Greg Elin says:
> Do you have plans to make any or all of
> it available outside of forge.mil?

Yes.

> developing a toolkit to make OpenSCAP and FISMA easier for civic innovators

Indeed. I notice you used vagrant for your demo commands. One of the coolest 
things I've done with our CMITS policy was when we wanted some software from an 
outside firm, and they wanted a machine configured just like our workstations. 
I just wrote a node definition that said "eh, mostly like one of our standalone 
boxes," and a Vagrantfile that told Vagrant to use its Puppet provisioner to 
apply our manifest, and with one (half-an-hour long) "vagrant up" command, our 
partner could set up a virtual AFSEO workstation. It sounds not unlike what you 
are doing.

> Can you share with the list portions of the README that describe the extent 
> to which you lock things down?

The CMITS release is sort of a kit; the final piece that pulls all the rest 
together is for you to write.
 
Most of the reason for CMITS was to have flexibility about how locked-down we 
are, and how we do it: on some systems we couldn't fulfill such-and-such 
requirement, and so we don't, but we need to explain that. Or - oh, here's a 
good one. Some of our systems are standalone; they implement the NFS 
requirements trivially by disabling NFS. Others are on a network; they 
implement the NFS requirements in a more fleshed-out way. So the CMITS release 
contains an nfs module, with an nfs::no class and an nfs::stig class.

Then if you only have standalone boxes, you write something like 

class stig_compliance {
    include nfs::no
}

node mybox {
    include stig_compliance
}

If you have more complicated needs, you write more classes.
-- 
SCAP Security Guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
https://github.com/OpenSCAP/scap-security-guide/

Reply via email to