Suggestion: update wording in SO 2.4 documentation to state "Security Onion locks down the Firewall by default" for STIG audit #12917
Replies: 2 comments 1 reply
-
Can put all the words in the user manual and documentation you want...the entire point of an audit is to see what is really true. User manual documentation is not sufficient for this. I'd stick with your manual validation. |
Beta Was this translation helpful? Give feedback.
0 replies
-
I've updated the documentation for the upcoming 2.4.70 release: |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
We had gone through a pre-inspection for STIG compliance and our auditor wanted to see that so-firewall had an explicit "deny by default" setting set. Using the firewalld daemon, this can be accomplished by running "sudo firewall-cmd --info-zone[custom] | grep target and it should return with "target: DROP". If there is no way to do this on the command line with so-firewall or on the SOC, can the 2.4 documentation add the line that was in the 2.3 documentation (section 17.2 so-allow) "Security Onion locks down the Firewall by default", as that phrase is not in the 2.4 documentation. For reference I am referring to STIG vuln-id V-248839. I understand that is for Oracle Linux 8 but we are anticipating that vuln id will still be present in the upcoming OL9 STIG.
Beta Was this translation helpful? Give feedback.
All reactions