYCU is backing itself up by logging in to the HYCU Web UI and checking the HYCU Controller widget at the HYCU Dashboard. If the message "Controller VM is not protected" is found and highlighted in orange, this is a finding.
Fix: F-72176r1038697_fix
Log in to the HYCU Web UI and go to the "Virtual Machines" menu, then apply a backup policy to the HYCU Server to back it up. Any documentation/configuration files stored on the HYCU server will be backed up as a result.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- HYCU-ND-000410
- Vuln IDs
-
- V-268253
- Rule IDs
-
- SV-268253r1038701_rule
Checks: C-72274r1038699_chk
Verify that HYCU is backing itself up by logging in to the HYCU Web UI and checking the HYCU Controller widget at the HYCU Dashboard. If the message "Controller VM is not protected" is found and highlighted in orange, this is a finding.
Fix: F-72177r1038700_fix
Log in to the HYCU Web UI and go to the "Virtual Machines" menu, then apply a backup policy to the HYCU Server to back it up. Any documentation/configuration files stored on the HYCU server will be backed up as a result.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- HYCU-ND-000430
- Vuln IDs
-
- V-268254
- Rule IDs
-
- SV-268254r1038704_rule
Checks: C-72275r1038702_chk
Log in to the HYCU Web UI and review the "Events" menu and "Email Notifications" to verify that all appropriate/relevant audit failure events are included in the "Category" drop-down menu. If these events are not shown (reference a recent event capturing a login to HYCU for validation), this is a finding.
Fix: F-72178r1038703_fix
Log in to the HYCU Web UI and go to the "Events" menu and open "Email Notifications". Ensure that all the appropriate/relevant categories are selected and that the "Status" includes failures. Add a "Subject" for the "Email Notifications" and email address for necessary auditors or HYCU administrators.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- HYCU-ND-000450
- Vuln IDs
-
- V-268255
- Rule IDs
-
- SV-268255r1039643_rule
Checks: C-72276r1038705_chk
Verify the operating system audit records have proper permissions and ownership. Log in to the HYCU console and list the full permissions and ownership of the audit log files with the following command: # sudo ls -la /var/log/audit total 4512 drwx------. 2 root root 23 Apr 25 16:53 . drwxr-xr-x. 17 root root 4096 Aug 9 13:09 .. -rw-------. 1 root root 8675309 Aug 9 12:54 audit.log Audit logs must be mode 0600 or less permissive. If any are more permissive, this is a finding. The owner and group owner of all audit log files must both be "root". If any other owner or group owner is listed, this is a finding.
Fix: F-72179r1038464_fix
Change the mode of the audit log files with the following command: # chmod 0600 [audit_file] Change the owner and group owner of the audit log files with the following command: # chown root:root [audit_file]
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- HYCU-ND-000460
- Vuln IDs
-
- V-268256
- Rule IDs
-
- SV-268256r1038708_rule
Checks: C-72277r1038707_chk
Verify the operating system audit tools and config files have proper permissions and ownership. Log in to the HYCU console and list the full permissions and ownership of the audit folder with the following command: sudo ls -al /etc/audit Folder and files must be owned by root and the following permissions must be set: drwxr-x---. 4 root root 126 Mar 15 10:16 . drwxr-xr-x. 106 root root 8192 May 6 13:58 .. -rw-r-----. 1 root root 751 Apr 24 2020 audisp-remote.conf -rw-r-----. 1 root root 856 Apr 24 2020 auditd.conf -rw-r-----. 1 root root 107 Feb 3 13:18 audit.rules -rw-r-----. 1 root root 127 Apr 24 2020 audit-stop.rules drwxr-x---. 2 root root 67 Mar 15 10:16 plugins.d drwxr-x---. 2 root root 25 Feb 3 13:13 rules.d Audit files must be mode 0640 or less permissive. If any are more permissive, this is a finding. The owner and group owner of all audit files must both be "root". If any other owner or group owner is listed, this is a finding.
