Skip to content

Deutsche Telekom IT GmbH (DevSecOps Team): Project for Security & Compliance Automation

License

Notifications You must be signed in to change notification settings

Alestrix/tel-it-security-automation

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Security & Compliance Automation

Telekom IT DevSecOps Team

Author: DevSecOps Team

Company: Deutsche Telekom IT GmbH

E-Mail: [email protected]


Introduction

Software is delivered by vendors with a minimal pre-configuration that is feasible for most customers. This is also true for security relevant configuration which leads to insecure systems in default configuration. To change this an important job in IT security is the secure configuration of operating systems and applications - also named hardening. This is a complex and error-prone task if done manually. Additionally, this task must be repeated and controlled in case of any changes on a system.

The DevSecOps team of Deutsche Telekom IT GmbH has the mission to deliver tools and solutions that help their customers to build secure application and services. The intention of DevSecOps teams project "Security & Compliance Automation" is the implementation of a solution for automated hardening and compliance checks that allow fast, reproducible and reliable implementation and documentation of security requirements for operating systems and applications.

Solution

This project provides an automated solution to implement security hardening for operating systems and applications. This is needed to reach an adequate security level and to be compliant to the security requirements from Telekom Security. The solution helps to prepare systems that can easily pass the technical part of the Privacy & Assessment Process (PSA) of Telekom Security and Group Privacy.

Automated Hardening

The scripts are developed in a way, that they can be used to automatically harden operating systems and applications. Additionally the roles can be used to perform compliance checks in Ansible check mode ("dry run").

Ansible Roles

Two roles are currently available:

  • Ansible role for hardening of Linux based Servers
  • Ansible role for hardening of OpenSSH daemon on Linux

The hardening will be done following the security requirements for

  • Linux servers (3.65)
  • SSH (3.04)

from Telekom Security (see References for used document versions).

Test Scripts

The folder /testing includes shell scripts for testing for all security requirements for SSH and Linux. The scripts generate a logfile and a Statement of Compliance list, that can be used for needed documentation of compliance level for Telekom Security Privacy & Security Assessment.

Supported Platforms

Ansible control node requirements

  • Ansible version: 2.9 (or higher)
  • Python version: 3.5 (or higher)

Managed node requirements

On managed node the following Python version must be installed:

  • Python version: 3.5 (or higher)

The roles are tested for hardening of the following Linux versions:

  • Ubuntu 16.04 LTS
  • Ubuntu 18.04 LTS
  • Ubuntu 20.04 LTS
  • RedHat Enterprise Linux 7
  • RedHat Enterprise Linux 8
  • CentOS 7
  • CentOS 8
  • Amazon Linux 2
  • Suse Linux Enterprise Server 12
  • Suse Linux Enterprise Server 15

IMPORTANT: These roles only supports Linux versions for SERVERS! The role is not tested with desktop systems and can cause unexpected malfunctions.

Changelog

v1.0 (29.01.2020) - First Release

v1.1 (08.05.2020) - Bugfix

  • Ansible (Linux): Fixed issue with packages uninstallation on RedHat 8 (issues 69251) by adding autoremove option in Ansible
  • Ansible (Linux): Added dependent packages in the testing script to ensure, that dependent packages will be deleted as well.

v.1.2 (28.05.2020) - New Features

  • Test Script: Changed to a modular structure. Start script (start_testing.sh) available to execute several test case files.
  • Ansible (general): Config changes to support for CentOS 8 and Ubuntu 20.04 added and tested.
  • Ansible (general): Moved variables from specific files (e.g. vars(01)basic-hardening.ym to /vars/main.yml.
  • Ansible (general): Added default values to variables and optional use of customer defined variable file.
  • Ansible (Linux): Added missing requirement (Req-18) to enable GPGCheck for enabled repositories.
  • Ansible (Linux): Added missing requirement (Req-28) to enable auditing in bootlader configuration.
  • Ansible (Linux): Change for IPTables requirements (Req-46 to 49) for IPv6 support.
  • Ansible (SSH): Added new requirement (Req-6) to configure host key algorithms.

v1.2.1 (07.08.2020)

  • Security Vulnerability (Linux): Fixed an issue where passwords generated by our scripts were weak and guessable.

References

Telekom Security - Security Requirements:

  • SecReq 3.65: Linux OS for Servers (version 1.4; 01.07.2020)
  • SecReq 3.04: SSH (version 2.7, 01.07.2020)

The document can be found on Telekom Security PSA Portal (only internal).

A public available complete set of all security requirements of Deutsche Telekom AG can be downloaded here: Telekom Security - Requirements (ZIP file)

License

Apache License, Version 2.0

See file LICENSE

About

Deutsche Telekom IT GmbH (DevSecOps Team): Project for Security & Compliance Automation

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Shell 87.0%
  • Jinja 13.0%