-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fixed section numbering and section 6.3
Signed-off-by: Aaron Lippold <[email protected]>
- Loading branch information
1 parent
4a1546b
commit dda16de
Showing
14 changed files
with
142 additions
and
173 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -6,27 +6,27 @@ author: Aaron Lippold | |
headerDepth: 3 | ||
--- | ||
|
||
## 4. Start with Planning | ||
## 4.1 Start with Planning | ||
|
||
The SAF's main pillars are Plan, Harden, Validate, Normalize, and Visualize. First, it is necessary to plan which components are/will be in your system and identify the security guidance available for those components. | ||
|
||
![The Plan Capability](../../assets/img/SAF_Capabilities_Plan.png) | ||
|
||
### 4.1 Identify Your Stack of Components for the System | ||
## 4.2 Identify Your Stack of Components for the System | ||
|
||
Your software system is composed of multiple components, such as Cloud Services, Virtualization Platforms, Operating Systems, Databases, Application Logic, and Web Servers. | ||
|
||
The first step of any assessment is identifying the components of the system you are assessing. | ||
|
||
### 4.2 What is the Guidance? | ||
## 4.3 What is the Guidance? | ||
|
||
There could be Security Technical Implementation Guides (STIGs), Security Requirements Guides (SRGs), Center for Internet Security (CIS) Benchmarks, or vendor guidance written for the components in your software stack. Being aware of these can help inform which profile to use. | ||
|
||
::: tip Note | ||
Outline any specific requirements for your organization that might differ from the specific published guidance. This will inform how to tailor the profiles later on. | ||
::: | ||
|
||
### 4.3 Content Libraries for Software Components | ||
## 4.4 Content Libraries for Software Components | ||
|
||
As you saw in the previous section's [SAF Site scavenger hunt](./03.md), the SAF website hosts links, information, and tools to ease the security process. To get a better idea of what may be in your software stack and what kind of content is available for automated testing, you can peruse the SAF's hardening and validation content libraries when you are making a plan. | ||
|
||
|
@@ -45,7 +45,7 @@ Navigate to the [Validate page](https://saf.mitre.org/#/validate) to find librar | |
![Validation](../../assets/img/SAF_Site_Validate.png) | ||
::: | ||
|
||
### 4.4 What if There is No Content for a Software Component? | ||
## 4.5 What if There is No Content for a Software Component? | ||
|
||
1. First, reach out to the SAF team at [[email protected]](mailto:[email protected]) to find out if there is a profile in development or otherwise available but not listed that could meet your needs. | ||
2. Second, if there is still no profile available, identify the security guidance to which the profile should comply and reach out to find out how to best create that profile. We help teams do this and provide training courses on that as well! | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -6,9 +6,9 @@ author: Aaron Lippold | |
headerDepth: 3 | ||
--- | ||
|
||
## 8. Run InSpec - NGINX Example | ||
## 8.1 Run InSpec - NGINX Example | ||
|
||
### 8.1. Example Running an InSpec Profile Directly from GitHub | ||
### 8.2 Example Running an InSpec Profile Directly from GitHub | ||
|
||
In this module, we use NGINX for learning purposes. If you're interested in NGINX specifically, you may be interested in the [MITRE nginx-stigready-baseline](https://github.com/mitre/nginx-stigready-baseline) profile on GitHub. | ||
|
||
|
@@ -22,7 +22,7 @@ Sometimes, there are multiple profiles available for the same software component | |
If you see multiple profiles available and are unsure which to use, read the READMEs in each to see what guidance they are based on to understand what is most useful for your situation. You can also run multiple profiles and compare the results to see which is more informative for your assessment. Lastly, you can always reach out to <[email protected]> if you have more questions. | ||
::: | ||
|
||
### 8.2 Forming the InSpec Command | ||
### 8.3 Forming the InSpec Command | ||
|
||
- Since we are using the profile from GitHub, we will use the GitHub link `https://github.com/mitre/nginx-stigready-baseline` to specify the profile. | ||
- Because we are using a Docker container that is running in our lab environment, we can specify the target as `-t docker://nginx`. | ||
|
@@ -35,11 +35,11 @@ To execute this command to run the GitHub profile on your target system, run thi | |
inspec exec https://github.com/mitre/nginx-stigready-baseline -t docker://nginx --input-file inputs.yml --reporter cli json:./results/nginx_vanilla_results.json | ||
``` | ||
|
||
### 8.3 Run the Command | ||
### 8.4 Run the Command | ||
|
||
Enter the command from the previous step in your terminal and press enter. It will take a moment to start running. | ||
|
||
#### 8.3.1 CLI (Command Line) Results | ||
#### 8.4.1 CLI (Command Line) Results | ||
|
||
You should see output similar to that below. The whole profile should execute in only a couple minutes. | ||
|
||
|
@@ -77,7 +77,7 @@ Test Summary: 137 successful, 91 failures, 55 skipped | |
You see that many of the tests pass, while others fail and may require investigation. | ||
#### 8.3.2 Results saved to a file | ||
#### 8.4.2 Results saved to a file | ||
You should also see your results in a JSON file located in `/results` folder with the name that you specified in the command, for example `nginx_vanilla_results.json`. If you are using the lab environment GitHub codespaces, you should see it on the left of your screen under files. Right-click that file and click "Download" so that you have this file locally for the next steps. | ||
![The Results Folder](../../assets/img/ResultsFolder.png) | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.