Fix: F-72180r1038467_fix
Change the mode of the audit log files with the following command: # chmod 0640 [audit_file] Change the owner and group owner of the audit files with the following command: # chown root:root [audit_file]
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- HYCU-ND-000490
- Vuln IDs
-
- V-268257
- Rule IDs
-
- SV-268257r1038710_rule
Checks: C-72278r1038709_chk
Verify that the HYCU device is running a supported version. Log in to the HYCU Web UI. On the menu on the left side of the page, scroll to the bottom, where it shows the running version of HYCU. If HYCU version is not on the list of supported versions, as specified in the End-of-Life Milestones and Dates, this is a finding. Note: The HYCU support portal specifies the HYCU end of life policies. To determine if the system is using a supported version, visit: https://download.hycu.com/docs/HYCU-EOL-dates.pdf.
Fix: F-72181r1038470_fix
Perform upgrade to the supported HYCU version following upgrade section of user manual.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HYCU-ND-000500
- Vuln IDs
-
- V-268258
- Rule IDs
-
- SV-268258r1039645_rule
Checks: C-72279r1039644_chk
Open a new HYCU Web UI browser tab and verify there is no warning prompt before proceeding to the Web UI login page. If a warning appears in the web browser stating, "Not secure", this is a finding.
Fix: F-72182r1038712_fix
Log in to the HYCU Web UI and generate a CSR within the gear menu and "SSL Certificates" menu. Submit this CSR to a DOD PKI authority to have a new certificate created. Note: By default, HYCU is configured with a self-signed certificate, but this can be replaced with a DOD-issued certificate. This certificate can be configured by logging in to the HYCU Web UI, navigating to the gear menu and "SSL Certificates" menu, and importing the DOD-issued certificate.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000382
- Version
- HYCU-ND-000510
- Vuln IDs
-
- V-268259
- Rule IDs
-
- SV-268259r1038477_rule
Checks: C-72280r1038475_chk
Verify the SSHD daemon has been disabled using the following command: $ sudo systemctl status sshd Loaded: loaded (/usr/lib/systemd/system/sshd.service; disabled) Active: inactive (dead) If the SSHD daemon is not disabled and inactive or is not documented and approved for use, this is a finding.
Fix: F-72183r1038476_fix
Stop the SSHD daemon using the following command: $ sudo systemctl stop sshd Disable the SSHD daemon using the following command: $ sudo systemctl disable sshd Note: The service must be stopped before it can be disabled.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- HYCU-ND-000520
- Vuln IDs
-
- V-268260
- Rule IDs
-
- SV-268260r1038716_rule
Checks: C-72281r1038714_chk
The use of SSH-2 protocol for network/remote access prevents replay attacks. The SSH-2 protocol is the standard for the SSH daemon in the Linux OS used by HYCU. To determine the SSH version in use, log in to the HYCU console and execute the following command: ssh -v localhost If the output does not show remote protocol version 2.0 in use, this is a finding. HYCU web access uses TLS, which addresses this threat. HYCU web access cannot be configured to not use TLS.
Fix: F-72184r1038715_fix
Log in to the HYCU console and configure SSH to use the SSH-2 protocol by editing the protocol variable in the file "/etc/ssh/sshd_config".
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- HYCU-ND-000540
- Vuln IDs
-
- V-268262
- Rule IDs
-
- SV-268262r1038718_rule
Checks: C-72283r1038717_chk
Log in to the HYCU VM console. Check for the value of the "minclass" option in "/etc/security/pwquality.conf" with the following command: grep minclass /etc/security/pwquality.conf If the minclass value is not set to "5", this is a finding.
Fix: F-72186r1038485_fix
Configure the operating system to enforce a minimum class setting. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): minclass = 5
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- HYCU-ND-000550
- Vuln IDs
-
- V-268263
- Rule IDs
-
- SV-268263r1038720_rule
Checks: C-72284r1038719_chk
Log in to the HYCU VM console. Check for the value of the "minclass" option in "/etc/security/pwquality.conf" with the following command: grep minclass /etc/security/pwquality.conf If the minclass value is not set to "5", this is a finding.
Fix: F-72187r1038488_fix
Configure the operating system to enforce a minimum class setting. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): minclass = 5
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- HYCU-ND-000560
- Vuln IDs
-
- V-268264
- Rule IDs
-
- SV-268264r1038722_rule
Checks: C-72285r1038721_chk
Log in to the HYCU VM console. Check for the value of the "minclass" option in "/etc/security/pwquality.conf" with the following command: grep minclass /etc/security/pwquality.conf If the minclass value is not set to "5", this is a finding.
