Just to add to the thread and to stir the bucket...

Can we define the line " If the agency specifies that the information or data 
be cryptographically protected, then FIPS 140-2 is applicable. In essence, if 
cryptography is required, then it must be validated."?  Isn't cryptographic 
protection up to the data owner?  If not required, say due to a closed 
environment, couldn't there be an argument for ARCH?

I truly believe it all needs to be verifiable and begins with FIPS 140-2 
approval but doesn't this line give some decision making to the data owner?

Jim


-----Original Message-----
From: Trevor Vaughan [mailto:[email protected]]
Sent: Tuesday, April 18, 2017 1:18 PM
To: SCAP Security Guide
Subject: [Non-DoD Source] Re: Introduction and Questions

I'm piggy backing on what Shawn is saying because I routinely bump into the 
FIPS and Common Criteria issue.


Common Criteria is actually easier to hand wave around since I haven't seen 
many systems that stick to CC as documented.


FIPS is more difficult since it is quite concrete and, until that changes, any 
non-FIPS certified system cannot be used to protect sensitive information.


This is the section from the CMVP website that always hits home:

FIPS 140-2 precludes the use of unvalidated cryptography for the cryptographic 
protection of sensitive or valuable data within Federal systems. Unvalidated 
cryptography is viewed by NIST as providing no protection to the information 
or data - in effect the data would be considered unprotected plaintext. If the 
agency specifies that the information or data be cryptographically protected, 
then FIPS 140-2 is applicable. In essence, if cryptography is required, then 
it must be validated.


Mapping Arch is definitely a good idea but, in theory, you can't do anything 
that requires data protection, like SSH, until Arch has a FIPS 140-2 approved 
cryptographic module (or Q4 2018 rolls around and/if the automated system 
rolls out).


Hopefully this is helpful.


Thanks,


Trevor


On Mon, Apr 17, 2017 at 2:28 PM, Major Hayden <[email protected]> wrote:


        -----BEGIN PGP SIGNED MESSAGE-----
        Hash: SHA256

        On 04/17/2017 12:42 PM, [email protected] wrote:
        > My name is Tim Bradt. I am software developer at Signature Research, 
Inc. I 
have been charged with getting SCAP up and running on some of our systems.
        >
        > We are running Arch Linux. I was wondering what the process would be 
for 
porting the RHEL7 guide to Arch as we need the DISA STIG for system approval.

        Hello Tim,

        As others have mentioned already, the big job is to get an actual 
standard 
assembled for Arch Linux.  Once that's done, writing SCAP content or other 
scripts is much more straightforward.

        We've tried to tackle a translation of the RHEL 7 STIG into something 
that 
works for CentOS 7 and Ubuntu 16.04:

          https://github.com/openstack/openstack-ansible-security 
<https://github.com/openstack/openstack-ansible-security>
          https://docs.openstack.org/developer/openstack-ansible-security/ 
<https://docs.openstack.org/developer/openstack-ansible-security/>

        (There's also a RHEL 6 STIG implementation for Ubuntu 14.04, but we're 
deprecating that now.)

        Some of that work may help you figure out how to translate the RHEL 7 
STIG 
requirements for Arch Linux.  Feel free to reach out if you need pointers. :)

        - --
        Major Hayden
        -----BEGIN PGP SIGNATURE-----
        Version: GnuPG v2

        iQIcBAEBCAAGBQJY9RdZAAoJEHNwUeDBAR+xjCAP/1xFonXK1mh0X7bzFtNedXe/
        QUhNDx8rRayPCKWb5aWT3n4qarsdq97AVpaLnxgGI+SArZwGEY6/tZdZiq4Znfkr
        yZZ71XcARp3CzDk1pw5ukZWXgZ464mBC2wnEawkuYHCGy9J2oo1t1LL/7XikSpXw
        g6MqZqC/E+WOR9lLTAQi0yBdBfj27P3Imn4DB7aHqFEC4GgBJavBrFIW58fSxh/D
        qU9xORrS3QbE039/mAsvf9lqlA2yyATey+bMeeVKVs/c72F5fWql8lpXhnYa2Z5C
        lBQJF/A9ECHinQtLxcCeZUDR5sGhhDgd0IrlSC5wnVURoBGF7UAezSNSORZvjJUS
        f5yWkYOpIY5aPmQxnzPPcDMBKajjag0m9Q3sfTPOJgRb3tBHtCjkChGeun9xIhLd
        +7MwMZVp+IZzQh3e4VPJFJk+RdfAIAHmQK2ocT2fVkNnJwr1WB4yJq2awaa/348O
        P5AQx1YhiPEsMiem60gZrO1SC5KkZgNEo3DA4cNXMwYP/IbzIv2ZlGmzzzGaiW9H
        FfYSLUCBweg8488/SbdolgpTfws1pKcwaHmEyb00S1lmj7AwxmyYR1KSlDdKNzsm
        sPd8MJiUXJkhTR908OQbI1+5bXmXB80DwS8Grr63n+y7+fph3H5BNoLoyCE4h+Rd
        is+dK0rEGg7MoBxvsY8g
        =Iwuf
        -----END PGP SIGNATURE-----

        _______________________________________________
        scap-security-guide mailing list --  
[email protected] 
<mailto:[email protected]>
        To unsubscribe send an email to 
[email protected] 
<mailto:[email protected]>





-- 

Trevor Vaughan
Vice President, Onyx Point, Inc

(410) 541-6699 x788


-- This account not approved for unencrypted proprietary information --

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
scap-security-guide mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to