Have you considered the CPE Applicability Language (NISTIR 7698)?  It 
facilitates this without overloading CPE IDs.


Thanks,
Leland

> -----Original Message-----
> From: Martin Preisler [mailto:[email protected]]
> Sent: Thursday, October 20, 2016 2:31 PM
> To: SCAP Security Guide
> Subject: [Non-DoD Source] VMs, containers vs. bare-metal machines in SSG
> 
> We have had increasing requests to scan containers and VM storage images
> for compliance. In those use-cases a lot of our rules don't make sense.
> For example separate partition for /tmp isn't really applicable to containers.
> 
> I thought about how we can deal with this in SSG. We have several options:
> 
> 1) Separate benchmark and datastreams for containers and VM storage images:
> ssg-rhel7-ds.xml and ssg-rhel7-container-ds.xml
> 
> 2) Separate profile for containers and VM storage images:
> pci-dss and pci-dss-container
> 
> 3) Use applicability and CPE platforms to distinguish between what is being
> scanned. That allows us to use the same pci-dss profile for bare-metal, VM,
> VM storage image and container image.
> 
> Right now I am leaning towards 3) because it "unlocks" the feature
> transparently to our users. There is nothing extra they have to study to
> start scanning containers. The downside is that we will have to add "fake"
> CPE IDs for platforms like "vm-storage" and "container". Rules that apply
> to everything will have no <platform> element in them. Rules that apply
> to just containers will have something like:
> 
> <platform idref="cpe:/a:*:container-image"/>
> 
> or
> 
> <platform idref="cpe:/a:*:vm-storage"/>
> 
> Official NIST CPE ID dictionary has these related CPE IDs
> cpe:/a:redhat:docker:1.5.0-27
> cpe:/a:linuxcontainers:lxc:0.5.0
> cpe:/a:redhat:libvirt:1.2.7
> 
> Not sure we want to go with any of those though. I would like to keep it
> container and VM tech agnostic.
> 
> Before I start hacking this I would like to hear your thoughts.
> 
> --
> Martin Preisler
> Identity Management and Platform Security | Red Hat, Inc.
> _______________________________________________
> scap-security-guide mailing list -- [email protected]
> To unsubscribe send an email to 
> [email protected]

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
scap-security-guide mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to