Fix: F-72188r1038491_fix
Configure the operating system to enforce a minimum class setting. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): minclass = 5
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- HYCU-ND-000570
- Vuln IDs
-
- V-268265
- Rule IDs
-
- SV-268265r1038724_rule
Checks: C-72286r1038723_chk
Log in to the HYCU VM console. Check for the value of the "minclass" option in "/etc/security/pwquality.conf" with the following command: grep minclass /etc/security/pwquality.conf If the minclass value is not set to "5", this is a finding.
Fix: F-72189r1038494_fix
Configure the operating system to enforce a minimum class setting. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): minclass = 5
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- HYCU-ND-000580
- Vuln IDs
-
- V-268266
- Rule IDs
-
- SV-268266r1038758_rule
Checks: C-72287r1038496_chk
Check for the value of the "minlen" option in "/etc/security/pwquality.conf" with the following command: grep minlen /etc/security/pwquality.conf If the minlen value is not set to "15", this is a finding. Check for the value of the "user.password.min.length" variable in "/opt/grizzly/config.properties" HYCU configuration file with the following command: grep user.password.min.length /opt/grizzly/config.properties If the value is not set to 15 or more, this is a finding.
Fix: F-72190r1038757_fix
Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value). minlen = 15 Add or modify the following line in the /opt/grizzly/config.properties configuration file: user.password.min.length=15 Reload the HYCU application by running the following command: sudo systemctl reload grizzly
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- HYCU-ND-000590
- Vuln IDs
-
- V-268267
- Rule IDs
-
- SV-268267r1038760_rule
Checks: C-72288r1038759_chk
Verify the value of the "difok" option with the following command: $ sudo grep -r difok /etc/security/pwquality.conf* /etc/security/pwquality.conf:difok = 8 If the value of "difok" is set to less than "8" or is commented out, this is a finding. If conflicting results are returned, this is a finding.
Fix: F-72191r1038500_fix
Configure the operating system to require the change of at least eight of the total number of characters when passwords are changed by setting the "difok" option. Add the following line to "/etc/security/pwquality.conf" (or modify the line to have the required value): difok = 8 Remove any configurations that conflict with the above value.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- HYCU-ND-000620
- Vuln IDs
-
- V-268269
- Rule IDs
-
- SV-268269r1038744_rule
Checks: C-72290r1038505_chk
When FIPS mode is enabled, the HYCU application will use FIPS-compliant behavior. Validate the FIPS status using the following command: 'cat /proc/sys/crypto/fips_enabled' If command output does not show "1", this is a finding. 'fips-mode-setup --check' If command output does not show "FIPS mode is enabled", this is a finding. 'update-crypto-policies --show' If command output does not show "FIPS", this is a finding.
Fix: F-72193r1038506_fix
Stop the HYCU web server: sudo systemctl stop grizzly.service Enable FIPS-compliant mode: sudo /opt/grizzly/bin/enable_fips.sh Reboot the HYCU virtual machines: shutdown -r now
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-002890
- Version
- HYCU-ND-000630
- Vuln IDs
-
- V-268270
- Rule IDs
-
- SV-268270r1038745_rule
Checks: C-72291r1038508_chk
When FIPS mode is enabled, the HYCU application will use FIPS-compliant behavior. Validate the FIPS status using the following command: 'cat /proc/sys/crypto/fips_enabled' If command output does not show "1", this is a finding. 'fips-mode-setup --check' If command output does not show "FIPS mode is enabled", this is a finding. 'update-crypto-policies --show' If command output does not show "FIPS", this is a finding.
