Security hardening with the security_compliance_manager tool
You can apply STIG hardening to the system with the security_compliance_manager command.
Important: This tool needs to be run by Platform Administrator such as
apadmin
or equivalent.security_compliance_manager command syntax
usage: security_compliance_manager [-h] [--restoreAll]
[--restoreSingleFile <restore_file_path>]
[--stigAll] [--skipIntegrityCheck]
[--stigSingleFile STIGSINGLEFILE]
[--status]
The script manages security compliance on the system.
Optional arguments:- -h|--help
- Displays help for the command.
- --restoreAll
- Performs restore on all files.
- --restoreSingleFile <restore_file_path>
- Restores a single file with its full path provided.
- --stigAll
- Performs STIG on all files.
- --skipIntegrityCheck
- Runs the process without running file integrity checker utility.
- --stigSingleFile <stig_file_path>
- Performs STIG on a file with a given full path. Examples of
<stig_file_path>:
You can edit the template files corresponding to the above list of files that are kept in /opt/ibm/appliance/platform/security/stig_templates directory before running the security_compliance_manager with the --stigSingleFile option./etc/aide.conf /etc/issue /etc/login.defs /etc/pam.d/postlogin-ac /etc/audisp/audispd.conf /etc/libuser.conf /etc/pam_ldap.conf
- --status
- Displays the status of each STIG file.
Procedure
- Run the apstop
command.
apstop
[root@gt15-node1 ~]# apstop Successfully deactivated system
- Verify that the system state is
Inactive
, application state isUnknown
, and the platform management state isInactive
by running the ap state command.ap state -d
[root@gt15-node1 ~]# ap state -d System state is 'Inactive' Application state is 'Unknown' Platform management state is 'Inactive'
- Run the security_compliance_manager command with any of the following options
in order to prepare the system for STIG hardening.
- --stigAll: Use this option to apply hardening on all applicable files.
- --stigSingleFile: Use this option to apply hardening for mentioned file only.
security_compliance_manager --stigAll
- Run the apstart command to reactivate the
platform.
apstart
[root@gt15-node1 ~]# apstart Successfully activated platform, appliance activation request sent
Example usage
Full STIG hardening:security_compliance_manager --stigAll
/etc/issue
file STIG
hardening: security_compliance_manager --stigSingleFile /etc/issue
Note: The
tool can be run on any node, and the result will apply to all the nodes.