@@ -52,48 +52,53 @@ ubtu22cis_uses_root: false
5252# ## Settings for associated Audit role using Goss
5353# ##
5454
55- # Note that there are also variable regarding the retrieval
56- # and configuration of Goss and the audit role at the end
57- # of this file.
58-
59- # # Audit setup
60- # Audits are carried out using Goss. This variable
61- # determines whether execution of the role prepares for auditing
62- # by installing the required binary.
55+ # #########################################
56+ # ## Goss is required on the remote host ###
57+ # # Refer to vars/auditd.yml for any other settings ##
58+
59+ # Allow audit to setup the requirements including installing git (if option chosen and downloading and adding goss binary to system)
6360setup_audit : false
64- # # How to retrieve audit binary
65- # Options are copy or download, using either the path
66- # provided in variable `audit_conf_copy` for copying or
67- # the url given in variable `audit_files_url` for downloading.
61+
62+ # enable audits to run - this runs the audit and get the latest content
63+ run_audit : false
64+
65+ # Only run Audit do not remediate
66+ audit_only : false
67+ # As part of audit_only
68+ # This will enable files to be copied back to control node
69+ fetch_audit_files : false
70+ # Path to copy the files to will create dir structure
71+ audit_capture_files_dir : /some/location to copy to on control node
72+
73+ # How to retrieve audit binary
74+ # Options are copy or download - detailed settings at the bottom of this file
75+ # you will need to access to either github or the file already dowmloaded
6876get_audit_binary_method : download
6977
70- # # How to retrieve the audit role
71- # The role for auditing is maintained separately.
72- # This variable specifies the method of how to get the audit role
73- # onto the system. The options are as follows:
74- # - git: clone from git repository as specified in variable `audit_file_git` in
75- # the version specified by variable `audit_git_version`
76- # - copy: copy from path as specified in variable `audit_conf_copy`
77- # - download: Download from url as specified in variable `audit_files_url`
78+ # # if get_audit_binary_method - copy the following needs to be updated for your environment
79+ # # it is expected that it will be copied from somewhere accessible to the control node
80+ # # e.g copy from ansible control node to remote host
81+ audit_bin_copy_location : /some/accessible/path
82+
83+ # how to get audit files onto host options
84+ # options are git/copy/get_url other e.g. if you wish to run from already downloaded conf
7885audit_content : git
7986
80- # # Enable audits to run
81- # This variable governs whether the audit using the
82- # separately maintained audit role using Goss
83- # is carried out.
84- run_audit : false
87+ # archive or copy:
88+ audit_conf_copy : " some path to copy from "
89+
90+ # get_url:
91+ audit_files_url : " some url maybe s3? "
8592
86- # # Resource-intensive Tests
87- # This variable governs whether resource-intensive audit tests are carried out
93+ # Run heavy tests - some tests can have more impact on a system enabling these can have greater impact on a system
8894audit_run_heavy_tests : true
95+
8996# This variable specifies the timeout (in ms) for audit commands that
9097# take a very long time: if a command takes too long to complete,
9198# it will be forcefully terminated after the specified duration.
92- audit_cmd_timeout : 60000
99+ audit_cmd_timeout : 120000
93100
94- # ##
95- # ## End Audit Settings for associcated Audit role using Goss
96- # ##
101+ # ## End Goss enablements ####
97102
98103# # Running role under chroot
99104# Tweak role to run in a chroot, such as in a kickstart %post script.
@@ -1058,56 +1063,3 @@ ubtu22cis_sgid_adjust: false
10581063# permissions on dot files.
10591064# Possible values are `true` and `false`.
10601065ubtu22cis_dotperm_ansiblemanaged : true
1061-
1062- # #
1063- # # Audit Configuration Settings
1064- # #
1065-
1066- # The settings below configure the retrieval and usage of the
1067- # Goss-based audit role associated with this role, and the Goss-tool
1068- # itself.
1069-
1070- # # Audit binary settings
1071- audit_bin_version :
1072- release : v0.4.0
1073- checksum : ' sha256:9cb37863d3d25e2af80cb5cf55198c0c115b2477724153ba9afd0a2e544cb46e'
1074- audit_bin_path : /usr/local/bin/
1075- audit_bin : " {{ audit_bin_path }}goss"
1076- audit_format : json
1077-
1078- # if get_audit_binary_method == download change accordingly
1079- audit_bin_url : " https://github.com/goss-org/goss/releases/download/{{ audit_bin_version.release }}/goss-linux-amd64"
1080-
1081- # if get_audit_binary_method - copy the following needs to be updated for your environment
1082- # it is expected that it will be copied from somewhere accessible to the control node
1083- # e.g copy from ansible control node to remote host
1084- audit_bin_copy_location : /some/accessible/path
1085-
1086- # # Goss Audit Benchmark file
1087- # managed by the control audit_content
1088- # git
1089- audit_file_git : " https://github.com/ansible-lockdown/{{ benchmark }}-Audit.git"
1090- audit_git_version : " benchmark-{{ benchmark_version }}"
1091-
1092- # archive or copy:
1093- audit_conf_copy : " some path to copy from"
1094-
1095- # get_url:
1096- audit_files_url : " some url maybe s3?"
1097-
1098- # # Goss configuration information
1099- # Where the goss configs and outputs are stored
1100- audit_out_dir : ' /opt'
1101- # Where the goss audit configuration will be stored
1102- audit_conf_dir : " {{ audit_out_dir }}/{{ benchmark }}-Audit"
1103-
1104- # If changed these can affect other products
1105- pre_audit_outfile : " {{ audit_out_dir }}/{{ ansible_facts.hostname }}-{{ benchmark }}-{{ benchmark_version }}_pre_scan_{{ ansible_facts.date_time.epoch }}.{{ audit_format }}"
1106- post_audit_outfile : " {{ audit_out_dir }}/{{ ansible_facts.hostname }}-{{ benchmark }}-{{ benchmark_version }}_post_scan_{{ ansible_facts.date_time.epoch }}.{{ audit_format }}"
1107-
1108- # # The following should not need changing
1109- audit_vars_path : " {{ audit_conf_dir }}/vars/{{ ansible_facts.hostname }}.yml"
1110- audit_results : |
1111- The pre remediation results are: {{ pre_audit_summary }}.
1112- The post remediation results are: {{ post_audit_summary }}.
1113- Full breakdown can be found in {{ audit_out_dir }}
0 commit comments