Fix: F-72194r1038509_fix
Stop the HYCU web server: sudo systemctl stop grizzly.service Enable FIPS-compliant mode: sudo /opt/grizzly/bin/enable_fips.sh Reboot the HYCU virtual appliance: shutdown -r now
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-003123
- Version
- HYCU-ND-000640
- Vuln IDs
-
- V-268271
- Rule IDs
-
- SV-268271r1038746_rule
Checks: C-72292r1038511_chk
When FIPS mode is enabled, the HYCU application will use FIPS-compliant behavior. Validation of FIPS status can be done using the following commands: 'cat /proc/sys/crypto/fips_enabled' If command output does not show "1", this is a finding. 'fips-mode-setup --check' If command output does not show "FIPS mode is enabled", this is a finding. 'update-crypto-policies --show' If command output does not show "FIPS", this is a finding.
Fix: F-72195r1038512_fix
Stop the HYCU web server: sudo systemctl stop grizzly.service Enable FIPS-compliant mode: sudo /opt/grizzly/bin/enable_fips.sh Reboot the HYCU virtual appliance: shutdown -r now
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001358
- Version
- HYCU-ND-000670
- Vuln IDs
-
- V-268274
- Rule IDs
-
- SV-268274r1038763_rule
Checks: C-72295r1038761_chk
Log in to HYCU UI and ensure that admin user is the only user configured with HYCU Authentication type. If any other user except for built-in admin is configured with HYCU Authentication type, this is a finding. Log in to HYCU console, run the command "cat /etc/passwd" within the HYCU console and ensure no nondefault user account configured. If any other user apart from HYCU user is configured to access HYCU console, this is a finding.
Fix: F-72198r1038762_fix
Log in to the HYCU Web UI, select Self-Service on the left menu. Then select Manage Users. Delete all users configured with HYCU Authentication type except from the built-in admin user. To check for any unauthorized users on the VM Console, run the following command: cat /etc/passwd Use the "userdel" command to remove any unauthorized users.
- RMF Control
- Severity
- M
- CCI
- CCI-003938
- Version
- HYCU-ND-000750
- Vuln IDs
-
- V-268282
- Rule IDs
-
- SV-268282r1038736_rule
Checks: C-72303r1038734_chk
Check the contents of the "/var/log/audit/audit.log" file. Verify the audit log contains records showing when unsuccessful login attempts occur. If the audit log is not configured or does not have required contents, this is a finding. HYCU also maintains Event (Audit) information in the "HYCU Web UI Events" menu. Log in with incorrect credentials and check the HYCU Events. If the HYCU event of category "SECURITY" and status "Warning" is not logged, this is a finding.
Fix: F-72206r1038735_fix
Log in to the HYCU VM console and load the STIG audit rules by using the following commands: 1. cp /usr/share/audit/sample-rules/10-base-config.rules /usr/share/audit/sample-rules/30-stig.rules /usr/share/audit/sample-rules/31-privileged.rules /usr/share/audit/sample-rules/99-finalize.rules /etc/audit/rules.d/ 2. augenrules --load
- RMF Control
- Severity
- M
- CCI
- CCI-003992
- Version
- HYCU-ND-000760
- Vuln IDs
-
- V-268283
- Rule IDs
-
- SV-268283r1038766_rule
Checks: C-72304r1038764_chk
Verify the operating system prevents the installation of patches, service packs, device drivers, or operating system components from a repository without verification that they have been digitally signed using a certificate that is recognized and approved by the organization. Check that YUM verifies the signature of packages from a repository prior to install with the following command: $ sudo grep -E '^\[.*\]|gpgcheck' /etc/yum.repos.d/*.repo /etc/yum.repos.d/appstream.repo:[appstream] /etc/yum.repos.d/appstream.repo:gpgcheck=1 /etc/yum.repos.d/baseos.repo:[baseos] /etc/yum.repos.d/baseos.repo:gpgcheck=1 If "gpgcheck" is not set to "1", or if options are missing or commented out, this is a finding. Execute the following command to check the kernel and cryptographic libraries, as well as the SHA256 checksums of the application files: $ sudo /opt/grizzly/bin/hycu-selftest.sh If the output is not OK for the OS, this is a finding. If the output reports an error for any other file than /etc/issue for the App section, this is a finding.
