@@ -12,6 +12,13 @@ skip_reboot: true
1212
1313system_is_container : false
1414
15+ # Used for audit
16+ ubtu20cis_level_1 : true
17+ ubtu20cis_level_2 : true
18+
19+ # Create managed not custom local_facts files
20+ create_benchmark_facts : true
21+ ansible_facts_path : /etc/ansible/facts.d
1522# # Benchmark name used by auditing control role
1623# The audit variable found at the base
1724benchmark : UBUNTU20-CIS
@@ -36,16 +43,12 @@ audit_run_heavy_tests: true
3643
3744# # Only run Audit do not remediate
3845audit_only : false
39- # ## As part of audit_only ###
40- # This will enable files to be copied back to control node in audit_only mode
41- fetch_audit_files : false
42- # Path to copy the files to will create dir structure in audit_only mode
43- audit_capture_files_dir : /some/location to copy to on control node
46+
4447# ############################
4548
4649# How to retrieve audit binary
4750# Options are copy or download - detailed settings at the bottom of this file
48- # you will need to access to either github or the file already dowmloaded
51+ # you will need to access to either github or the file already downloaded
4952get_audit_binary_method : download
5053
5154# # if get_audit_binary_method - copy the following needs to be updated for your environment
@@ -70,8 +73,23 @@ audit_conf_dest: "/opt"
7073# Where the audit logs are stored
7174audit_log_dir : ' /opt'
7275
76+ # # Ability to collect and take audit files moving to a centralised location
77+ # This enables the collection of the files from the host
78+ fetch_audit_output : false
79+
80+ # Method of getting,uploading the summary files
81+ # # Ensure access and permissions are available for these to occur.
82+ # # options are
83+ # fetch - fetches from server and moves to location on the ansible controller (could be a mount point available to controller)
84+ # copy - copies file to a location available to the managed node
85+ audit_output_collection_method : fetch
86+
87+ # Location to put the audit files
88+ audit_output_destination : /opt/audit_summaries/
89+
7390# ## Goss Settings ##
7491# ###### END ########
92+
7593# We've defined complexity-high to mean that we cannot automatically remediate
7694# the rule in question. In the future this might mean that the remediation
7795# may fail in some cases.
@@ -85,7 +103,7 @@ ubtu20cis_audit_complex: true
85103# We've defined disruption-high to indicate items that are likely to cause
86104# disruption in a normal workflow. These items can be remediated automatically
87105# but are disabled by default to avoid disruption.
88- # Value of true runs duscruptive tasks, value of false will skip disruptive tasks
106+ # Value of true runs disruptive tasks, value of false will skip disruptive tasks
89107ubtu20cis_disruption_high : true
90108
91109# Show "changed" for disruptive items not remediated per disruption-high
@@ -604,7 +622,7 @@ ubtu20cis_ufw_allow_in:
604622# Controls 3.5.3.2.1 through 3.5.3.3.4
605623# The iptables module only writes to memory which means a reboot could revert settings
606624# The below toggle will install iptables-persistent and save the rules in memory (/etc/iptables/rules.v4 or rules.v6)
607- # This makes the CIS role changes permenant
625+ # This makes the CIS role changes permanent
608626ubtu20cis_save_iptables_cis_rules : true
609627
610628# Section 4 Control Variables
@@ -616,19 +634,19 @@ ubtu20cis_save_iptables_cis_rules: true
616634
617635# log_level is the log level variable. This needs to be set to VERBOSE or INFO to conform to CIS standards
618636
619- # max_auth_tries is the max number of authentication attampts per connection.
637+ # max_auth_tries is the max number of authentication attempts per connection.
620638# This value should be 10 or less to conform to CIS standards
621639
622- # ciphers is a comma seperated list of site approved ciphers
640+ # ciphers is a comma separated list of site approved ciphers
623641# ONLY USE STRONG CIPHERS. Weak ciphers are listed below
624642# DO NOT USE: 3des-cbc, aes128-cbc, aes192-cbc, and aes256-cbc
625643
626- # MACs is the comma seperated list of site approved MAC algorithms that SSH can use during communication
644+ # MACs is the comma separated list of site approved MAC algorithms that SSH can use during communication
627645# ONLY USE STRONG ALGORITHMS. Weak algorithms are listed below
628646# DO NOT USE: hmac-md5, hmac-md5-96, hmac-ripemd160, hmac-sha1, hmac-sha1-96, umac-64@openssh.com, umac-128@openssh.com, hmac-md5-etm@openssh.com,
629647# hmac-md5-96-etm@openssh.com, hmac-ripemd160-etm@openssh.com, hmac-sha1-etm@openssh.com, hmac-sha1-96-etm@openssh.com, umac-64-etm@openssh.com, umac-128-etm@openssh.com
630648
631- # kex_algorithms is comma seperated list of the algorithms for key exchange methods
649+ # kex_algorithms is comma separated list of the algorithms for key exchange methods
632650# ONLY USE STRONG ALGORITHMS. Weak algorithms are listed below
633651# DO NOT USE: diffie-hellman-group1-sha1, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1
634652
@@ -668,7 +686,7 @@ ubtu20cis_passwd_hash_algo: sha512 # pragma: allowlist secret
668686# pam_tally2 login options allows for audit to be removed if required
669687ubtu20cis_pamtally2_login_opts : ' onerr=fail audit silent deny=5 unlock_time=900'
670688
671- # ubtu20cis_pamd_pwhistory_remember is number of password chnage cycles a user can re-use a password
689+ # ubtu20cis_pamd_pwhistory_remember is number of password change cycles a user can re-use a password
672690# This needs to be 5 or more to conform to CIS standards
673691ubtu20cis_pamd_pwhistory_remember : 5
674692
0 commit comments