Fix: F-72207r1038765_fix
Configure the operating system to verify the signature of packages from a repository prior to install by setting the following option in every repo file in /etc/yum.repos.d/: gpgcheck=1 Check the output of "sudo /opt/grizzly/bin/hycu-selftest.sh". Investigate each file listed in the error output to determine a fix.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- HYCU-ND-000900
- Vuln IDs
-
- V-268296
- Rule IDs
-
- SV-268296r1038767_rule
Checks: C-72317r1038586_chk
Obtain evidence that software updates are consistently applied to the HYCU virtual appliance within the time frame defined for each patch. If such evidence cannot be obtained, or the evidence obtained indicates a pattern of noncompliance, this is a finding. If the HYCU virtual appliance does not install security-relevant updates within the time period directed by the authoritative source, this is a finding.
Fix: F-72220r1038587_fix
Institute and adhere to policies and procedures to ensure that patches are consistently applied to the HYCU virtual appliance within the time allowed.
- RMF Control
- SC-10
- Severity
- H
- CCI
- CCI-001133
- Version
- HYCU-ND-000950
- Vuln IDs
-
- V-268301
- Rule IDs
-
- SV-268301r1038739_rule
Checks: C-72322r1038738_chk
Log in to the HYCU VM console. For console connections, check for the value of the "TMOUT" option in "/home/hycu/.bashrc" with the following command: grep TMOUT /home/hycu/.bashrc If the "TMOUT" value is not set to "300" or less, this is a finding. For SSH connections, check for the value of the "ClientAliveInterval" option in "/etc/ssh/sshd_config" with the following command: grep ClientAliveInterval /etc/ssh/sshd_config If the "ClientAliveInterval" value is not set to "5" or less, this is a finding. For UI connections, run the following command to check configured HYCU session timeout: cat /opt/grizzly/config.properties | grep api.session.expiration.minutes If not configured at "5" or less, this is a finding.
Fix: F-72225r1038602_fix
Configure the operating system to enforce timeout settings. Add the following line to "/home/hycu/.bashrc" (or modify the line to have the required value): TMOUT=300 Add the following line to "/etc/ssh/sshd_config" (or modify the line to have the required value): ClientAliveInterval 300 Edit the "/opt/grizzly/config.properties" file by running the command: sudo vi /opt/grizzly/config.properties Add the following line or modify the line to have the required value: api.session.expiration.minutes=5 Save the file by typing: :wq!
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- HYCU-ND-000960
- Vuln IDs
-
- V-268302
- Rule IDs
-
- SV-268302r1038606_rule
Checks: C-72323r1038604_chk
When FIPS mode is enabled, HYCU will use FIPS-compliant behavior. Validation of FIPS status can be done using the following command: 'cat /proc/sys/crypto/fips_enabled' If command output does not show "1", this is a finding. 'fips-mode-setup --check' If command output does not show "FIPS mode is enabled", this is a finding. 'update-crypto-policies --show' If command output does not show "FIPS", this is a finding.
Fix: F-72226r1038605_fix
Stop the HYCU web server using the following command: sudo systemctl stop grizzly.service Enable FIPS-compliant mode using the following command: sudo /opt/grizzly/bin/enable_fips.sh Reboot the HYCU virtual machines using the following command: shutdown -r now
- RMF Control
- AU-4
- Severity
- H
- CCI
- CCI-001851
- Version
- HYCU-ND-000970
- Vuln IDs
-
- V-268303
- Rule IDs
-
- SV-268303r1038770_rule
Checks: C-72324r1038740_chk
Log in to the HYCU Web UI, navigate to Events >> Notifications >> Webhooks and verify that HYCU is sending required logs to at least at least two central log servers. If two webhooks sending required HYCU events to at least two central log servers are not configured, this is a finding.
Fix: F-72227r1038769_fix
Setting up webhook-based notifications in HYCU allows users to receive alerts and updates about all activities related to the HYCU environment, including job status, errors, and warnings. This ensures users stay informed about the status of the events and can take appropriate actions if needed. Use HYCU Webhooks to send HYCU events from the HYCU VM to a central logging server (e.g., Splunk, SolarWinds). Configure the webhooks notifications by navigating to Events >> Notifications >> Webhooks and adding a new Webhook. Use the "Category" and "Status" fields to filter type of events sent out based on organizational requirements. For more detailed procedures, consult the following: https://support.hycu.com/hc/en-us/articles/11825154101532-Configuring-Splunk-Webhook-with-HYCU.